asdf Flashcards
This is for a law which prohibits making, distributing, or using tools (devices, software, or services) to circumvent technological copyright protection systems.
DMCA
This kind of the right is classified as Liberty.
Negative Right
This is for the law that requires communications companies to design equipment so that it is capable of being tapped.
CALEA
This is for the federal commission that regulates trade.
FTC
This is for sending millions of emails fishing for information to use to impersonate someone and steal money or goods.
phishing
This device is to detect a potential in-air collision of two planes and directs the pilots to avoid each other.
TCAS
This is for the Act which establishes oversight rules for the NSA.
FISA
This is for the federal commission that regulates communications.
FCC
This is for an organization operates in difficult environments where failures can have extreme consequences.
HRO
This is for a law which made it illegal for commercial Web sites to make available to minors material “harmful to minors” as judged by community standards (ruled unconstitutional).
COPA
A Turing Test determines the strength of an encryption method.
True
Copyright law protects processes and inventions, while patent law protects the particular expression of an idea.
False
The USA PATRIOT Act (2001) gives individuals more protection from governmental intrusion.
False
In Katz v. United States (1967), the U.S. Supreme Court determined that the government needs a court order to intrude where a reasonable person has a reasonable expectation of privacy.
True
U.S. v. Jones (2012) was the first major case of digital technology surveillance and involved police attaching a GPS tracking device to a person’s vehicle without a search warrant.
True
Broadcast media traditionally has had the strongest First Amendment protection (meaning the fewest regulatory restrictions) while print media has the weakest First Amendment protection.
False
Miller v. California (1973) ruled that community standards could not play a role in whether or not material was deemed obscene.
False
The government cannot monitor online activity of suspected hackers without a court order.
False
Sony v. Universal City Studios (1983) ruled that private, non-commercial copying for personal use was fair use.
True
Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as
honey pots
The legal guidelines for determining whether material is obscene include all of the following EXCEPT
the material is intended for or distributed to persons under the age of 18.
Ken Olson, president of Digital Equipment Corp. in the late 1970’s, Thomas J. Watson, chairman of IBM in the early 1940’s, and Thomas Edison all made predictions about technology that were extremely wrong.Which of the following choices to explain why the predictions of experts are often so far off?
Lack of imagination about the uses people would find for technology
The practice of hiring companies or employees in other countries is known as
Offshoring
When was the first U.S. copyright law passed?
In 1790
The Privacy Act of 1974 established rules to regulate
Federal government databases only
Deontological theories are also called consequentialist theories.
False
John Locke rejected the protection of private property as a moral rule.
False
In some countries, the governments ban or discourage email services and social networking sites based in the West and set up their own to control. Which one of the following choices is NOT one of these countries?
Arkansas
If a business follows an “opt-in” policy for handling personal data, information about a customer
may not be released unless the customer gives permission
Which of the following is not a factor specified in U.S. copyright law for determining fair use?
The for-profit or non-profit status of the copyright holder
Which of the following is NOT a principle for producing good systems?
Overestimate the costs and time a project will take
The Communications Assistance for Law Enforcement Act (CALEA) said that
telecommunications equipment must be designed to allow the interception of telephone calls (with a court order)
Which of the following limits deceptive commercial email and outlines spammers’ responsibilities?
the CAN-SPAM Act
Which of the following is NOT an example of a negative right or liberty?
the right to get social security benefits when one gets old for U.S. citizen.
There is less merit in Kant’s principle of universalism and his emphasis on treating people as intrinsically valuable “ends” for it is very difficult to implement.
False
Ethical theory assumes that people are irrational.
False
For John Rawls, an ethical decision for many least-advantaged people should be made better off in long term than those people in the middle level.
False
This is for individual and organization who would be affected in some way by an ethical dilemma.
stakeholder
This is for an attack in which hackers overload a target site with requests for information.
denial-of-service(DOS)
This refers to the fact that some people have access to computers and information technology while others do not.
digital divide
This device is a computerized machine that gave lethal radiation overdoses to some cancer patients in one case study.
Therac-25
This is for a law which requires schools and libraries to install filtering software if they wish to receive federal funds (ruled constitutional).
CIPA
Sega v. Accolade, Inc. (1992) helped determine that reverse engineering was allowable (fair research use) in order to make a compatible product.
True
Roughly half of major companies in the U.S. sometimes monitor the email or voice mail of their employees on company systems.
True
The U.S. Supreme Court ruled that requiring content filters on public library computers was unconstitutional.
False
The cause of failure in a computer program is often due to more than one factor.
True
Simplifications and assumptions are always made when designing a computer model.
True
U.S. and European pilots are now trained to follow Traffic Collision Avoidance System (TCAS) instructions even if they conflict with instructions from an air traffic controller.
True
Deontologists believe that actions are intrinsically insufficient if they follow from logic only.
False
Thomas Hobbes views that most people are safe from physical harm, with legal and justice system to ensure the satisfaction of one’s needs.
False
In one application of a voice-recognition system, the system failed to recognize female speakers. A likely reason was:
The program was primarily developed and tested by men
Which of the following is not an exclusive right (subject to some exceptions) granted by copyright law?
