asdf Flashcards

1
Q

This is for a law which prohibits making, distributing, or using tools (devices, software, or services) to circumvent technological copyright protection systems.

A

DMCA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This kind of the right is classified as Liberty.

A

Negative Right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is for the law that requires communications companies to design equipment so that it is capable of being tapped.

A

CALEA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This is for the federal commission that regulates trade.

A

FTC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This is for sending millions of emails fishing for information to use to impersonate someone and steal money or goods.

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This device is to detect a potential in-air collision of two planes and directs the pilots to avoid each other.

A

TCAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This is for the Act which establishes oversight rules for the NSA.

A

FISA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This is for the federal commission that regulates communications.

A

FCC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is for an organization operates in difficult environments where failures can have extreme consequences.

A

HRO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is for a law which made it illegal for commercial Web sites to make available to minors material “harmful to minors” as judged by community standards (ruled unconstitutional).

A

COPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A Turing Test determines the strength of an encryption method.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Copyright law protects processes and inventions, while patent law protects the particular expression of an idea.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The USA PATRIOT Act (2001) gives individuals more protection from governmental intrusion.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In Katz v. United States (1967), the U.S. Supreme Court determined that the government needs a court order to intrude where a reasonable person has a reasonable expectation of privacy.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

U.S. v. Jones (2012) was the first major case of digital technology surveillance and involved police attaching a GPS tracking device to a person’s vehicle without a search warrant.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Broadcast media traditionally has had the strongest First Amendment protection (meaning the fewest regulatory restrictions) while print media has the weakest First Amendment protection.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Miller v. California (1973) ruled that community standards could not play a role in whether or not material was deemed obscene.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The government cannot monitor online activity of suspected hackers without a court order.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Sony v. Universal City Studios (1983) ruled that private, non-commercial copying for personal use was fair use.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as

A

honey pots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The legal guidelines for determining whether material is obscene include all of the following EXCEPT

A

the material is intended for or distributed to persons under the age of 18.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Ken Olson, president of Digital Equipment Corp. in the late 1970’s, Thomas J. Watson, chairman of IBM in the early 1940’s, and Thomas Edison all made predictions about technology that were extremely wrong.Which of the following choices to explain why the predictions of experts are often so far off?

A

Lack of imagination about the uses people would find for technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The practice of hiring companies or employees in other countries is known as

A

Offshoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When was the first U.S. copyright law passed?

A

In 1790

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The Privacy Act of 1974 established rules to regulate

A

Federal government databases only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Deontological theories are also called consequentialist theories.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

John Locke rejected the protection of private property as a moral rule.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

In some countries, the governments ban or discourage email services and social networking sites based in the West and set up their own to control. Which one of the following choices is NOT one of these countries?

A

Arkansas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

If a business follows an “opt-in” policy for handling personal data, information about a customer

A

may not be released unless the customer gives permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following is not a factor specified in U.S. copyright law for determining fair use?

A

The for-profit or non-profit status of the copyright holder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following is NOT a principle for producing good systems?

A

Overestimate the costs and time a project will take

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The Communications Assistance for Law Enforcement Act (CALEA) said that

A

telecommunications equipment must be designed to allow the interception of telephone calls (with a court order)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following limits deceptive commercial email and outlines spammers’ responsibilities?

A

the CAN-SPAM Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following is NOT an example of a negative right or liberty?

A

the right to get social security benefits when one gets old for U.S. citizen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

There is less merit in Kant’s principle of universalism and his emphasis on treating people as intrinsically valuable “ends” for it is very difficult to implement.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Ethical theory assumes that people are irrational.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

For John Rawls, an ethical decision for many least-advantaged people should be made better off in long term than those people in the middle level.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

This is for individual and organization who would be affected in some way by an ethical dilemma.

A

stakeholder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

This is for an attack in which hackers overload a target site with requests for information.

A

denial-of-service(DOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

This refers to the fact that some people have access to computers and information technology while others do not.

A

digital divide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

This device is a computerized machine that gave lethal radiation overdoses to some cancer patients in one case study.

A

Therac-25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

This is for a law which requires schools and libraries to install filtering software if they wish to receive federal funds (ruled constitutional).

A

CIPA

42
Q

Sega v. Accolade, Inc. (1992) helped determine that reverse engineering was allowable (fair research use) in order to make a compatible product.

A

True

43
Q

Roughly half of major companies in the U.S. sometimes monitor the email or voice mail of their employees on company systems.

A

True

44
Q

The U.S. Supreme Court ruled that requiring content filters on public library computers was unconstitutional.

A

False

45
Q

The cause of failure in a computer program is often due to more than one factor.

A

True

46
Q

Simplifications and assumptions are always made when designing a computer model.

A

True

47
Q

U.S. and European pilots are now trained to follow Traffic Collision Avoidance System (TCAS) instructions even if they conflict with instructions from an air traffic controller.

A

True

48
Q

Deontologists believe that actions are intrinsically insufficient if they follow from logic only.

A

False

49
Q

Thomas Hobbes views that most people are safe from physical harm, with legal and justice system to ensure the satisfaction of one’s needs.

A

False

50
Q

In one application of a voice-recognition system, the system failed to recognize female speakers. A likely reason was:

A

The program was primarily developed and tested by men

51
Q

Which of the following is not an exclusive right (subject to some exceptions) granted by copyright law?

A

Profit from the work

52
Q

Which of the following requirements was a key provision of the Children’s Internet Protection Act (CIPA)?:

A

filtering software must be installed on Internet terminals in schools and libraries

53
Q

Which of the following is NOT a program used by hackers to gain access to your computer?

