GEE PRELIMS PART 2 Flashcards

(42 cards)

1
Q

Messages embedded in files transferred between computers

A

Email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Uniquely identifies cyberspace mailbox
Format: user @ domain

A

Email address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the set of all mail servers and connectors within a company or organization.

A

Network Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Unsolicited, bulk email

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Senders and receivers do not derive equal benefit from emails.

A

Social contract theory evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Innocent users are used as a means for an end (eliminating spams

A

Kantian evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Blacklisting will affect innocent users, receivers, and marketing firms, this will reduce the benefits of internet utility as a whole.

A

Utilitarian evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A website that allows the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language.

A

Wiki

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

usually maintained by an individual with regular entries of commentary.

A

Blogs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DIRECT CENSORSHIP

A

Government monopolization
Prepublication review
Licensing and registration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The most common form of censorship

A

SELF-CENSORSHIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Used for movies, TV shows, CDs, and video games

A

RATING SYSTEMS CENSORSHIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CHALLENGES POSED BY THE INTERNET

A

Many-to-Many Communication
Dynamic Connections
Huge Number of Websites
Global Reach
Age Verification Issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

shutting down a website is difficult due to millions of contributors

A

Many-to-Many Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Millions of new PCs connect to the internet each year

A

Dynamic Connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

No feasible way to monitor all content

A

Huge Number of Websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Extends beyond national borders and laws

18
Q

Adult websites cannot reliably confirm a user’s age

A

Age Verification Issues

19
Q

3 ETHICAL PERSPECTIVES ON CENSORSHIP

A

Kant on Censorship
Mill on Censorship
Mill’s Principle of Harm

20
Q

Believed in “having the courage to use your own reason”

A

Kant on Censorship

21
Q

No one is infallible; even unpopular opinions may contain a kernel of truth

A

Mill on Censorship

22
Q

Government intervention is justified only to prevent harm to others

A

Mill’s Principle of Harm

23
Q

Software prevents display of certain websites

A

Web Filtering

24
Q

Introduced to enhance child safety online

A

Child Internet Protection Acts

25
2 types of FILTERING METHOD
Blacklist approach Content analysis
26
Blocks objectionable sites
Blacklist approach
27
Scans for objectionable words/phrases
Content analysis
28
CYBER SECURITY THREATS
Identity Theft Phishing Chat Room Predators
29
Occurs when someone steals another person’s digital identity
Identity Theft
30
Fake emails or websites deceive users into revealing personal information
Phishing
31
Real-time discussions in chat rooms and IMs used to lure children
Chat Room Predators
32
refers to measures used by digital content owners to protect intellectual property rights.
DIGITAL RIGHTS MANAGEMENT (DRM)
33
a transient (temporary) network connecting computers running the same networking software.
PEER-TO-PEER (P2P) NETWORKS
34
Launched in 1999 as a peer-to-peer music-sharing service.
NAPSTER
35
Broadband connections have ____ download speeds but ____ upload speeds.
fast download, slow upload
36
Examples of Open-Source Software
BIND Apache Sendmail Programming Languages & Frameworks GNU Compilers
37
DNS server for the internet
BIND
38
Powers half of web servers
Apache
39
Perl, Python, Ruby, TCL/TK, PHP, Zope
Programming Languages & Frameworks
40
Email transfer agent
Sendmail
41
Supports C, C++, Objective-C, Fortran, Java, and Ada
GNU Compilers
42
IMPACT OF OPEN-SOURCE SOFTWARE
Quality concerns Fragmentation risk Weaker graphical user interfaces Weak incentives for innovation