CS3750 Finals Question Bank

0.0(0)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/112

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

113 Terms

1
New cards
utilitarian
"Inventing Right and Wrong" would reflect this theory of ethics
2
New cards
deontological
"Discovering Right and Wrong" would reflect this theory of ethics
3
New cards
positive right
claim right
4
New cards
negative right
liberty
5
New cards
FISA
the Act which establishes oversight rules for the NSA
6
New cards
FTC
the federal commission that regulates trade
7
New cards
FCC
he federal commission that regulates communications
8
New cards
computer matching
combining and comparing information from different databases using a single identifier
9
New cards
targeted marketing
advertising based on demographics, purchasing history, or other specific aspects of people
10
New cards
COPPA
a law passed to protect children's privacy online
11
New cards
data mining
combing through large amounts of data for patterns and information
12
New cards
computer profiling
analyzing data to determine characteristics of people most likely to engage in a certain behavior
13
New cards
RFID
tags that use radio frequencies to communicate with devices
14
New cards
CALEA
the law that requires communications companies to design equipment so that it is capable of being tapped
15
New cards
GPS
uses satellite signals and triangulation to determine location
16
New cards
encryption
a technology that transforms data into a form that is meaningless to anyone who might intercept it
17
New cards
ECPA
a law which prohibits interception of email and reading of (some) stored email without a court order
18
New cards
CDA
the first federal legislative attempt in the United States to censor Internet content (ruled unconstitutional)
19
New cards
CAN-SPAM Act
a law which requires commercial mass e-mail messages to contain opt-out provisions and accurate subject lines
20
New cards
spam
unsolicited mass email
21
New cards
CIPA
a law which requires schools and libraries to install filtering software if they wish to receive federal funds (ruled constitutional)
22
New cards
COPA
a law which made it illegal for commercial Web sites to make available to minors material "harmful to minors" as judged by community standards (ruled unconstitutional)
23
New cards
net neutrality
would prevent telecommunications companies from giving preferential treatment to specific content providers or types of content
24
New cards
"look and feel"
refers to the way a software program appears to the end-user as opposed to the computer code in which the program is written
25
New cards
DMCA
a law which prohibits making, distributing, or using tools (devices, software, or services) to circumvent technological copyright protection systems
26
New cards
open source software
programs in which the code is available to programmers
27
New cards
DRM
a collection of technologies (hardware and software) that control use of intellectual property in digital formats
28
New cards
reverse engineering
studying an existing program in order to determine how it was created
29
New cards
denial-of-service (DOS)
an attack in which hackers overload a target site with requests for information.
30
New cards
hactivism
hacking to promote a political cause
31
New cards
honey pots
Web sites that are specifically designed to be attractive to hackers
32
New cards
phishing
sending millions of emails fishing for information to use to impersonate someone and steal money or goods
33
New cards
pharming
planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
34
New cards
biometrics
biological characteristics that are unique to an individual
35
New cards
libel
written defamation
36
New cards
slander
verbal defamation
37
New cards
CFAA
a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical systems, and activities that involve computers in more than one state
38
New cards
telecommuting
working for an employer at a computer-equipped space in the employee's home
39
New cards
offshoring
moving part of a business's operation to another country
40
New cards
digital divide
refers to the fact that some people have access to computers and information technology while others do not
41
New cards
technological singularity
point at which artificial intelligence advances so far that we cannot comprehend what lies on the other side
42
New cards
Therac-25
a computerized machine that gave lethal radiation overdoses to some cancer patients
43
New cards
HROs
operate in difficult environments where failures can have extreme consequences
44
New cards
TCAS
detects a potential in-air collision of two planes and directs the pilots to avoid each other
45
New cards
stakeholders
individuals and organizations who would be affected in some way by an ethical dilemma
46
New cards
ACM
professional organization for the computing industry
47
New cards
Which of the following is an example of a negative right or liberty? (a) freedom of speech, as provided in the First Amendment of the U.S. Constitution (b) freedom of religion, as provided in the First Amendment of the U.S. Constitution (c) the right to use your labor, skills or mind to create goods and services(d) all of the above
d
48
New cards
Claim rights or positive rights (a) are rights to act without interference (b) are guaranteed in the First Amendment (c) impose an obligation on some people to provide certain things for others(d) all of the above
c
49
New cards
When a person visits a Web site, his or her IP address and the links he or she clicked on are automatically recorded. This is an example of (a) secondary use (b) invisible information gathering (c) data spillage (d) data mining
b
50
New cards
The Privacy Act of 1974 established rules to regulate(a) private sector databases only (b) all databases that contain personal information (c) all personal information, including surveillance data (d) Federal government databases only
