CIS 3250 FSU Exam II
A negative right is also known as _______ - ✔✔liberty
(T/F) Accelerometers help robots stay upright. - ✔✔True
(T/F) A Turing Test determines the strength of an encryption method. - ✔✔False
(T/F)
...
CIS 3250 FSU Exam II
A negative right is also known as _______ - ✔✔liberty
(T/F) Accelerometers help robots stay upright. - ✔✔True
(T/F) A Turing Test determines the strength of an encryption method. - ✔✔False
(T/F) Generally, a deontologist would be more comfortable breaking a rule in circumstances
where doing so would have good consequences. - ✔✔False
Select an application referenced in the book for speech recognition. - ✔✔All of the above
What is the Golden Rule? - ✔✔Treat others as you would have them treat you
When one goes behind Rawl's veil of ignorance, what is one ignorant of? - ✔✔Each person does
not know his/her own gender, race, age, talents, wealth, and so on.
Claims or positive rights - ✔✔impose an obligation on some people to provide certain things for
others
(T/F) Researchers are developing brain-computer interfaces to enable severely handicapped
people to control appliances with their thoughts - ✔✔true
(T/F) It is always wrong to lie would reflect the utilitarian theory of ethics - ✔✔False
(T/F) More people worldwide have access to a cellphone than to a toilet - ✔✔True
A claim right is also known as a _______________. - ✔✔positive right
Which of the following is an example of a negative right of liberty?
-freedom of speech, as provided in the 1st Amendment of the U.S. Constitution
-freedom of religion, as provided in the 1st Amend meant of the U.S. Constitution
-the right to use your labor, skills or mind to create goods and services.
-all of these - ✔✔all of these
(T/F) Wikipedia relies upon an advertising-based business model - ✔✔False
(T/F) Golden rules, such as treat others as we would want them to treat us, can be found in the
Bible. - ✔✔True
Which statement best describes Utilitarianism - ✔✔Main example of consequentialist theory to
increase happiness or "Utility"
A cookie is _______ - ✔✔a file that a Web site stores on a visitor's computer
The Privacy Act of 1974 establishes rules to regulate_________ - ✔✔Federal government
databases only
If a business follows an "opt-in" policy for handling personal data, information about a customer
_________ - ✔✔may not be released unless the customer gives permission
When a person visits a Web site, his or her IP address and the links he or she clicked on are
automatically recorded. This is an example of - ✔✔invisible information gathering
(T/F) In Katz v. United States (1967), the US Supreme Court determined that the government
needs a court order to intrude where a reasonable person had a reasonable expectation of privacy
- ✔✔True
(T/F) "Anticircumvention" and "safe harbor" are the two significant parts of the Digital
Millennium Copyright Act - ✔✔True
(T/F) The brainstorming phase discussed in Chapter 9 can generate long discussions with
humorous and obviously wrong options - ✔✔True
(T/F) All peer-to-peer technologies were found to be illegal as a result of the Napster case. -
✔✔false
Which of the following is not a way for software to be protected against copyright infringement?
- ✔✔make all software free
When was the first U.S. copyright law passed - ✔✔1790
Which one of the following medias has the most First Amendment protections - ✔✔Printing
In one application of a voice-recognition system, the system failed to recognize female speakers.
A likely reason was - ✔✔The program was primarily developed and tested by men
Which of the following requirements was a key provision of the Children's Internet Protection
Act (CIPA) - ✔✔filtering software must be installed on Internet terminals in schools and
libraries
(T/F) Professional ethics requires professionals to maintain their skills - ✔✔True
If the right to be forgotten is a ____________ right (a liberty), it could mean that we may choose
to stay off the Internet and become a recluse, but we cannot force someone else to remove
information about us. - ✔✔negative
There are four factors to consider in deciding whether a use of copyrighted material is a fair use.
Which of the following is not one of those factors? - ✔✔The purpose and nature of the use is
only for nonprofit organizational purposes
What is informed consent? - ✔✔You are aware and agree to the data being collected about you.
