Computer Science > QUESTIONS & ANSWERS > CIS 3250 Exam 1 (Ch.1-4, 9 & Appendix A) (All)

CIS 3250 Exam 1 (Ch.1-4, 9 & Appendix A)

Document Content and Description Below

CIS 3250 Exam 1 (Ch.1-4, 9 & Appendix A) Claim rights or positive rights - ✔✔impose an obligation on some people to provide certain things for others Generally, a deontologist would be more co... mfortable breaking a rule in circumstances where doing so would have good consequences. - ✔✔False More people worldwide have access to a cellphone than to a toilet. - ✔✔True It is always wrong to lie would reflect the utilitarian theory of ethics. - ✔✔False A claim right is also known as a _______________. - ✔✔Positive right A negative right is also known as a ______________. - ✔✔Liberty. Researchers are developing brain-computer interfaces to enable severely handicapped people to control appliances with their thoughts. - ✔✔True A Turing Test determines the strength of an encryption method. - ✔✔False Wikipedia relies upon an advertising-based business model. - ✔✔False Accelerometers help robots stay upright. - ✔✔True Golden rules, such as treat others as you want to be treated, can be found in the Bible. - ✔✔True Which statement best describes Utilitarianism? - ✔✔Main example of a consequentialist theory to increase happiness or "utility". Which of the following is an example of a negative right or liberty? - ✔✔All of these Software designers should include users in the design stages. - ✔✔True Professional ethics requires professionals to maintain their skills. - ✔✔True The brainstorming phase discussed in Chapter 9 can generate long discussion with humorous and obviously wrong options. - ✔✔True In one application of a voice-recognition system, the system failed to recognize female speakers. A likely reason was - ✔✔The program was primarily developed and tested by men There are currently how many imperatives mentioned in the ACM Code? - ✔✔24 If a business follows an "opt-in" policy for handling personal data, information about a customer __________ - ✔✔may not be released unless the customer gives permission The Communications Assistance for Law Enforcement Act (CALEA) said that _________ - ✔✔telecommunications equipment must be designed to allow the interception of telephone calls (with a court order) A cookie is _________________ - ✔✔a file that a Web site stores on a visitor's computer When a person visits a Web site, his or her IP address and the links he or she clicked on are automatically recorded. This is an example of ______. - ✔✔invisible information gathering The USA PATRIOT Act (2001) gives individuals more protection from governmental intrusion. - ✔✔False U.S. v. Jones (2012) was the first major case of digital technology surveillance and involved police attaching a GPS tracking device to a person's vehicle without a search warrant. - ✔✔True In Kyllo v. United States (2001), the U.S. Supreme Court ruled that when the government uses a device that's not in use by the general public to 'see' things it could not without intrusion, that is a 'search' and requires a warrant. - ✔✔True In Olmsted v. United States (1928), the U.S. Supreme Court interpreted the Fourth Amendment to apply only to physical intrusion. - ✔✔True If the right to be forgotten is a ____________ right (a liberty), it could mean that we may choose to stay off the Internet and become a recluse, but we cannot force someone else to remove information about us. - ✔✔negative As a positive right (a _______ right), it allows a person to restrict sharing of information by others. This can infringe freedom of speech and restrict access to truthful information. - ✔✔claim The privacy act of 1974 established rules to regulate - ✔✔federal government databases only In Katz vs. United States (1967), the U.S. Supreme Court determined that the government needs a court order to intrude where a reasonable person has a reasonable expectation of privacy. - ✔✔True Anonymizers allow a user to - ✔✔send email and surf the Web anonymously Which of the following requirements was a key provision of the Children's Internet Protection Act (CIPA)? - ✔✔filtering software must be installed on Internet terminals in schools and libraries Which of the following limits deceptive commercial email and outlines spammers' responsibilities: - ✔✔the CAN-SPAM Act What areas is covered by the topics of Free Speech? - ✔✔All of these Which one of the media areas has the most First Amendment protection? - ✔✔Print the legal guidelines for determining whether material is obscene include all of the following EXCEPT - ✔✔the material is intended for or distributed to persons under the age of 18. When was the first U.S. copyright law passed? - ✔✔In 1790 The "safe harbor" provisions of _______________ protect Websites from lawsuits and criminal charges for copyright infringement when users post infringing material. - ✔✔Digital Millennium Copyright Act One of the reasons the court ruled against Napster was: - ✔✔It knowingly encouraged and assisted in the infringement of copyrights Which of the following is not a factor specified in U.S. copyright law for determining fair use? - ✔✔The for-profit or non-profit status of the copyright holder Which of the following is not an exclusive right (subject to some exceptions) granted by copyright law? - ✔✔Profit from the work Which of the following is not a way for software to be protected against copyright infringement? - ✔✔make all software free The Digital Millennium copyright Act gives companies ways to threaten fair use, freedom of speech, research, competition, reverse engineering, and innovation. - ✔✔True "Anticircumvention" and "safe harbor" are the two significant parts of the Digital Millennium Copyright Act. - ✔✔True Copyright law protects processes and inventions, while patent law protects the particular expression of an idea. - ✔✔False Sega v. Accolade, Inc. (1992) helped determine that reverse engineering was allowable (fair research use) in order to make a compatible product. - ✔✔True in the term "free software", "free" implies all of the following EXCEPT - ✔✔free of cost All peer-to-peer technologies were found to be illegal as a result of the napster case. - ✔✔false [Show More]

Last updated: 1 year ago

Preview 1 out of 7 pages

Add to cart

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

We Accept:

We Accept

Reviews( 0 )

$10.00

Add to cart

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
80
0

Document information


Connected school, study & course


About the document


Uploaded On

Jan 28, 2023

Number of pages

7

Written in

Seller


seller-icon
Nutmegs

Member since 3 years

578 Documents Sold


Additional information

This document has been written for:

Uploaded

Jan 28, 2023

Downloads

 0

Views

 80

Document Keyword Tags


$10.00
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·