1/39
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which of the following is not an exclusive right (subject to some exceptions) granted by copyright law?
a) copy the work
b) distribute the work
c) profit from the work
d) create "derivative works"
c) profit from the work
Claim rights or positive rights:
a) are rights to act without interference
b) are guaranteed in the First Amendment
c) impose an obligation on some people to provide certain things for others
d) all of the above
c) impose an obligation on some people to provide certain things for others
A cookie is:
a) a feature of a Web site designed to attract children
b) an illegal use of information about a customer
c) a file that a Web site stores on a visitor's computer
d) a small reward that can be redeemed on a Web site
c) a file that a Web site stores on a visitor's computer
Which of the following are the two main arguments against the Communications Decency Act accepted by the courts?
a) it was not enforceable and it did not use the least restrictive means of accomplishing the goal of protecting children
b) it was too vague and broad and it did not use the least restrictive means of accomplishing the goal of protecting children
c) it was too vague and broad and it did not use community standards to determine what would be harmful to minors
d) it was not enforceable and it did not use community standards to determine what would be harmful to minors
b) it was too vague and broad and it did not use the least restrictive means of accomplishing the goal of protecting children
When was the first U.S. copyright law passed?
a) 1790
b) 1970
c) 1908
d) 1880
a) 1790
In 2000, a French court ordered Yahoo! to block access by French people to:
a) Web sites containing pornography
b) an Al Qaeda training manual
c) online auction sites containing Nazi materials
d) a Web site containing instructions for making bombs
c) online auction sites containing Nazi materials
Ken Olson, president of Digital Equipment Corp. in the late 1970's, Thomas J. Watson, chairman of IBM in the early 1940's, and Thomas Edison all made predictions about technology that were extremely wrong. Which of the following explains why the predictions of experts are often so far off?
a) lack of imagination about the uses people would find for technology
b) lack of imagination about what the public would like
c) lack of imagination about what the public would pay for
d) all of the above
d) all of the above
One of the sources of failure common to BOTH the Therac-25 and the Ariane 5 rocket was
a) confusing and poorly documented error messages
b) poor human computer interface design
c) operator error
d) reuse of software from previous versions of the systems
d) reuse of software from previous versions of the systems
Which of the following is an example of a negative right or liberty?
a) freedom of speech, as provided in the First Amendment of the U.S. Constitution
b) freedom of religion, as provided in the First Amendment of the U.S. Constitution
c) the right to use your labor, skills or mind to create goods and services
d) all of the above
d) all of the above
If a business follows an "opt-in" policy for handling personal data, information about a customer
a) may not be released under any conditions
b) may not be released unless the customer gives permission
c) may be released unless the customer requests that the information be kept private
d) may be released for any legitimate business purpose
b) may not be released unless the customer gives permission
Which of the following requirements was a key provision of the Children's Internet Protection Act (CIPA)?
a) proof of age must be provided to access Web sites containing pornography
b) children must not be allowed to access "hate material" online
c) filtering software must be installed on Internet terminals in schools and libraries
d) commercial Web sites must require parental consent for access by children
c) filtering software must be installed on Internet terminals in schools and libraries
Which of the following limits deceptive commercial email and outlines spammers' responsibilities:
a) the Spam Reduction Act
b) the Electronic Communications Act
c) the Commercial Communications Act
d) the CAN-SPAM Act
d) the CAN-SPAM Act
In the term "Free Software", "free" implies all of the following except one. Which one?
a) Free of cost
b) Free to copy
c) Freedom
d) Free to modify
a) Free of cost
Which of the following is an example of biometrics?
a) DNA
b) Fingerprints
c) Voice prints
d) all of the above
d) all of the above
Which of the following is NOT a program used by hackers to gain access to your computer?
a) Keyloggers
b) Trojans
c) Rootkits
d) Honey Pots
d) Honey Pots
Which of the following reasons for monitoring email, voice mail, and computer files is considered legal?
a) protect security of proprietary information and data
b) investigate complaints of harassment
c) prevent personal use of employer facilities if prohibited by company policy
d) all of the above
d) all of the above
Most of the delay in the opening of the Denver International Airport was because of problems with:
a) the air traffic control system
b) the environmental monitoring system
c) the baggage handling system
d) the telephone and communications systems
c) the baggage handling system
When a person visits a Web site, his or her IP address and the links he or she clicked on are automatically recorded. This is an example of:
a) secondary use
b) invisible information gathering
c) data spillage
d) data mining
b) invisible information gathering
The Privacy Act of 1974 established rules to regulate"
a) private sector databases only
b) all databases that contain personal information
c) all personal information, including surveillance data
d) Federal government databases only
d) Federal government databases only
Hacktivism is:
a) a political activist group promoting tougher anti-hacking laws
b) the counter hacking techniques used by the FBI and other law enforcement agencies
c) the use of hacking to promote a political cause
d) a newsletter for hackers
c) the use of hacking to promote a political cause
Which of the following reasons for monitoring email, voice mail, and computer files is considered legal?
a) protect security of proprietary information and data
b) investigate complaints of harassment
c) prevent personal use of employer facilities if prohibited by company policy
d) all of the above
d) all of the above
The practice of hiring companies or employees in other countries is known as:
a) offshoring
b) globalization
c) downsizing
d) none of the above
a) offshoring
In the early days of computing (1960'2 to early 1970's) a "hacker" was:
a) an incompetent programmer who wrote programs that did not work properly
b) a busy programmer who reused code to save time
c) a creative programmer who wrote very elegant or clever programs
d) a new programmer who wrote simple programs
c) a creative programmer who wrote very elegant or clever programs
Which of the following is not a factor specified in U.S. copyright law for determining fair use?
a) the purpose and nature of the use
b) the amount and significance of the portion used
c) the effect on the market for the copyrighted work
d) the for-profit or non-profit status of the copyright holder
d) the for-profit or non-profit status of the copyright holder
One of the reasons the court ruled against Napster was:
a) it knowingly encouraged and assisted in the infringement of copyrights
b) it knowingly stored illegal copies of files on its server
c) it knowingly used technology protected by patent
d) all of the above
a) it knowingly encouraged and assisted in the infringement of copyrights
T/F Broadcast media traditionally has had the strongest First Amendment protection (meaning the fewest regulatory restrictions) while print media has the weakest First Amendment protection
False
T/F The USA PATRIOT Act (2001) gives individuals more protection from government intrusion
False
T/F Wikipedia relies upon an advertising-based business model
False
T/F U.S. v. Jones (2012) was the first major case of digital technology surveillance and involved police attaching a GPS tracking device to a person's vehicle without a search warrant.
True
T/F Sony v. Universal City Studios (1983) ruled that private, non-commercial copying for personal use was fair use
True
T/F Copyright law protects processes and inventions, while patent law protects the particular expression of an idea
False
T/F Computer forensics specialists cannot recover deleted files from an erased disk
False
T/F Simplifications and assumptions are always made when designing a computer model
True
T/F The government cannot monitor online activity of suspected hackers without a court order
False
T/F Sega v. Accolade, Inc. (1992) helped determine that reverse engineering was allowable (fair research use) in order to make a compatible product
True
T/F Researchers are developing brain-computer interfaces to enable severely handicapped people to control appliances with their thoughts.
True
T/F A Turing Test determines the strength of an encryption method
False
T/F The U.S. Supreme Court ruled that requiring content filters on public library computers was unconstitutional
False
T/F All peer to peer technologies were found to be illegal as a result of the Napster case
False
T/F Providing new technology to poor countries is a matter of having enough money to buy equipment
False