Profit from the work
Which of the following requirements was a key provision of the Children’s Internet Protection Act (CIPA)?:
filtering software must be installed on Internet terminals in schools and libraries
Which of the following is NOT a program used by hackers to gain access to your computer?
honeypots
Which of the following is NOT a Neo-Luddite criticism of computers?
Computers cause people to be united
A cookie in Web is
a file that a Web site stores on a visitor’s computer
Most of the delay in the opening of the Denver International Airport was because of problems with
the baggage handling system
In the early days of computing (1960’s to the early 1970’s), a “hacker” was
A creative programmer who wrote very elegant or clever programs
This is for working for an employer at a computer-equipped space in the employee’s home.
telecommuting
“Inventing Right and Wrong” would reflect this theory of ethics.
Utilitarian
This is for a law which requires commercial mass e-mail messages to contain opt-out provisions and accurate subject lines.
CAN-SPAM Act
This is for a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical systems, and activities that involve computers in more than one state.
CFAA
This is for a law passed to protect children’s privacy online.
COPPA
This points at which artificial intelligence advances so far that we cannot comprehend what lies on the other side.
technological singularity
This is for Web sites that are specifically designed to be attractive to hackers.
honey pots
The Electronic Communications Privacy Act (ECPA) prohibits employers from intercepting and reading employees’ stored email.
False
More people worldwide have access to a cellphone than to a toilet.
True
All peer-to-peer technologies were found to be illegal as a result of the Napster case.
False
In the 1980’s, the AFL-CIO advocated a government ban on all computer at-home work.
True
Some computer errors are actually system failures, in that it was the human/computer interface which caused the resulting problem.
True
Computer forensics specialists cannot recover deleted files from an erased disk.
false
[Baase01] Claim rights or positive rights _______. Select the best answer.
impose an obligation on some people to provide certain things for others
In the term “Free Software,” “free” implies all of the following except one.
Free of cost
A positive right to a job means that no one may prohibit you from working positively.
False
Act utilitarianism is well adapted in practice and pragmatic for computing world of programming.
False
Utilitarianism provides a set of absolute prohibitions to some actions that many people consider always wrong.
False
(T or F) Professional ethics requires professionals maintain their skills.
True
(T or F) Legacy systems are typically reliable, but inflexible.
True
(T or F) Researchers are developing brain-computer interfaces to enable severely handicapped people to control appliances with their thoughts.
True
(T or F) Researchers are developing brain-computer interfaces to enable severely handicapped people to control appliances with their thoughts.
True
(T or F) Wikipedia relies upon an advertising-based business model.
False
Matching. Select the correct answer matching for the following term or phrase. This device is to detect a potential in-air collision of two planes and directs the pilots to avoid each other.
TCAS
Matching. Select the correct answer matching for the following acronym. This is for a law which made it illegal for commercial Web sites to make available to minors material “harmful to minors” as judged by community standards (ruled unconstitutional).
COPA
(T or F) The Omnibus Crime Control and Safe Streets (1968) explicitly allowed wiretapping and electronic surveillance by law enforcement agencies with a warrant.
True
(T or F) Redundancy and self-checking are often present in safety-critical systems.
True
(T or F) In Olmsted v. United States (1928), the U.S. Supreme Court interpreted the Fourth Amendment to apply only to physical intrusion.
True
Matching. Select the correct answer matching for the following term or phrase. This is for moving part of a business’s operation to another country.
offshoring
Which of the following are the two main arguments against the Communications Decency Act accepted by the courts?
it was too vague and broad, and it did not use the least restrictive means of accomplishing the goal of protecting children
One of the sources of failure common to BOTH the Therac-25 and the Ariane 5 rocket was _____.
reuse of software from previous versions of the systems
One of the reasons the court ruled against Napster was ____.
It knowingly encouraged and assisted in the infringement of copyrights
Matching. Select the correct answer matching for the following term, phrase or sentence. This kind of the right is also classified as Claim Right.
Positive Right
Matching. Select the correct answer matching for the following term, phrase or sentence. This kind of the right is also classified as Claim Right.
Positive Right
Anonymizers allow a user to ______.
send email and surf the Web anonymously
(T or F) A feature of high reliability organizations is loose structure.
True
(T or F) Software designers should include users in the design stages.
True
A good (copyright) law will set maximal standards for all so that it can be applied to all situations, leaving a minimal range of unclear or uncertain choices.
False
Kant follows rules of behavior, individually unique or sensitive to a person. Kant argued that it is possible to lie, to achieve good.
False
Negative rights are also called claim rights in descriptive term.
False
An example of negative right is that of authoritarian governments to restrict or deny free or unlimited use of Internet.
False
Utilitarianism believes that an action should be universally same in utility for all people.
False
Behaving ethically is usually practical because we often lie or break promises.
False
John Rawls insists that that a proper political system can and should settle for the views of one group on another by means of democratic voting, capitalistic or even authoritative power.
False
The tool of “behind the veil of ignorance” is useful and it is proven to be absolute or very close.
False