(T/F) In Kyllo v. United States (2001), the US Supreme Court ruled that when the government
uses a device that's not in use by the general public to see things it could not without intrusion,
that is a search and requires a warrant - ✔✔True
In the term "Free Software", "free" implies all of the following except one. - ✔✔Free of cost
As a positive right (a _______ right), it allows a person to restrict sharing of information by
others. This can infringe freedom of speech and restrict access to truthful information. -
✔✔claim
There are currently how many imperatives mentioned in the ACM Code? - ✔✔24
The legal guidelines for determining whether material is obscene include all of the following
except - ✔✔the material is intended for or distributed to persons under the age of 18
Which of the following limits deceptive commercial email and outlines spammer's
responsibilities? - ✔✔the CAN-SPAM Act
(T/F) Software designers should include users in the design stages - ✔✔True
Anonymizers allow a user to - ✔✔send email and surf the Web anonymously
The "safe harbor" provisions of _______________ protect Websites from lawsuits and criminal
charges for copyright infringement when users post infringing material - ✔✔Digital Millennium
Copyright Act
One of the reasons the court ruled against Napster was: - ✔✔It knowingly encouraged and
assisted in the infringement of copyrights
(T/F) Copyright law protects processes and inventions, while the patent law protects particular
expression of an idea - ✔✔false
(T/F) In Olmsted v. United States (1928), the US Supreme Court interpreted the 4th Amendment
to apply only to physical intrusion - ✔✔True
(T/F) Lawsuits In 1978 delayed the inept reduction of technology for consumer CD-recording
devices for music - ✔✔false
(T/F)The USA PATRIOT Act (2001) gives individuals more protection from governmental
intrusion - ✔✔False
(T/F) U.S. v. Jones (2012) was the first major case of digital technology surveillance and
involved police attaching a GPS tracking device to a person's vehicle without a search warrant. -
✔✔True
(T/F) The Omnibus Crime Control and Safe Street (1968) explicitly allowed wiretapping and
electronic surveillance by law enforcement agencies with a warrant - ✔✔True
What does the term personal information mean? - ✔✔Any information relating to,or traceable to,
and individual person.
The Communications Assistance for Law Enforcement Act (CALEA) said that -
✔✔telecommunications equipment must be designed to allow the interception of telephone calls
(with a court order)
Broadcast media traditionally has had the strongest First Amendment protection (meaning the
fewest regulatory restrictions) while print media has the weakest First Amendment protection -
✔✔False
(T/F) Miller v. California (1973) ruled that community standards could not play a role in whether
or not material was deemed obscene - ✔✔False
Which one of the media areas has the most First Amendment protection? - ✔✔Print
What areas is covered by the topics of Free Speech? - ✔✔all of these
Many countries have tried to censor the internet. Which country issued the following edict in
2001: The office of communications is ordered to find ways to ensure that the use of the Internet
becomes impossible - ✔✔Afghanistan
(T/F) In 1878, women telephone operators were hired as a result of phone phreakers - ✔✔True
(T/F) A broad interpretation of the Computer Fraud and Abuse Act might criminalize common
activities of millions of people - ✔✔True
(T/F) The term hacker was a creative programmer who wrote very elegant or clever programs
until the 1970s - ✔✔True
(T/F) In it's early years, Internet security was a primary design concern - ✔✔False
Pharming is defined as which of the following? - ✔✔planting false Internet addresses in the
tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed
to a bogus site
Web sites that look attractive to hackers, but are closely monitored so that everything the hacker
does at the site is recorded and studied are known as: - ✔✔Honey pots
Denial-of-Service (DOS) is defined as which of the following - ✔✔an attack in which hackers
overload a target site with requests for information
Libel tourism does NOT have which of the following characteristics? - ✔✔The winning of libel
cases in the U.S. led to England coining the term libel tourism
Which of the following is an example of biometrics - ✔✔all of these
Honey pots is defined as which of the following? - ✔✔Websites that are specifically designed to
be attractive to hackers
(T/F) White hat hackers use their skills to demonstrate system vulnerabilities and improve
security. - ✔✔True
Which of the following factors contribute to security weaknesses? - ✔✔All of these
(T/F) Sony v. Universal City Studios (1984) ruled that private, non-commercial - ✔✔True
(T/F) Almost all hacking is a form of trepass - ✔✔True
Phishing - ✔✔trying to obtain personal information over the internet through email
Smishing - ✔✔Trying to get personal information through text message
Vishing - ✔✔A phishing attack that uses a telephone call instead of using e-mail.