d
51
New cards
A cookie is (a) a feature of a Web site designed to attract children (b) an illegal use of information about a customer(c) a file that a Web site stores on a visitor's computer (d) a small reward that can be redeemed on a Web site
c
52
New cards
If a business follows an "opt-in" policy for handling personal data, information about a customer (a) may not be released under any conditions (b) may not be released unless the customer gives permission (c) may be released unless the customer requests that the information be kept private (d) may be released for any legitimate business purpose
b
53
New cards
The Communications Assistance for Law Enforcement Act (CALEA) said that (a) international electronic communications must be filtered through a single hub. (b) agents of a foreign power may be wiretapped with authorization from a secret court (c) telecommunications equipment must be designed to allow the interception of telephone calls (with a court order) (d) email should have the same degree of legal protection as telephone calls
c
54
New cards
The legal guidelines for determining whether material is obscene include all of the following EXCEPT (a) the material depicts particular sexual (or excretory) acts specified by state law (b) the material is patently offensive according to contemporary community standards (c) the material has no serious artistic, literary, social, political, or scientific value (d) the material is intended for or distributed to persons under the age of 18
d
55
New cards
Which of the following requirements was a key provision of the Children's Internet Protection Act (CIPA)? (a) proof of age must be provided to access Web sites containing pornography (b) children must not be allowed to access "hate material" online (c) filtering software must be installed on Internet terminals in schools and libraries (d) commercial Web sites must require parental consent for access by children
c
56
New cards
Anonymizers allow a user to (a) obtain a new identity (b) send email and surf the Web anonymously (c) secretly spy on people visiting your Web site (d) randomly create a handle or avatar
b
57
New cards
Which of the following are the two main arguments against the Communications Decency Act accepted by the courts? (a) it was not enforceable, and it did not use the least restrictive means of accomplishing the goal of protecting children (b) it was too vague and broad, and it did not use the least restrictive means of accomplishing the goal of protecting children(c) it was too vague and broad, and it did not use community standards to determine what would be harmful to minors (d) it was not enforceable, and it did not use community standards to determine what would be harmful to minors
b
58
New cards
Many countries have tried to censor the Internet. Which country issued the following edict in 2001: The office of communications is ordered to find ways to ensure that the use of the Internet becomes impossible. (a) Iraq (b) South Africa (c) Afghanistan (d) Brazil
c
59
New cards
Which of the following limits deceptive commercial email and outlines spammers' responsibilities: (a) the Spam Reduction Act (b) the Electronic Communications Act (c) the Commercial Communications Act (d) the CAN-SPAM Act
d
60
New cards
Which of the following is NOT a provision of the CAN-SPAM Act that applies to commercial emailers? (a) It bans false or misleading header information. (b) It requires that unsolicited email give recipients an opt-out method. (c) It requires that commercial email be identified as an advertisement and include the sender's valid physical postal address. (d) It requires commercial emailers register with the Federal Trade Commission.
d
61
New cards
Which of the following is not an exclusive right (subject to some exceptions) granted by copyright law? (a) Copy the work (b) Distribute the work (c) Profit from the work (d) Create "derivative works"
c
62
New cards
Which of the following is not a factor specified in U.S. copyright law for determining fair use? (a) The purpose and nature of the use (b) The amount and significance of the portion used(c) The effect on the market for the copyrighted work (d) The for-profit or non-profit status of the copyright holder
d
63
New cards
In the term "Free Software," "free" implies all of the following except one. Which one? (a) Free of cost (b) Free to copy (c) Freedom (d) Free to modify
a
64
New cards
One of the reasons the court ruled against Napster was: (a) It knowingly encouraged and assisted in the infringement of copyrights (b) It knowingly stored illegal copies of files on its server (c) It knowingly used technology protected by patent (d) All of the above
a
65
New cards
When was the first U.S. copyright law passed? (a) In 1790 (b) In 1970 (c) In 1908 (d) In 1880
a
66
New cards
Which of the following is an example of biometrics:(a) DNA (b) Fingerprints (c) Voice prints (d) All of the above
d
67
New cards
In the early days of computing (1960's to the early 1970's), a "hacker" was: (a) An incompetent programmer who wrote programs that did not work properly (b) A busy programmer who reused code to save time (c) A creative programmer who wrote very elegant or clever programs (d) A new programmer who wrote simple programs
c
68
New cards
Hacktivism is: (a) A political activist group promoting tougher anti-hacking laws (b) The counter-hacking techniques used by the FBI and other law enforcement agencies (c) The use of hacking to promote a political cause(d) A newsletter for hackers
c
69
New cards
Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as: (a) Honey pots (b) Digital surveillance (c) Computer entrapment (d) Hacker crackdown
a
70
New cards
