1/29
5 Lectures Covered: Intellectual Property; Crime and Security; Errors, Failures, Risks; Evaluating and Controlling Technology; AI and Government Regulations
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which of the following is not an exclusive right (subject to some exceptions) granted by copyright law?
(a) Copy the work
(b) Distribute the work
(c) Profit from the work
(d) Create "derivative works"
c
Which of the following is not a factor specified in U.S. copyright law for determining fair use?
(a) The purpose and nature of the use
(b) The amount and significance of the portion used
(c) The effect on the market for the copyrighted work
(d) The for-profit or non-profit status of the copyright holder
d
In the term "Free Software," "free" implies all of the following except one. Which one?
(a) Free of cost
(b) Free to copy
(c) Freedom
(d) Free to modify
a
One of the reasons the court ruled against Napster was:
(a) It knowingly encouraged and assisted in the infringement of copyrights
(b) It knowingly stored illegal copies of files on its server
(c) It knowingly used technology protected by patent
(d) All of the above
a
In the early days of computing (1960's to the early 1970's), a "hacker" was:
(a) An incompetent programmer who wrote programs that did not work properly
(b) A busy programmer who reused code to save time
(c) A creative programmer who wrote very elegant or clever programs
(d) A new programmer who wrote simple programs
c
Hacktivism is:
(a) A political activist group promoting tougher anti-hacking laws
(b) The counter-hacking techniques used by the FBI and other law enforcement agencies
(c) The use of hacking to promote a political cause
(d) A newsletter for hackers
c
Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as:
(a) Honey pots
(b) Digital surveillance
(c) Computer entrapment
(d) Hacker crackdown
a
Which of the following is NOT a program used by hackers to gain access to your computer:
(a) Keyloggers
(b) Trojans
(c) Rootkits
(d) Honey pots
d
In 2000, a French court ordered Yahoo! to block access by French people to
(a) Web sites containing pornography
(b) an Al Qaeda training manual
(c) online auction sites containing Nazi materials
(d) a Web site containing instructions for making bombs
c
Most of the delay in the opening of the Denver International Airport was because of problems with
(a) The air traffic control system
(b) The environmental monitoring systems
(c) The baggage handling system
(d) The telephone and communications systems
c
One of the sources of failure common to both the Therac-25 and the Ariane-5 rocket was
(a) Confusing and poorly-documented error messages
(b) Poor human-computer interface design
(c) Reuse of software from previous versions of the systems
(d) All of the above
c
Which of the following is NOT a Neo-Luddite criticism of computers?
(a) Use of computers in schools thwarts development of social skills
(b) Computers separate humans from nature and destroy the environment
(c) Computers cause social inequity
(d) None of the above
d
(T/F) Sega v Accolade, Inc (1992) helped determine that reverse engineering was allowable (fair research use) in order to make a compatible product.
True
(T/F) The government cannot monitor online activity of suspected hackers without a court order.
False
(T/F) Redundancy and self-checking are often present in safety-critical systems.
True
(T/F) Copyright law protects processes and inventions, while patent law protects the particular expression of an idea.
False
(T/F) Broadcast media traditionally has had the strongest First Amendment protection (meaning the fewest regulatory restrictions) while print media has the weakest First Amendment protection.
False
(T/F) The USA Patriot Act (2001) gives individuals more protection from governmental intrusion.
False
(T/F) DRM is a collection of technologies (hardware and software) that control use of intellectual property in digital formats.
True
(T/F) Wikipedia relies upon an advertising-based business model.
False
(T/F) U.S. v Jones (2012) was the first major case of digital technology surveillance and involved police attaching a GPS tracking device to a person's vehicle without a search warrant.
True
(T/F) Sony v Universal City Studios (1983) ruled that private, non-commercial copying for personal use was fair use.
True
(T/F) Computer forensic specialists cannot recover deleted files from an erased disk.
False
What are four factors used to determine if use of copyrighted material is "fair use" or not?
Purpose and nature of use (commercial or nonprofit)
Nature of copyrighted works (creative or factual)
Amount of significance of portion of work used
Effect of use on market and/or the value of copyright work (will it reduce sales of work?)
Copyright Law (Title 17) gives copyright holders exclusive rights to
make copies
produce derivative works (eg translations, movie adaptation…)
distribute copies
perform the work in public (eg music, plays…)
display the work in public (eg artwork, movies, games, web video…)
Patent
gives inventor the right to exclusive use of their invention for a limited period; does not apply to laws of nature, mathematical formulas, or obvious inventions (20 years)
Copyright
protect creative and artistic expressions: books, drawings, paintings, programs, music, etc. (life + 70 years)
Trademark
protect unique name, design, logo, symbols, or colors used by a business to identify their products or services (’forever’ or until disbanded)
Digital Millennium Copyright Act (DMCA)
prohibits making, distributing, or using tools to circumvent technological copyright protection systems and included protection from some copyright lawsuits for Web sites where users post material
Computer Fraud and Abuse Act (CFAA)
covers government computers, financial and medical systems, and activities that involve computers in more than one state, including computers connected to the Internet; illegal to access a computer without authorization