Computer Science > QUESTIONS & ANSWERS > CIS 3250 FSU Exam II (All)
CIS 3250 FSU Exam II A negative right is also known as _______ - ✔✔liberty (T/F) Accelerometers help robots stay upright. - ✔✔True (T/F) A Turing Test determines the strength of an encrypti ... on method. - ✔✔False (T/F) Generally, a deontologist would be more comfortable breaking a rule in circumstances where doing so would have good consequences. - ✔✔False Select an application referenced in the book for speech recognition. - ✔✔All of the above What is the Golden Rule? - ✔✔Treat others as you would have them treat you When one goes behind Rawl's veil of ignorance, what is one ignorant of? - ✔✔Each person does not know his/her own gender, race, age, talents, wealth, and so on. Claims or positive rights - ✔✔impose an obligation on some people to provide certain things for others (T/F) Researchers are developing brain-computer interfaces to enable severely handicapped people to control appliances with their thoughts - ✔✔true (T/F) It is always wrong to lie would reflect the utilitarian theory of ethics - ✔✔False (T/F) More people worldwide have access to a cellphone than to a toilet - ✔✔True A claim right is also known as a _______________. - ✔✔positive right Which of the following is an example of a negative right of liberty? -freedom of speech, as provided in the 1st Amendment of the U.S. Constitution -freedom of religion, as provided in the 1st Amend meant of the U.S. Constitution -the right to use your labor, skills or mind to create goods and services. -all of these - ✔✔all of these (T/F) Wikipedia relies upon an advertising-based business model - ✔✔False (T/F) Golden rules, such as treat others as we would want them to treat us, can be found in the Bible. - ✔✔True Which statement best describes Utilitarianism - ✔✔Main example of consequentialist theory to increase happiness or "Utility" A cookie is _______ - ✔✔a file that a Web site stores on a visitor's computer The Privacy Act of 1974 establishes rules to regulate_________ - ✔✔Federal government databases only If a business follows an "opt-in" policy for handling personal data, information about a customer _________ - ✔✔may not be released unless the customer gives permission When a person visits a Web site, his or her IP address and the links he or she clicked on are automatically recorded. This is an example of - ✔✔invisible information gathering (T/F) In Katz v. United States (1967), the US Supreme Court determined that the government needs a court order to intrude where a reasonable person had a reasonable expectation of privacy - ✔✔True (T/F) "Anticircumvention" and "safe harbor" are the two significant parts of the Digital Millennium Copyright Act - ✔✔True (T/F) The brainstorming phase discussed in Chapter 9 can generate long discussions with humorous and obviously wrong options - ✔✔True (T/F) All peer-to-peer technologies were found to be illegal as a result of the Napster case. - ✔✔false Which of the following is not a way for software to be protected against copyright infringement? - ✔✔make all software free When was the first U.S. copyright law passed - ✔✔1790 Which one of the following medias has the most First Amendment protections - ✔✔Printing In one application of a voice-recognition system, the system failed to recognize female speakers. A likely reason was - ✔✔The program was primarily developed and tested by men Which of the following requirements was a key provision of the Children's Internet Protection Act (CIPA) - ✔✔filtering software must be installed on Internet terminals in schools and libraries (T/F) Professional ethics requires professionals to maintain their skills - ✔✔True If the right to be forgotten is a ____________ right (a liberty), it could mean that we may choose to stay off the Internet and become a recluse, but we cannot force someone else to remove information about us. - ✔✔negative There are four factors to consider in deciding whether a use of copyrighted material is a fair use. Which of the following is not one of those factors? - ✔✔The purpose and nature of the use is only for nonprofit organizational purposes What is informed consent? - ✔✔You are aware and agree to the data being collected about you. (T/F) In Kyllo v. United States (2001), the US Supreme Court ruled that when the government uses a device that's not in use by the general public to see things it could not without intrusion, that is a search and requires a warrant - ✔✔True In the term "Free Software", "free" implies all of the following except one. - ✔✔Free of cost As a positive right (a _______ right), it allows a person to restrict sharing of information by others. This can infringe freedom of speech and restrict access to truthful information. - ✔✔claim There are currently how many imperatives mentioned in the ACM Code? - ✔✔24 The legal guidelines for determining whether material is obscene include all of the following except - ✔✔the material is intended for or distributed to persons under the age of 18 Which of the following limits deceptive commercial email and outlines spammer's responsibilities? - ✔✔the CAN-SPAM Act (T/F) Software designers should include users in the design stages - ✔✔True Anonymizers allow a user to - ✔✔send email and surf the Web anonymously The "safe harbor" provisions of _______________ protect Websites from lawsuits and criminal charges for copyright infringement when users post infringing material - ✔✔Digital Millennium Copyright Act One of the reasons the court ruled against Napster was: - ✔✔It knowingly encouraged and assisted in the infringement of copyrights (T/F) Copyright law protects processes and inventions, while the patent law protects particular expression of an idea - ✔✔false (T/F) In Olmsted v. United States (1928), the US Supreme Court interpreted the 4th Amendment to apply only to physical intrusion - ✔✔True (T/F) Lawsuits In 1978 delayed the inept reduction of technology for consumer CD-recording devices for music - ✔✔false (T/F)The USA PATRIOT Act (2001) gives individuals more protection from governmental intrusion - ✔✔False (T/F) U.S. v. Jones (2012) was the first major case of digital technology surveillance and involved police attaching a GPS tracking device to a person's vehicle without a search warrant. - ✔✔True (T/F) The Omnibus Crime Control and Safe Street (1968) explicitly allowed wiretapping and electronic surveillance by law enforcement agencies with a warrant - ✔✔True What does the term personal information mean? - ✔✔Any information relating to,or traceable to, and individual person. The Communications Assistance for Law Enforcement Act (CALEA) said that - ✔✔telecommunications equipment must be designed to allow the interception of telephone calls (with a court order) Broadcast media traditionally has had the strongest First Amendment protection (meaning the fewest regulatory restrictions) while print media has the weakest First Amendment protection - ✔✔False (T/F) Miller v. California (1973) ruled that community standards could not play a role in whether or not material was deemed obscene - ✔✔False Which one of the media areas has the most First Amendment protection? - ✔✔Print What areas is covered by the topics of Free Speech? - ✔✔all of these Many countries have tried to censor the internet. Which country issued the following edict in 2001: The office of communications is ordered to find ways to ensure that the use of the Internet becomes impossible - ✔✔Afghanistan (T/F) In 1878, women telephone operators were hired as a result of phone phreakers - ✔✔True (T/F) A broad interpretation of the Computer Fraud and Abuse Act might criminalize common activities of millions of people - ✔✔True (T/F) The term hacker was a creative programmer who wrote very elegant or clever programs until the 1970s - ✔✔True (T/F) In it's early years, Internet security was a primary design concern - ✔✔False Pharming is defined as which of the following? - ✔✔planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as: - ✔✔Honey pots Denial-of-Service (DOS) is defined as which of the following - ✔✔an attack in which hackers overload a target site with requests for information Libel tourism does NOT have which of the following characteristics? - ✔✔The winning of libel cases in the U.S. led to England coining the term libel tourism Which of the following is an example of biometrics - ✔✔all of these Honey pots is defined as which of the following? - ✔✔Websites that are specifically designed to be attractive to hackers (T/F) White hat hackers use their skills to demonstrate system vulnerabilities and improve security. - ✔✔True Which of the following factors contribute to security weaknesses? - ✔✔All of these (T/F) Sony v. Universal City Studios (1984) ruled that private, non-commercial - ✔✔True (T/F) Almost all hacking is a form of trepass - ✔✔True Phishing - ✔✔trying to obtain personal information over the internet