What is Stuxnet? - ✔✔A sophisticated work that targets specific control systems.
The practice of hiring companies or employees in other countries is known as - ✔✔offshoring
The practice of companies in other other countries employing people in the U.S. is known as -
✔✔Inshoring
(T/F) In government agencies, email is a part of the official record and not subject to public
disclosure (with some exceptions) - ✔✔False
(T/F) Roughly half of major companies in the U.S. sometimes monitor the email or voice mail of
their employees on company systems - ✔✔True
(T/F) The Electronic Communications Privacy Act (EPCA) prohibits employers from
intercepting and reading employees' stored email on company systems - ✔✔False
(T/F) Overall, telecommuting reduces productivity, but decreases overhead for employers. -
✔✔False
(T/F) In the 1980's, the AFL-CIO advocated a government ban on all computer at-home work -
✔✔True
Which of the following is NOT a purpose of monitoring employee communications - ✔✔Initiate
complaints of harassment
Which of the following reasons for monitoring email, voice mail, and computer files is
considered legal - ✔✔All of these
(T/F) Telecommuting is more commonly known as working for an employer at a computerequipped space in the employee's home - ✔✔True
Ken Olson, president of Digital Equipment Corp. in the late 1970's, Thomas J. Watson, chairman
of IBM in the early 1940's, and Thomas Edison all made predictions about technology that were
extremely wrong. Which of the following explains why the predictions of experts are often so far
off? - ✔✔all of these
What was the decision of Sega v. Accolade, Inc. (1992)? - ✔✔The court viewed Accolade's
activities as fitting the purpose of fair use— that is to encourage production of new creative work
What is hacktivism? - ✔✔the use of hacking to promote a political cause
Hackers gain access to your computer using - ✔✔Viruses, worms, malware, etc.
What happened in 2000 with a French courts & Yahoo!? - ✔✔Display and sale of Nazi
memorabilia is illegal in France and Germany. French people could view Nazi memorabilia on
Yahoo's US-based auction sites.
Which of the following is NOT a Neo-Luddite criticism of computers - ✔✔none of these
(T/F) Providing new technology to poor countries is a matter of having enough money to buy
equipment. - ✔✔False
(T/F) Simplifications and assumptions are always made when designing a computer model. -
✔✔True
(T/F) Some people active in movements to shrink the digital divide emphasize the need to
provide access in ways appropriate to the local culture. - ✔✔True
(T/F) The term "Luddite" is a description for people who support technological progress -
✔✔False
(T/F) Sweatshop labor is involved in their manufacture is a Luddite criticism of technology -
✔✔True
Digital divide - ✔✔Refers to the fact that some people have access to computers and information
technology while others do not
Technological singularity - ✔✔point at which artificial intelligence or some combined humanmachine intelligence advances so far that we cannot comprehend what lies on the other side
One Laptop Per Child - ✔✔a nonprofit organization that provides computers to children in lessdeveloped parts of the world.
(T/F) U.S. and European pilots are now trained to follow Traffic Collision Avoidance System
(TCAS) instructions even if they conflict with instructions from an air traffic controller. -
✔✔True
Most of the delay in the opening of the Denver International Airport was because of problems
with - ✔✔the baggage handling system
(T/F) Redundancy and self-checking are often present in safety-critical systems. - ✔✔True
(T/F) Legal systems are typically reliable and flexible - ✔✔False
(T/F) A feature of high reliability organizations is rigid structure. - ✔✔False
Which of the following occupations can sometimes cause Repetitive Strain Injuries (RSI) -
✔✔All of these
One of the sources of failure common to BOTH the Therac-25 and the Ariane 5 rocket was -
✔✔reuse of software from previous versions of the systems
[Show More]