Computer Science > QUESTIONS & ANSWERS > CIS 3250 Exam 1 (Ch.1-4, 9 & Appendix A) (All)
CIS 3250 Exam 1 (Ch.1-4, 9 & Appendix A) Claim rights or positive rights - ✔✔impose an obligation on some people to provide certain things for others Generally, a deontologist would be more co... mfortable breaking a rule in circumstances where doing so would have good consequences. - ✔✔False More people worldwide have access to a cellphone than to a toilet. - ✔✔True It is always wrong to lie would reflect the utilitarian theory of ethics. - ✔✔False A claim right is also known as a _______________. - ✔✔Positive right A negative right is also known as a ______________. - ✔✔Liberty. Researchers are developing brain-computer interfaces to enable severely handicapped people to control appliances with their thoughts. - ✔✔True A Turing Test determines the strength of an encryption method. - ✔✔False Wikipedia relies upon an advertising-based business model. - ✔✔False Accelerometers help robots stay upright. - ✔✔True Golden rules, such as treat others as you want to be treated, can be found in the Bible. - ✔✔True Which statement best describes Utilitarianism? - ✔✔Main example of a consequentialist theory to increase happiness or "utility". Which of the following is an example of a negative right or liberty? - ✔✔All of these Software designers should include users in the design stages. - ✔✔True Professional ethics requires professionals to maintain their skills. - ✔✔True The brainstorming phase discussed in Chapter 9 can generate long discussion with humorous and obviously wrong options. - ✔✔True In one application of a voice-recognition system, the system failed to recognize female speakers. A likely reason was - ✔✔The program was primarily developed and tested by men There are currently how many imperatives mentioned in the ACM Code? - ✔✔24 If a business follows an "opt-in" policy for handling personal data, information about a customer __________ - ✔✔may not be released unless the customer gives permission The Communications Assistance for Law Enforcement Act (CALEA) said that _________ - ✔✔telecommunications equipment must be designed to allow the interception of telephone calls (with a court order) A cookie is _________________ - ✔✔a file that a Web site stores on a visitor's computer When a person visits a Web site, his or her IP address and the links he or she clicked on are automatically recorded. This is an example of ______. - ✔✔invisible information gathering The USA PATRIOT Act (2001) gives individuals more protection from governmental intrusion. - ✔✔False U.S. v. Jones (2012) was the first major case of digital technology surveillance and involved police attaching a GPS tracking device to a person's vehicle without a search warrant. - ✔✔True In Kyllo v. United States (2001), the U.S. Supreme Court ruled that when the government uses a device that's not in use by the general public to 'see' things it could not without intrusion, that is a 'search' and requires a warrant. - ✔✔True In Olmsted v. United States (1928), the U.S. Supreme Court interpreted the Fourth Amendment to apply only to physical intrusion. - ✔✔True If the right to be forgotten is a ____________ right (a liberty), it could mean that we may choose to stay off the Internet and become a recluse, but we cannot force someone else to remove information about us. - ✔✔negative As a positive right (a _______ right), it allows a person to restrict sharing of information by others. This can infringe freedom of speech and restrict access to truthful information. - ✔✔claim The privacy act of 1974 established rules to regulate - ✔✔federal government databases only In Katz vs. United States (1967), the U.S. Supreme Court determined that the government needs a court order to intrude where a reasonable person has a reasonable expectation of privacy. - ✔✔True Anonymizers allow a user to - ✔✔send email and surf the Web anonymously Which of the following requirements was a key provision of the Children's Internet Protection Act (CIPA)? - ✔✔filtering software must be installed on Internet terminals in schools and libraries Which of the following limits deceptive commercial email and outlines spammers' responsibilities: - ✔✔the CAN-SPAM Act What areas is covered by the topics of Free Speech? - ✔✔All of these Which one of the media areas has the most First Amendment protection? - ✔✔Print the legal guidelines for determining whether material is obscene include all of the following EXCEPT - ✔✔the material is intended for or distributed to persons under the age of 18. When was the first U.S. copyright law passed? - ✔✔In 1790 The "safe harbor" provisions of _______________ protect Websites from lawsuits and criminal charges for copyright infringement when users post infringing material. - ✔✔Digital Millennium Copyright Act One of the reasons the court ruled against Napster was: - ✔✔It knowingly encouraged and assisted in the infringement of copyrights Which of the following is not a factor specified in U.S. copyright law for determining fair use? - ✔✔The for-profit or non-profit status of the copyright holder Which of the following is not an exclusive right (subject to some exceptions) granted by copyright law? - ✔✔Profit from the work Which of the following is not a way for software to be protected against copyright infringement? - ✔✔make all software free The Digital Millennium copyright Act gives companies ways to threaten fair use, freedom of speech, research, competition, reverse engineering, and innovation. - ✔✔True "Anticircumvention" and "safe harbor" are the two significant parts of the Digital Millennium Copyright Act. - ✔✔True Copyright law protects processes and inventions, while patent law protects the particular expression of an idea. - ✔✔False Sega v. Accolade, Inc. (1992) helped determine that reverse engineering was allowable (fair research use) in order to make a compatible product. - ✔✔True in the term "free software", "free" implies all of the following EXCEPT - ✔✔free of cost All peer-to-peer technologies were found to be illegal as a result of the napster case. - ✔✔false [Show More]
Last updated: 1 year ago
Preview 1 out of 7 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Add to cartInstant download
We Accept:
Connected school, study & course
About the document
Uploaded On
Jan 28, 2023
Number of pages
7
Written in
This document has been written for:
Uploaded
Jan 28, 2023
Downloads
0
Views
80
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·