Unit 1 Fund. Of Comp. Flashcards

(36 cards)

1
Q

The Ten Dos and Dont’s of Computer Ethics include guidelines such as NOT
using a computer to harm others.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is considered an unethical practice in information
technology?
-Using company resources for work-related purposes only
-Completing personal tasks on company time
-Following the guidelines of the Code of Ethics
-Reporting security breaches promptly

A

Completing personal tasks on company time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Open-source licenses and free software licenses both focus on the availability
of the source code and the freedom to modify and share it.

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which U.S. law is considered the cornerstone of many computer-related federal
laws and enforcement efforts?

-Identity Theft and Assumption Deterrence Act of 1998
-Federal Privacy Act of 1974
-Computer Fraud and Abuse Act of 1986
-Computer Security Act of 1987

A

Computer Fraud and Abuse Act of 1986

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Federal Privacy Act of 1974 regulates government agencies but exempts
certain agencies from some regulations to protect health or safety.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is the primary difference between fair use and open
source?
-Fair use is governed by international law, while open source is
governed by national laws
-Fair use allows for the distribution of copyrighted material without
permission, while open source focuses on the availability of source
code
-Fair use applies only to written works, while open source applies to
software development
-Fair use restricts the modification of copyrighted material, while
open source encourages modification and redistribution

A

Fair use restricts the modification of copyrighted material, while
open source encourages modification and redistribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of trademark requires examination, approval and registration with
the Trademark Office?

-Common-law trademark
-Collective trademark
-Service mark
-Registered trademark

A

Registered Trademark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Computer Security Act of 1987 aimed to improve the security and privacy
of sensitive information in federal computer systems.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When a person claims a colleague’s work as their own achievement, what is the
likely cause of the unethical behavior?

-Ignorance
-Laziness
-Ambition
-Pressure

A

Ambition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is defamation which is spoken?

-Libel
-Phishing
-Slander
-Cyberbully

A

Slander

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is also called a confidentiality agreement?

-Non-disclosure agreement
-Creative Commons license
-Patent
-Intellectual property agreement

A

Non-disclosure Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following types of Creative Commons license adds the restriction
which no derivative works may be made from the original?

-CC-BY-NC
-CC-BY-NC-ND
-CC-BY
-CC-BY-ED

A

CC-BY-NC-ND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How long does a patent usually last in the United States?

-50 years
-20 years
-40 years
-10 years

A

20 Years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is a trademark automatically received by an organization
when a symbol is being consistently used in the normal course of business?

-Open-source trademark
-Common-law trademark
-Common-license trademark
-Registered trademark

A

Common Law Trademark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How long does a copyright last?

-The life of the original author
-50 years
-The life of the original author -plus 70 years
-70 years

A

The life of the original author plus 70 years.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following organizations expanded the definition of identity theft?
-Federal Trade Commission
-Federal courts
-National Archives and Records Administration
-Bureau of Credit Reporting

A

Federal Trade Commission

17
Q

Which of the following laws prohibits accessing a computer without
authorization or in excess of authorization?

-Identity Theft and Assumption Deterrence Act of 1998
-Computer Fraud and Abuse Act of 1986
-Computer Security Act of 1987
-Federal Privacy Act of 1974

A

Computer Fraud and Abuse Act of 1986

18
Q

When a person plagiarizes another’s work to meet a deadline, what is the cause
of the unethical behavior?

-Ambition
-Ignorance
-Pressure
-Intent

19
Q

Which of the following is the act of damaging or attacking the reputation of
someone or something in a malicious or false way?

-Phishing
-Privacy invasion
-Cyberbully
-Defamation

20
Q

Which of the following is a symbol identifying a particular source of goods or
services from others?

-Creative Common license
-Copyright
-Patent
-Trademark

21
Q

Which of the following laws establishes a Code of Fair Information Practice?

-Federal Privacy Act of 1974
-Computer Fraud and Abuse Act of 1986
-Computer Security Act of 1987
-Identity Theft and Assumption Deterrence Act of 1998

A

Federal Privacy act of 1974

22
Q

Which of the following laws aimed to improve the security and privacy of
sensitive information in federal computer systems?

-Identity Theft and Assumption -Deterrence Act of 1998
-Federal Privacy Act of 1974
-Computer Fraud and Abuse Act of 1986
-Computer Security Act of 1987

A

Computer Security Act of 1987

23
Q

Which of the following terms best describes the rules members of a society
create to balance individual rights to self-determination against the needs of the
society as a whole?

-Laws
-Ethics
-Policies
-Regulations

24
Q

Which of the following describes information literacy?

-The ability to find, evaluate and use information effectively and
ethically
-Using content online and sharing on digital platforms
-Creating and sharing information
-Sharing personal information online

A

The ability to find, evaluate and use information effectively and ethically

25
Which of the following is the primary goal of fact-checking resources? -To promote specific political agendas -To create and spread information -To limit the use of electronic media -To help users determine the accuracy of information
To help users determine the accuracy of information
26
Which of the following is NOT a strategy for determining the reliability of information? -Considering the date of the information -Looking for multiple sources -Checking the source -Dismissing biases
Dismissing Biases
27
Which of the following best describes digital citizenship? -Using the internet for personal entertainment -The responsible and appropriate use of technology and the internet -Sharing personal information online -Posting comments or reviews -about others
The responsible use of technology and the internet
28
Which of the following is an example of cyberbullying? -Disagreeing with someone’s opinion on social media -Posting an embarrassing photo of a friend without their permission -Posting a comment about a friend on social media -Posting about a celebrity on social media
Posting and embarrassing photo of a friend without their permission
29
Which of the following is the purpose of fact-checking websites? -To provide an opinion on current events -To provide a list of credible sources for research -To promote a specific political agenda -To check the accuracy of claims made in news articles and other sources
To check the accuracy of claims made in news articles and other sources
30
Which of the following is an important factor to consider when using a fact- checking website? -The website’s affiliation with a political party -The website’s sources for its claims -The website’s clear bias -If the website is a non-profit or commercial organization
The website's sources for its claims
31
Which of the following has the highest authentication setup? -Face recognition -Vein scanner -Password -Two-factor authentication
Vein Scanner
32
Which of the following can compromise the availability of information? -Hardware failure -Cyberattacks -All the answer choices are correct -Malware
All the answer choices are correct
33
How do businesses typically pay ransom? -Cash on hand -Employee salaries -Business line of credit -Insurance
Insurance
34
It is very easy to identify where ransomware, placed on a computer system, originates. -True -False
False
35
What could happen to a business experiencing a ransomware attack where no useable backup files are available? -Data analyst insurance providers will recover the files for the business -Restore the system to the factory settings which is free of ransomware -Ransomware deletes all files from the network -Pay the ransom to access the files
Pay the ransom to access the files
36
How can users avoid ransomware? -Storing your files on a different network -Having good backups of your files -Storing your files somewhere other than your physical machine -All of the answer choices are correct
All of the answer choices are correct