CS3750 Computers and Society FINAL EXAM

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/39

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

40 Terms

1
New cards

Which of the following is not an exclusive right (subject to some exceptions) granted by copyright law?

a) copy the work

b) distribute the work

c) profit from the work

d) create "derivative works"

c) profit from the work

2
New cards

Claim rights or positive rights:

a) are rights to act without interference

b) are guaranteed in the First Amendment

c) impose an obligation on some people to provide certain things for others

d) all of the above

c) impose an obligation on some people to provide certain things for others

3
New cards

A cookie is:

a) a feature of a Web site designed to attract children

b) an illegal use of information about a customer

c) a file that a Web site stores on a visitor's computer

d) a small reward that can be redeemed on a Web site

c) a file that a Web site stores on a visitor's computer

4
New cards

Which of the following are the two main arguments against the Communications Decency Act accepted by the courts?

a) it was not enforceable and it did not use the least restrictive means of accomplishing the goal of protecting children

b) it was too vague and broad and it did not use the least restrictive means of accomplishing the goal of protecting children

c) it was too vague and broad and it did not use community standards to determine what would be harmful to minors

d) it was not enforceable and it did not use community standards to determine what would be harmful to minors

b) it was too vague and broad and it did not use the least restrictive means of accomplishing the goal of protecting children

5
New cards

When was the first U.S. copyright law passed?

a) 1790

b) 1970

c) 1908

d) 1880

a) 1790

6
New cards

In 2000, a French court ordered Yahoo! to block access by French people to:

a) Web sites containing pornography

b) an Al Qaeda training manual

c) online auction sites containing Nazi materials

d) a Web site containing instructions for making bombs

c) online auction sites containing Nazi materials

7
New cards

Ken Olson, president of Digital Equipment Corp. in the late 1970's, Thomas J. Watson, chairman of IBM in the early 1940's, and Thomas Edison all made predictions about technology that were extremely wrong. Which of the following explains why the predictions of experts are often so far off?

a) lack of imagination about the uses people would find for technology

b) lack of imagination about what the public would like

c) lack of imagination about what the public would pay for

d) all of the above

d) all of the above

8
New cards

One of the sources of failure common to BOTH the Therac-25 and the Ariane 5 rocket was

a) confusing and poorly documented error messages

b) poor human computer interface design

c) operator error

d) reuse of software from previous versions of the systems

d) reuse of software from previous versions of the systems

9
New cards

Which of the following is an example of a negative right or liberty?

a) freedom of speech, as provided in the First Amendment of the U.S. Constitution

b) freedom of religion, as provided in the First Amendment of the U.S. Constitution

c) the right to use your labor, skills or mind to create goods and services

d) all of the above

d) all of the above

10
New cards

If a business follows an "opt-in" policy for handling personal data, information about a customer

a) may not be released under any conditions

b) may not be released unless the customer gives permission

c) may be released unless the customer requests that the information be kept private

d) may be released for any legitimate business purpose

b) may not be released unless the customer gives permission

11
New cards

Which of the following requirements was a key provision of the Children's Internet Protection Act (CIPA)?

a) proof of age must be provided to access Web sites containing pornography

b) children must not be allowed to access "hate material" online

c) filtering software must be installed on Internet terminals in schools and libraries

d) commercial Web sites must require parental consent for access by children

c) filtering software must be installed on Internet terminals in schools and libraries

12
New cards

Which of the following limits deceptive commercial email and outlines spammers' responsibilities:

a) the Spam Reduction Act

b) the Electronic Communications Act

c) the Commercial Communications Act

d) the CAN-SPAM Act

d) the CAN-SPAM Act

13
New cards

In the term "Free Software", "free" implies all of the following except one. Which one?

a) Free of cost

b) Free to copy

c) Freedom

d) Free to modify

a) Free of cost

14
New cards

Which of the following is an example of biometrics?

a) DNA

b) Fingerprints

c) Voice prints

d) all of the above

d) all of the above

15
New cards

Which of the following is NOT a program used by hackers to gain access to your computer?

a) Keyloggers

b) Trojans

c) Rootkits

d) Honey Pots

d) Honey Pots

16
New cards

Which of the following reasons for monitoring email, voice mail, and computer files is considered legal?

