Computer Science > QUESTIONS & ANSWERS > CIS 3250 Exam 3 Leach FSU (All)
CIS 3250 Exam 3 Leach FSU Which of the following occupations can sometimes cause Repetitive Strain Injuries (RSI)? - ✔✔All of these (computer programmer, sign-language interpreter for the deaf, ... musician) A feature of high reliability organizations is rigid structure. - ✔✔False Legacy systems are typically reliable and flexible. - ✔✔False One of the sources of failure common to BOTH the Therac-25 and the Ariane 5 rocket was - ✔✔reuse of software from previous versions of the systems Most of the delay in the opening of the Denver International Airport was because of problems with - ✔✔the baggage handling system Which of the following is NOT a Neo-Luddite criticism of computers? - ✔✔None of these Ken Olson, president of Digital Equipment Corp. in the late 1970's, Thomas J. Watson, chairman of IBM in the early 1940's, and Thomas Edison all made predictions about technology that were extremely wrong. Which of the following explains why the predictions of experts are often so far off? - ✔✔All of these Providing new technology to poor countries is a matter of having enough money to buy equipment. - ✔✔False Sweatshop labor is involved in their manufacture is a Luddite criticism of technology - ✔✔True Some people active in movements to shrink the digital divide emphasize the need to provide access in ways appropriate to the local culture. - ✔✔True Simplifications and assumptions are always made when designing a computer model. - ✔✔True The term "Luddite" is a description for people who support technological progress - ✔✔False White hat hackers use their skills to demonstrate system vulnerabilities and improve security. - ✔✔True Phone phreaking is a form of hacking that involves manipulating the telephone system. - ✔✔True In its early years, Internet security was a primary design concern. - ✔✔False The term hacker was a creative programmer who wrote very elegant or clever programs until the 1970s. - ✔✔True Phishing is defined as which of the following? - ✔✔sending millions of emails requesting information to use to impersonate someone and steal money or goods Libel tourism does NOT have which of the following characteristics?` - ✔✔The winning of libel cases in the U.S. led to England coining the term libel tourism In 1999, a French court ordered Yahoo! to block access by French people to - ✔✔online auction sites containing Nazi materials Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as: - ✔✔Honey pots Which of the following is an example of biometrics: - ✔✔All of these Honey pots is defined as which of the following? - ✔✔Websites that are specifically designed to be attractive to hackers Which of the following is NOT a purpose of monitoring employee communications? - ✔✔Initiate complaints of harassment The practice of hiring companies or employees in other countries is known as: - ✔✔Offshoring The Electronic Communications Privacy Act (ECPA) prohibits employers from intercepting and reading employees' stored email on company systems. - ✔✔False Which of the following reasons for monitoring email, voice mail, and computer files is considered legal? - ✔✔All of these In government agencies, email is part of the official record and not subject to public disclosure (with some exceptions). - ✔✔True Roughly half of major companies in the U.S. sometimes monitor the email or voice mail of their employees on company systems. - ✔✔True Telecommuting is most commonly known as working for an employer at a computer-equipped space in the employee's home.. - ✔✔True Overall, telecommuting reduces productivity, but decreases overhead for employers. - ✔✔False In the 1980's, the AFL-CIO advocated a government ban on all computer at-home work. - ✔✔True The practice of companies in other countries employing people in the U.S. is known as: - ✔✔Inshoring The "safe harbor" provisions of _______________ protect Websites from lawsuits and criminal charges for copyright infringement when users post infringing material. - ✔✔Digital Millennium Copyright Act Which of the following is not an exclusive right (subject to some exceptions) granted by copyright law? - ✔✔Profit from the work In the term "Free Software", "free" implies all of the following except one. Which one? - ✔✔Free of cost When was the first U.S. copyright law passed? - ✔✔In 1790 There are four factors to consider in deciding whether a use of copyrighted material is a fair use. Which of the following is not one of those factors? - ✔✔The purpose and nature of the use is only for nonprofit organizational purposes Which of the following