Which of the following is NOT a program used by hackers to gain access to your computer: (a) Keyloggers (b) Trojans (c) Rootkits (d) Honey pots
d
71
New cards
In 2000, a French court ordered Yahoo! to block access by French people to (a) Web sites containing pornography (b) an Al Qaeda training manual (c) online auction sites containing Nazi materials (d) a Web site containing instructions for making bombs
c
72
New cards
Which of the following reasons for monitoring email, voice mail, and computer files is considered legal? (a) Protect security of proprietary information and data (b) Investigate complaints of harassment (c) Prevent personal use of employer facilities if prohibited by company policy (d) All of the above
d
73
New cards
The practice of hiring companies or employees in other countries is known as: (a) Offshoring (b) Globalization (c) Downsizing (d) None of the above
a
74
New cards
Which of the following is NOT a Neo-Luddite criticism of computers? (a) Use of computers in schools thwarts development of social skills (b) Computers separate humans from nature and destroy the environment (c) Computers cause social inequity (d) None of the above
d
75
New cards
Ken Olson, president of Digital Equipment Corp. in the late 1970's, Thomas J. Watson, chairman of IBM in the early 1940's, and Thomas Edison all made predictions about technology that were extremely wrong. Which of the following explains why the predictions of experts are often so far off? (a) Lack of imagination about the uses people would find for technology (b) Lack of imagination about what the public would like (c) Lack of imagination about what the public would pay for (d) All of the above
d
76
New cards
Most of the delay in the opening of the Denver International Airport was because of problems with(a) the air traffic control system(b) the environmental monitoring systems (c) the baggage handling system (d) the telephone and communications systems
c
77
New cards
One of the sources of failure common to BOTH the Therac-25 and the Ariane 5 rocket was (a) confusing and poorly-documented error messages (b) poor human-computer interface design (c) operator error (d) reuse of software from previous versions of the systems
d
78
New cards
Which of the following occupations can sometimes cause Repetitive Strain Injuries (RSI)? (a) Sign-language interpreter for the deaf (b) Musician (c) Computer programmer (d) All of the above
d
79
New cards
In one application of a voice-recognition system, the system failed to recognize female speakers. A likely reason was (a) The program was specifically designed for men(b) Women's voices are inherently harder to recognize (c) Women do not speak as loudly as men, and the system used inferior microphones (d) The program was primarily developed and tested by men
d
80
New cards
Which of the following is NOT a principle for producing good systems? (a) Understand what success means(b) Include users in the design and testing stages (c) Be open and honest about capabilities, safety, and limitations of software (d) Overestimate the costs and time a project will take
d
81
New cards
More people worldwide have access to a cellphone than to a toilet.
True
82
New cards
Wikipedia relies upon an advertising-based business model.
False
83
New cards
A Turing Test determines the strength of an encryption method.
False
84
New cards
Accelerometers help robots stay upright.
True
85
New cards
Researchers are developing brain-computer interfaces to enable severely handicapped people to control appliances with their thoughts.
True
86
New cards
In Olmsted v. United States (1928), the U.S. Supreme Court interpreted the Fourth Amendment to apply only to physical intrusion.
True
87
New cards
In Katz v. United States (1967), the U.S. Supreme Court determined that the government needs a court order to intrude where a reasonable person has a reasonable expectation of privacy.
True
88
New cards
The Omnibus Crime Control and Safe Streets (1968) explicitly allowed wiretapping and electronic surveillance by law enforcement agencies with a warrant.
True
89
New cards
The USA PATRIOT Act (2001) gives individuals more protection from governmental intrusion.
False
90
New cards
In Kyllo v. United States (2001), the U.S. Supreme Court ruled that when the government uses a device that's not in use by the general public to "see" things it could not without intrusion, that is a "search" and requires a warrant.
True
91
New cards
U.S. v. Jones (2012) was the first major case of digital technology surveillance and involved police attaching a GPS tracking device to a person's vehicle without a search warrant.
True
92
New cards
Broadcast media traditionally has had the strongest First Amendment protection (meaning the fewest regulatory restrictions) while print media has the weakest First Amendment protection.
False
93
New cards
The U.S. Supreme Court ruled that requiring content filters on public library computers was unconstitutional.
False
94
New cards
Miller v. California (1973) ruled that community standards could not play a role in whether or not material was deemed obscene.
False
95
New cards
Sony v. Universal City Studios (1983) ruled that private, non-commercial copying for personal use was fair use.
True
96
New cards
Sega v. Accolade, Inc. (1992) helped determine that reverse engineering was allowable (fair research use) in order to make a compatible product.
True
97
New cards
All peer-to-peer technologies were found to be illegal as a result of the Napster case.
False
98
New cards
Copyright law protects processes and inventions, while patent law protects the particular expression of an idea.
False
99
New cards
The government cannot monitor online activity of suspected hackers without a court order.
False
100
New cards
Computer forensics specialists cannot recover deleted files from an erased disk.
False