A

honeypots

54
Q

Which of the following is NOT a Neo-Luddite criticism of computers?

A

Computers cause people to be united

55
Q

A cookie in Web is

A

a file that a Web site stores on a visitor’s computer

56
Q

Most of the delay in the opening of the Denver International Airport was because of problems with

A

the baggage handling system

57
Q

In the early days of computing (1960’s to the early 1970’s), a “hacker” was

A

A creative programmer who wrote very elegant or clever programs

58
Q

This is for working for an employer at a computer-equipped space in the employee’s home.

A

telecommuting

59
Q

“Inventing Right and Wrong” would reflect this theory of ethics.

A

Utilitarian

60
Q

This is for a law which requires commercial mass e-mail messages to contain opt-out provisions and accurate subject lines.

A

CAN-SPAM Act

61
Q

This is for a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical systems, and activities that involve computers in more than one state.

A

CFAA

62
Q

This is for a law passed to protect children’s privacy online.

A

COPPA

63
Q

This points at which artificial intelligence advances so far that we cannot comprehend what lies on the other side.

A

technological singularity

64
Q

This is for Web sites that are specifically designed to be attractive to hackers.

A

honey pots

65
Q

The Electronic Communications Privacy Act (ECPA) prohibits employers from intercepting and reading employees’ stored email.

A

False

66
Q

More people worldwide have access to a cellphone than to a toilet.

A

True

67
Q

All peer-to-peer technologies were found to be illegal as a result of the Napster case.

A

False

68
Q

In the 1980’s, the AFL-CIO advocated a government ban on all computer at-home work.

A

True

69
Q

Some computer errors are actually system failures, in that it was the human/computer interface which caused the resulting problem.

A

True

70
Q

Computer forensics specialists cannot recover deleted files from an erased disk.

A

false

71
Q

[Baase01] Claim rights or positive rights _______. Select the best answer.

A

impose an obligation on some people to provide certain things for others

72
Q

In the term “Free Software,” “free” implies all of the following except one.

A

Free of cost

73
Q

A positive right to a job means that no one may prohibit you from working positively.

A

False

74
Q

Act utilitarianism is well adapted in practice and pragmatic for computing world of programming.

A

False

75
Q

Utilitarianism provides a set of absolute prohibitions to some actions that many people consider always wrong.

A

False

76
Q

(T or F) Professional ethics requires professionals maintain their skills.

A

True

77
Q

(T or F) Legacy systems are typically reliable, but inflexible.

A

True

78
Q

(T or F) Researchers are developing brain-computer interfaces to enable severely handicapped people to control appliances with their thoughts.

A

True

79
Q

(T or F) Researchers are developing brain-computer interfaces to enable severely handicapped people to control appliances with their thoughts.

A

True

80
Q

(T or F) Wikipedia relies upon an advertising-based business model.

A

False

81
Q

Matching. Select the correct answer matching for the following term or phrase. This device is to detect a potential in-air collision of two planes and directs the pilots to avoid each other.

A

TCAS

82
Q

Matching. Select the correct answer matching for the following acronym. This is for a law which made it illegal for commercial Web sites to make available to minors material “harmful to minors” as judged by community standards (ruled unconstitutional).

A

COPA

83
Q

(T or F) The Omnibus Crime Control and Safe Streets (1968) explicitly allowed wiretapping and electronic surveillance by law enforcement agencies with a warrant.

A

True

84
Q

(T or F) Redundancy and self-checking are often present in safety-critical systems.

A

True

85
Q

(T or F) In Olmsted v. United States (1928), the U.S. Supreme Court interpreted the Fourth Amendment to apply only to physical intrusion.

A

True

86
Q

Matching. Select the correct answer matching for the following term or phrase. This is for moving part of a business’s operation to another country.

A

offshoring

87
Q

Which of the following are the two main arguments against the Communications Decency Act accepted by the courts?

A

it was too vague and broad, and it did not use the least restrictive means of accomplishing the goal of protecting children

88
Q

One of the sources of failure common to BOTH the Therac-25 and the Ariane 5 rocket was _____.

A

reuse of software from previous versions of the systems

89
Q

One of the reasons the court ruled against Napster was ____.

A

It knowingly encouraged and assisted in the infringement of copyrights

90
Q

Matching. Select the correct answer matching for the following term, phrase or sentence. This kind of the right is also classified as Claim Right.

A

Positive Right

91
Q

Matching. Select the correct answer matching for the following term, phrase or sentence. This kind of the right is also classified as Claim Right.

A

Positive Right

92
Q

Anonymizers allow a user to ______.

A

send email and surf the Web anonymously

93
Q

(T or F) A feature of high reliability organizations is loose structure.

A

True

94
Q

(T or F) Software designers should include users in the design stages.

A

True

95
Q

A good (copyright) law will set maximal standards for all so that it can be applied to all situations, leaving a minimal range of unclear or uncertain choices.

A

False

96
Q

Kant follows rules of behavior, individually unique or sensitive to a person. Kant argued that it is possible to lie, to achieve good.

A

False

97
Q

Negative rights are also called claim rights in descriptive term.

A

False

98
Q

An example of negative right is that of authoritarian governments to restrict or deny free or unlimited use of Internet.

A

False

99
Q

Utilitarianism believes that an action should be universally same in utility for all people.

A

False

100
Q

Behaving ethically is usually practical because we often lie or break promises.

A

False

101
Q

John Rawls insists that that a proper political system can and should settle for the views of one group on another by means of democratic voting, capitalistic or even authoritative power.

A

False

102
Q

The tool of “behind the veil of ignorance” is useful and it is proven to be absolute or very close.

A

False