CSCI 3200: Ethics in Computer Science - Quizzes 4-6 Open-Ended Questions ONLY

0.0(0)
studied byStudied by 2 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/27

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:03 PM on 1/24/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

28 Terms

1
New cards

Copyright laws allow for _____ where copyrighted literary works can be quoted and a small segment of a video work can be displayed for limited purposes such as classroom instruction.

fair use

2
New cards

To be eligible for a(n) _____ the invention must be a process, machine, or composition of matter that is unknown or unused by others before being awarded.

patent

3
New cards

The Copyright Term Extension Act extends the term for copyright protection another _____ years.

20

4
New cards

An issue that had not been fully addressed in prior acts, but was singled out in the Digital Millennium Copyright Act, is the _____ liability, the liability of third parties for copyright infringement of others.

intermediary

5
New cards

To state the _____ theory more simply, we should provide enough intellectual property protection to serve as an inducement for future innovation.

utilitarian

6
New cards

_____ is software such as Adobe's Acrobat Reader that is distributed with the source code at no charge.

Freeware

7
New cards

A(n) _____ license allows a user to redistribute the open source code with modifications or enhancements, but only under the same open source license under which that user received that code.

copyleft

8
New cards

Because MP3 files are unsecured, they can be distributed easily through the internet and lead to the potential for _____, the illegal copying and distributing of music.

piracy

9
New cards

When someone registers a domain name like googlesucks.com, the practice is referred to as _____.

cyber griping

10
New cards

Because many of the new business patents were for online business methods, they became known as _____.

Cyberpatents

11
New cards

A prominent technology that gives content providers enhanced control over their material is known as _____, where content providers distribute work in cyberspace in an encrypted form accessible only by users with this type of hardware or software.

trusted systems

12
New cards

Individuals need _____ over their personal data to ensure restricted access to it.

Control

13
New cards

A(n) _____ is placed across a network of related sites so that users' movements can be tracked not just within a certain site but within any site that is part of this network.

Third-party cookie

14
New cards

_____ are small data files that are written and stored on the user's hard disk drive by a website to track the user when the user visits that site.

Cookies

15
New cards

The _____ approach for protecting consumer privacy is when individuals explicitly approve secondary uses of their personal data.

Opt-in

16
New cards

This type of controversial tracking system, a(n) _____, is placed across a network of related sites so that the movements of users can be tracked not just on the initial site but on all related sites of that network.

third-party cookie

17
New cards

_____ is when an email is sent to a user that looks authentic but takes them to a link where they are asked to enter sensitive personal information.

Phishing

18
New cards

A(n) _____ is a self-replicating program usually hidden away in another host program or file that can disrupt a computer.

Virus

19
New cards

_____ travel automatically from one computer to another across network connections.

Worms

20
New cards

The two types of malware that form ransomware are the _____ designed to spread from one computer to another and the _____ that is delivered by it. Note: Separate the two answers with a semicolon (;).

worm; encrypting software

21
New cards

_____ involves the unauthorized duplication of proprietary software and the distribution or making available of those copies over the network.

Software piracy

22
New cards

Embedded in iTunes is a Digital Rights Management tool called ____ that limits the distribution of iTunes music.

fairplay

23
New cards

A(n) _____ combines hacking and political activism.

hacktivist

24
New cards

____ break into computer systems to steal data or plant worms.

Hackers

25
New cards

_____ filtering has emerged as a tool to stop DoS attacks because of the ability to filter incoming and outgoing packets.

Router-based

26
New cards

When using a key management infrastructure system, a certification authority functions as a digital _____ to verify the identity of the individual associated with a given key.

notary public

27
New cards

Because governments have been apprehensive about exporting sophisticated encryption systems due to the worry of international terrorism, governments have sought to gain a sort of regulation through _____ access.

backdoor

28
New cards

The United States has retreated from its impulse to regulate _____ but there is no guarantee that it will not impose new regulations.

encryption