through email Smishing - ✔✔Trying to get personal information through text message Vishing - ✔✔A phishing attack that uses a telephone call instead of using e-mail. What is Stuxnet? - ✔✔A sophisticated work that targets specific control systems. The practice of hiring companies or employees in other countries is known as - ✔✔offshoring The practice of companies in other other countries employing people in the U.S. is known as - ✔✔Inshoring (T/F) In government agencies, email is a part of the official record and not subject to public disclosure (with some exceptions) - ✔✔False (T/F) Roughly half of major companies in the U.S. sometimes monitor the email or voice mail of their employees on company systems - ✔✔True (T/F) The Electronic Communications Privacy Act (EPCA) prohibits employers from intercepting and reading employees' stored email on company systems - ✔✔False (T/F) Overall, telecommuting reduces productivity, but decreases overhead for employers. - ✔✔False (T/F) In the 1980's, the AFL-CIO advocated a government ban on all computer at-home work - ✔✔True Which of the following is NOT a purpose of monitoring employee communications - ✔✔Initiate complaints of harassment Which of the following reasons for monitoring email, voice mail, and computer files is considered legal - ✔✔All of these (T/F) Telecommuting is more commonly known as working for an employer at a computerequipped space in the employee's home - ✔✔True Ken Olson, president of Digital Equipment Corp. in the late 1970's, Thomas J. Watson, chairman of IBM in the early 1940's, and Thomas Edison all made predictions about technology that were extremely wrong. Which of the following explains why the predictions of experts are often so far off? - ✔✔all of these What was the decision of Sega v. Accolade, Inc. (1992)? - ✔✔The court viewed Accolade's activities as fitting the purpose of fair use— that is to encourage production of new creative work What is hacktivism? - ✔✔the use of hacking to promote a political cause Hackers gain access to your computer using - ✔✔Viruses, worms, malware, etc. What happened in 2000 with a French courts & Yahoo!? - ✔✔Display and sale of Nazi memorabilia is illegal in France and Germany. French people could view Nazi memorabilia on Yahoo's US-based auction sites. Which of the following is NOT a Neo-Luddite criticism of computers - ✔✔none of these (T/F) Providing new technology to poor countries is a matter of having enough money to buy equipment. - ✔✔False (T/F) Simplifications and assumptions are always made when designing a computer model. - ✔✔True (T/F) Some people active in movements to shrink the digital divide emphasize the need to provide access in ways appropriate to the local culture. - ✔✔True (T/F) The term "Luddite" is a description for people who support technological progress - ✔✔False (T/F) Sweatshop labor is involved in their manufacture is a Luddite criticism of technology - ✔✔True Digital divide - ✔✔Refers to the fact that some people have access to computers and information technology while others do not Technological singularity - ✔✔point at which artificial intelligence or some combined humanmachine intelligence advances so far that we cannot comprehend what lies on the other side One Laptop Per Child - ✔✔a nonprofit organization that provides computers to children in lessdeveloped parts of the world. (T/F) U.S. and European pilots are now trained to follow Traffic Collision Avoidance System (TCAS) instructions even if they conflict with instructions from an air traffic controller. - ✔✔True Most of the delay in the opening of the Denver International Airport was because of problems with - ✔✔the baggage handling system (T/F) Redundancy and self-checking are often present in safety-critical systems. - ✔✔True (T/F) Legal systems are typically reliable and flexible - ✔✔False (T/F) A feature of high reliability organizations is rigid structure. - ✔✔False Which of the following occupations can sometimes cause Repetitive Strain Injuries (RSI) - ✔✔All of these One of the sources of failure common to BOTH the Therac-25 and the Ariane 5 rocket was - ✔✔reuse of software from previous versions of the systems [Show More]
Last updated: 2 years ago
Preview 1 out of 14 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Jan 28, 2023
Number of pages
14
Written in
All
This document has been written for:
Uploaded
Jan 28, 2023
Downloads
0
Views
110
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·