a) protect security of proprietary information and data

b) investigate complaints of harassment

c) prevent personal use of employer facilities if prohibited by company policy

d) all of the above

d) all of the above

17
New cards

Most of the delay in the opening of the Denver International Airport was because of problems with:

a) the air traffic control system

b) the environmental monitoring system

c) the baggage handling system

d) the telephone and communications systems

c) the baggage handling system

18
New cards

When a person visits a Web site, his or her IP address and the links he or she clicked on are automatically recorded. This is an example of:

a) secondary use

b) invisible information gathering

c) data spillage

d) data mining

b) invisible information gathering

19
New cards

The Privacy Act of 1974 established rules to regulate"

a) private sector databases only

b) all databases that contain personal information

c) all personal information, including surveillance data

d) Federal government databases only

d) Federal government databases only

20
New cards

Hacktivism is:

a) a political activist group promoting tougher anti-hacking laws

b) the counter hacking techniques used by the FBI and other law enforcement agencies

c) the use of hacking to promote a political cause

d) a newsletter for hackers

c) the use of hacking to promote a political cause

21
New cards

Which of the following reasons for monitoring email, voice mail, and computer files is considered legal?

a) protect security of proprietary information and data

b) investigate complaints of harassment

c) prevent personal use of employer facilities if prohibited by company policy

d) all of the above

d) all of the above

22
New cards

The practice of hiring companies or employees in other countries is known as:

a) offshoring

b) globalization

c) downsizing

d) none of the above

a) offshoring

23
New cards

In the early days of computing (1960'2 to early 1970's) a "hacker" was:

a) an incompetent programmer who wrote programs that did not work properly

b) a busy programmer who reused code to save time

c) a creative programmer who wrote very elegant or clever programs

d) a new programmer who wrote simple programs

c) a creative programmer who wrote very elegant or clever programs

24
New cards

Which of the following is not a factor specified in U.S. copyright law for determining fair use?

a) the purpose and nature of the use

b) the amount and significance of the portion used

c) the effect on the market for the copyrighted work

d) the for-profit or non-profit status of the copyright holder

d) the for-profit or non-profit status of the copyright holder

25
New cards

One of the reasons the court ruled against Napster was:

a) it knowingly encouraged and assisted in the infringement of copyrights

b) it knowingly stored illegal copies of files on its server

c) it knowingly used technology protected by patent

d) all of the above

a) it knowingly encouraged and assisted in the infringement of copyrights

26
New cards

T/F Broadcast media traditionally has had the strongest First Amendment protection (meaning the fewest regulatory restrictions) while print media has the weakest First Amendment protection

False

27
New cards

T/F The USA PATRIOT Act (2001) gives individuals more protection from government intrusion

False

28
New cards

T/F Wikipedia relies upon an advertising-based business model

False

29
New cards

T/F U.S. v. Jones (2012) was the first major case of digital technology surveillance and involved police attaching a GPS tracking device to a person's vehicle without a search warrant.

True

30
New cards

T/F Sony v. Universal City Studios (1983) ruled that private, non-commercial copying for personal use was fair use

True

31
New cards

T/F Copyright law protects processes and inventions, while patent law protects the particular expression of an idea

False

32
New cards

T/F Computer forensics specialists cannot recover deleted files from an erased disk

False

33
New cards

T/F Simplifications and assumptions are always made when designing a computer model

True

34
New cards

T/F The government cannot monitor online activity of suspected hackers without a court order

False

35
New cards

T/F Sega v. Accolade, Inc. (1992) helped determine that reverse engineering was allowable (fair research use) in order to make a compatible product

True

36
New cards

T/F Researchers are developing brain-computer interfaces to enable severely handicapped people to control appliances with their thoughts.

True

37
New cards

T/F A Turing Test determines the strength of an encryption method

False

38
New cards

T/F The U.S. Supreme Court ruled that requiring content filters on public library computers was unconstitutional

False

39
New cards

T/F All peer to peer technologies were found to be illegal as a result of the Napster case

False

40
New cards

T/F Providing new technology to poor countries is a matter of having enough money to buy equipment

False