Computer Science  >  QUESTIONS & ANSWERS  >  CIS 3250 Exam 1 (Ch.1-4, 9 & Appendix A) (All)

CIS 3250 Exam 1 (Ch.1-4, 9 & Appendix A)

Document Content and Description Below

CIS 3250 Exam 1 (Ch.1-4, 9 & Appendix A) Claim rights or positive rights - ✔✔impose an obligation on some people to provide certain things for others Generally, a deontologist would be more co ... mfortable breaking a rule in circumstances where doing so would have good consequences. - ✔✔False More people worldwide have access to a cellphone than to a toilet. - ✔✔True It is always wrong to lie would reflect the utilitarian theory of ethics. - ✔✔False A claim right is also known as a _______________. - ✔✔Positive right A negative right is also known as a ______________. - ✔✔Liberty. Researchers are developing brain-computer interfaces to enable severely handicapped people to control appliances with their thoughts. - ✔✔True A Turing Test determines the strength of an encryption method. - ✔✔False Wikipedia relies upon an advertising-based business model. - ✔✔False Accelerometers help robots stay upright. - ✔✔True Golden rules, such as treat others as you want to be treated, can be found in the Bible. - ✔✔True Which statement best describes Utilitarianism? - ✔✔Main example of a consequentialist theory to increase happiness or "utility". Which of the following is an example of a negative right or liberty? - ✔✔All of these Software designers should include users in the design stages. - ✔✔True Professional ethics requires professionals to maintain their skills. - ✔✔True The brainstorming phase discussed in Chapter 9 can generate long discussion with humorous and obviously wrong options. - ✔✔True In one application of a voice-recognition system, the system failed to recognize female speakers. A likely reason was - ✔✔The program was primarily developed and tested by men There are currently how many imperatives mentioned in the ACM Code? - ✔✔24 If a business follows an "opt-in" policy for handling personal data, information about a customer __________ - ✔✔may not be released unless the customer gives permission The Communications Assistance for Law Enforcement Act (CALEA) said that _________ - ✔✔telecommunications equipment must be designed to allow the interception of telephone calls (with a court order) A cookie is _________________ - ✔✔a file that a Web site stores on a visitor's computer When a person visits a Web site, his or her IP address and the links he or she clicked on are automatically recorded. This is an example of ______. - ✔✔invisible information gathering The USA PATRIOT Act (2001) gives individuals more protection from governmental intrusion. - ✔✔False U.S. v. Jones (2012) was the first major case of digital technology surveillance and involved police attaching a GPS tracking device to a person's vehicle without a search warrant. - ✔✔True In Kyllo v. United States (2001), the U.S. Supreme Court ruled that when the government uses a device that's not in use by the general public to 'see' things it could not without intrusion, that is a 'search' and requires a warrant. - ✔✔True In Olmsted v. United States (1928), the U.S. Supreme Court interpreted the Fourth Amendment to apply only to physical intrusion. - ✔✔True If the right to be forgotten is a ____________ right (a liberty), it could mean that we may choose to stay off the Internet and become a recluse, but we cannot force someone else to remove information about us. - ✔✔negative As a positive right (a _______ right), it allows a person to restrict sharing of information by others. This can infringe freedom of speech and restrict access to truthful information. - ✔✔claim The privacy act of 1974 established rules to regulate - ✔✔federal government databases only In Katz vs. United States (1967), the U.S. Supreme Court determined that the government needs a court order to intrude where a reasonable person has a reasonable expectation of privacy. - ✔✔True Anonymizers allow a user to - ✔✔send email and surf the Web anonymously Which of the following requirements was a key provision of the Children's Internet Protection Act (CIPA)? - ✔✔filtering software must be installed on Internet terminals in schools and libraries Which of the following limits deceptive commercial email and outlines spammers' responsibilities: - ✔✔the CAN-SPAM Act What areas is covered by the topics of Free Speech? - ✔✔All of these Which one of the media areas has the most First Amendment protection? - ✔✔Print the legal guidelines for determining whether material is obscene include all of the following EXCEPT - ✔✔the material is intended for or distributed to persons under the age of 18. When was the first U.S. copyright law passed? - ✔✔In 1790 The "safe harbor" provisions of _______________ protect Websites from lawsuits and criminal charges for copyright infringement when users post infringing material. - ✔✔Digital Millennium Copyright Act One of the reasons the court ruled against Napster was: - ✔✔It knowingly encouraged and assisted in the infringement of copyrights Which of the following is not a factor specified in U.S. copyright law for determining fair use? - ✔✔The for-profit or non-profit status of the copyright holder Which of the following is not an exclusive right (subject to some exceptions) granted by copyright law? - ✔✔Profit from the work Which of the following is not a way for software to be protected against copyright infringement? - ✔✔make all software free The Digital Millennium copyright Act gives companies ways to threaten fair use, freedom of speech, research, competition, reverse engineering, and innovation. - ✔✔True "Anticircumvention" and "safe harbor" are the two significant parts of the Digital Millennium Copyright Act. - ✔✔True Copyright law protects processes and inventions, while patent law protects the particular expression of an idea. - ✔✔False Sega v. Accolade, Inc. (1992) helped determine that reverse engineering was allowable (fair research use) in order to make a compatible product. - ✔✔True in the term "free software", "free" implies all of the following EXCEPT - ✔✔free of cost All peer-to-peer technologies were found to be illegal as a result of the napster case. - ✔✔false [Show More]

Last updated: 2 years ago

Preview 1 out of 7 pages

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)
Preview image of CIS 3250 Exam 1 (Ch.1-4, 9 & Appendix A) document

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Reviews( 0 )

$10.00

Buy Now

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Instant download

Can't find what you want? Try our AI powered Search

130
0

Document information


Connected school, study & course


About the document


Uploaded On

Jan 28, 2023

Number of pages

7

Written in

All

Seller


Profile illustration for Nutmegs
Nutmegs

Member since 4 years

607 Documents Sold

Reviews Received
77
14
8
2
21
Additional information

This document has been written for:

Uploaded

Jan 28, 2023

Downloads

 0

Views

 130

Document Keyword Tags


$10.00
What is Scholarfriends

Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·