is not a factor specified in U.S. copyright law for determining fair use? - ✔✔The for-profit or non-profit status of the copyright holder Copyright law protects processes and inventions, while patent law protects the particular expression of an idea. - ✔✔False "Anticircumvention" and "safe harbor" are the two significant parts of the Digital Millennium Copyright Act. - ✔✔True Sega v. Accolade, Inc. (1992) helped determine that reverse engineering was allowable (fair research use) in order to make a compatible product. - ✔✔True All peer-to-peer technologies were found to be illegal as a result of the Napster case. - ✔✔False The legal guidelines for determining whether material is obscene include all of the following EXCEPT - ✔✔the material is intended for or distributed to persons under the age of 18 Which of the following limits deceptive commercial email and outlines spammers' responsibilities: - ✔✔the CAN-SPAM Act Which one of the media areas has the most First Amendment protection? - ✔✔Print What areas is covered by the topics of Free Speech? - ✔✔All of these Anonymizers allow a user to - ✔✔send email and surf the Web anonymously The Privacy Act of 1974 established rules to regulate _________ - ✔✔Federal government databases only A cookie is - ✔✔a file that a Web site stores on a visitor's computer The Communications Assistance for Law Enforcement Act (CALEA) said that - ✔✔telecommunications equipment must be designed to allow the interception of telephone calls (with a court order) If a business follows an "opt-in" policy for handling personal data, information about a customer __________ - ✔✔may not be released unless the customer gives permission In Katz v. United States (1967), the U.S. Supreme Court determined that the government needs a court order to intrude where a reasonable person has a reasonable expectation of privacy. - ✔✔True In Kyllo v. United States (2001), the U.S. Supreme Court ruled that when the government uses a device that's not in use by the general public to 'see' things it could not without intrusion, that is a 'search' and requires a warrant. - ✔✔True The USA PATRIOT Act (2001) gives individuals more protection from governmental intrusion. - ✔✔False U.S. v. Jones (2012) was the first major case of digital technology surveillance and involved police attaching a GPS tracking device to a person's vehicle without a search warrant. - ✔✔True If the right to be forgotten is a ____________ right (a liberty), it could mean that we may choose to stay off the Internet and become a recluse, but we cannot force someone else to remove information about us. - ✔✔Negative As a positive right (a _______ right), it allows a person to restrict sharing of information by others. This can infringe freedom of speech and restrict access to truthful information. - ✔✔Claim Software designers should include users in the design stages. - ✔✔True Professional ethics requires professionals to maintain their skills. - ✔✔True The brainstorming phase discussed in Chapter 9 can generate long discussion with humorous and obviously wrong options. - ✔✔True In one application of a voice-recognition system, the system failed to recognize female speakers. A likely reason was - ✔✔The program was primarily developed and tested by men There are currently how many imperatives mentioned in the ACM Code? - ✔✔24 A claim right is also known as a _______________. - ✔✔Positive right Claim rights or positive rights - ✔✔impose an obligation on some people to provide certain things for others Accelerometers help robots stay upright. - ✔✔True Generally, a deontologist would be more comfortable breaking a rule in circumstances where doing so would have good consequences. - ✔✔False It is always wrong to lie would reflect the utilitarian theory of ethics. - ✔✔False Golden rules, such as treat others as we would want them to treat us, can be found in the Bible. - ✔✔True What statement best describes Utilitarianism. - ✔✔Main example of a consequentialist theory to increase happiness or "Utility". Wikipedia relies upon an advertising-based business model. - ✔✔False Researchers are developing brain-computer interfaces to enable severely handicapped people to control appliances with their thoughts. - ✔✔True A Turing Test determines the strength of an encryption method. - ✔✔False [Show More]
Last updated: 2 years ago
Preview 1 out of 10 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Jan 28, 2023
Number of pages
10
Written in
All
This document has been written for:
Uploaded
Jan 28, 2023
Downloads
0
Views
164
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·