Unit 5: Impact of Computing

Showing 20 of 37 questions

Q1
MULTIPLE_CHOICEMedium

Which of the following is an example of computing bias?

Q2
MULTIPLE_CHOICEMedium

Which of the following is a potential benefit of collecting large amounts of user data?

Q3
MULTIPLE_CHOICEMedium

A company collects location data from its users' smartphones. Which of the following is a privacy concern related to this practice?

Q4
MULTIPLE_CHOICEHard

What is an unintended consequence of using algorithms to filter content shown to users on social media?

Q5
MULTIPLE_CHOICEMedium

What is intellectual property (IP) in the context of computing?

Q6
MULTIPLE_CHOICEHard

A machine learning algorithm is trained on historical hiring data from a company. The algorithm is then used to screen new job applicants. Which of the following is a potential concern?

Q7
MULTIPLE_CHOICEMedium

Which of the following is an example of how computing innovations have had a beneficial impact?

Q8
MULTIPLE_CHOICEHard

What is "net neutrality"?

Q9
MULTIPLE_CHOICEEasy

Which of the following is a risk of sharing personal information on social media?

Q10
MULTIPLE_CHOICEMedium

How can computing innovations have both beneficial and harmful effects?

Q11
MULTIPLE_CHOICEHard

Which of the following best describes the "right to be forgotten"?

Q12
MULTIPLE_CHOICEMedium

Which of the following is an example of how automation has affected employment?

Q13
MULTIPLE_CHOICEHard

A self-driving car must make a split-second decision: swerve to avoid a pedestrian (risking the passenger) or stay on course (risking the pedestrian). This scenario illustrates which concept?

Q14
MULTIPLE_CHOICEMedium

Which of the following is an example of how the global nature of the Internet raises legal challenges?

Q15
MULTIPLE_CHOICEEasy

What is multifactor authentication?

Q16
MULTIPLE_CHOICEHard

A researcher uses a large dataset of social media posts to study public opinion on a topic. Which of the following is a limitation of this approach?

Q17
MULTIPLE_CHOICEMedium

Which of the following best describes the concept of "safe computing"?

Q18
MULTIPLE_CHOICEHard

Which of the following is an undecidable problem?

Q19
MULTIPLE_CHOICEEasy

Phishing is a cybersecurity attack that:

Q20
MULTIPLE_CHOICEEasy

Personally Identifiable Information (PII) includes:

Advertisement