Unit 1 Fund. Of Comp. Flashcards
(36 cards)
The Ten Dos and Dont’s of Computer Ethics include guidelines such as NOT
using a computer to harm others.
True
False
True
Which of the following is considered an unethical practice in information
technology?
-Using company resources for work-related purposes only
-Completing personal tasks on company time
-Following the guidelines of the Code of Ethics
-Reporting security breaches promptly
Completing personal tasks on company time
Open-source licenses and free software licenses both focus on the availability
of the source code and the freedom to modify and share it.
True
False
False
Which U.S. law is considered the cornerstone of many computer-related federal
laws and enforcement efforts?
-Identity Theft and Assumption Deterrence Act of 1998
-Federal Privacy Act of 1974
-Computer Fraud and Abuse Act of 1986
-Computer Security Act of 1987
Computer Fraud and Abuse Act of 1986
The Federal Privacy Act of 1974 regulates government agencies but exempts
certain agencies from some regulations to protect health or safety.
True
False
True
Which of the following is the primary difference between fair use and open
source?
-Fair use is governed by international law, while open source is
governed by national laws
-Fair use allows for the distribution of copyrighted material without
permission, while open source focuses on the availability of source
code
-Fair use applies only to written works, while open source applies to
software development
-Fair use restricts the modification of copyrighted material, while
open source encourages modification and redistribution
Fair use restricts the modification of copyrighted material, while
open source encourages modification and redistribution
Which type of trademark requires examination, approval and registration with
the Trademark Office?
-Common-law trademark
-Collective trademark
-Service mark
-Registered trademark
Registered Trademark
The Computer Security Act of 1987 aimed to improve the security and privacy
of sensitive information in federal computer systems.
True
False
True
When a person claims a colleague’s work as their own achievement, what is the
likely cause of the unethical behavior?
-Ignorance
-Laziness
-Ambition
-Pressure
Ambition
Which of the following is defamation which is spoken?
-Libel
-Phishing
-Slander
-Cyberbully
Slander
Which of the following is also called a confidentiality agreement?
-Non-disclosure agreement
-Creative Commons license
-Patent
-Intellectual property agreement
Non-disclosure Agreement
Which of the following types of Creative Commons license adds the restriction
which no derivative works may be made from the original?
-CC-BY-NC
-CC-BY-NC-ND
-CC-BY
-CC-BY-ED
CC-BY-NC-ND
How long does a patent usually last in the United States?
-50 years
-20 years
-40 years
-10 years
20 Years
Which of the following is a trademark automatically received by an organization
when a symbol is being consistently used in the normal course of business?
-Open-source trademark
-Common-law trademark
-Common-license trademark
-Registered trademark
Common Law Trademark
How long does a copyright last?
-The life of the original author
-50 years
-The life of the original author -plus 70 years
-70 years
The life of the original author plus 70 years.
Which of the following organizations expanded the definition of identity theft?
-Federal Trade Commission
-Federal courts
-National Archives and Records Administration
-Bureau of Credit Reporting
Federal Trade Commission
Which of the following laws prohibits accessing a computer without
authorization or in excess of authorization?
-Identity Theft and Assumption Deterrence Act of 1998
-Computer Fraud and Abuse Act of 1986
-Computer Security Act of 1987
-Federal Privacy Act of 1974
Computer Fraud and Abuse Act of 1986
When a person plagiarizes another’s work to meet a deadline, what is the cause
of the unethical behavior?
-Ambition
-Ignorance
-Pressure
-Intent
Pressure
Which of the following is the act of damaging or attacking the reputation of
someone or something in a malicious or false way?
-Phishing
-Privacy invasion
-Cyberbully
-Defamation
Defamation
Which of the following is a symbol identifying a particular source of goods or
services from others?
-Creative Common license
-Copyright
-Patent
-Trademark
Trademark
Which of the following laws establishes a Code of Fair Information Practice?
-Federal Privacy Act of 1974
-Computer Fraud and Abuse Act of 1986
-Computer Security Act of 1987
-Identity Theft and Assumption Deterrence Act of 1998
Federal Privacy act of 1974
Which of the following laws aimed to improve the security and privacy of
sensitive information in federal computer systems?
-Identity Theft and Assumption -Deterrence Act of 1998
-Federal Privacy Act of 1974
-Computer Fraud and Abuse Act of 1986
-Computer Security Act of 1987
Computer Security Act of 1987
Which of the following terms best describes the rules members of a society
create to balance individual rights to self-determination against the needs of the
society as a whole?
-Laws
-Ethics
-Policies
-Regulations
Laws
Which of the following describes information literacy?
-The ability to find, evaluate and use information effectively and
ethically
-Using content online and sharing on digital platforms
-Creating and sharing information
-Sharing personal information online
The ability to find, evaluate and use information effectively and ethically