asdf Flashcards
This is for a law which prohibits making, distributing, or using tools (devices, software, or services) to circumvent technological copyright protection systems.
DMCA
This kind of the right is classified as Liberty.
Negative Right
This is for the law that requires communications companies to design equipment so that it is capable of being tapped.
CALEA
This is for the federal commission that regulates trade.
FTC
This is for sending millions of emails fishing for information to use to impersonate someone and steal money or goods.
phishing
This device is to detect a potential in-air collision of two planes and directs the pilots to avoid each other.
TCAS
This is for the Act which establishes oversight rules for the NSA.
FISA
This is for the federal commission that regulates communications.
FCC
This is for an organization operates in difficult environments where failures can have extreme consequences.
HRO
This is for a law which made it illegal for commercial Web sites to make available to minors material “harmful to minors” as judged by community standards (ruled unconstitutional).
COPA
A Turing Test determines the strength of an encryption method.
True
Copyright law protects processes and inventions, while patent law protects the particular expression of an idea.
False
The USA PATRIOT Act (2001) gives individuals more protection from governmental intrusion.
False
In Katz v. United States (1967), the U.S. Supreme Court determined that the government needs a court order to intrude where a reasonable person has a reasonable expectation of privacy.
True
U.S. v. Jones (2012) was the first major case of digital technology surveillance and involved police attaching a GPS tracking device to a person’s vehicle without a search warrant.
True
Broadcast media traditionally has had the strongest First Amendment protection (meaning the fewest regulatory restrictions) while print media has the weakest First Amendment protection.
False
Miller v. California (1973) ruled that community standards could not play a role in whether or not material was deemed obscene.
False
The government cannot monitor online activity of suspected hackers without a court order.
False
Sony v. Universal City Studios (1983) ruled that private, non-commercial copying for personal use was fair use.
True
Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as
honey pots
The legal guidelines for determining whether material is obscene include all of the following EXCEPT
the material is intended for or distributed to persons under the age of 18.
Ken Olson, president of Digital Equipment Corp. in the late 1970’s, Thomas J. Watson, chairman of IBM in the early 1940’s, and Thomas Edison all made predictions about technology that were extremely wrong.Which of the following choices to explain why the predictions of experts are often so far off?
Lack of imagination about the uses people would find for technology
The practice of hiring companies or employees in other countries is known as
Offshoring
When was the first U.S. copyright law passed?
In 1790
The Privacy Act of 1974 established rules to regulate
Federal government databases only
Deontological theories are also called consequentialist theories.
False
John Locke rejected the protection of private property as a moral rule.
False
In some countries, the governments ban or discourage email services and social networking sites based in the West and set up their own to control. Which one of the following choices is NOT one of these countries?
Arkansas
If a business follows an “opt-in” policy for handling personal data, information about a customer
may not be released unless the customer gives permission
Which of the following is not a factor specified in U.S. copyright law for determining fair use?
The for-profit or non-profit status of the copyright holder
Which of the following is NOT a principle for producing good systems?
Overestimate the costs and time a project will take
The Communications Assistance for Law Enforcement Act (CALEA) said that
telecommunications equipment must be designed to allow the interception of telephone calls (with a court order)
Which of the following limits deceptive commercial email and outlines spammers’ responsibilities?
the CAN-SPAM Act
Which of the following is NOT an example of a negative right or liberty?
the right to get social security benefits when one gets old for U.S. citizen.
There is less merit in Kant’s principle of universalism and his emphasis on treating people as intrinsically valuable “ends” for it is very difficult to implement.
False
Ethical theory assumes that people are irrational.
False
For John Rawls, an ethical decision for many least-advantaged people should be made better off in long term than those people in the middle level.
False
This is for individual and organization who would be affected in some way by an ethical dilemma.
stakeholder
This is for an attack in which hackers overload a target site with requests for information.
denial-of-service(DOS)
This refers to the fact that some people have access to computers and information technology while others do not.
digital divide
This device is a computerized machine that gave lethal radiation overdoses to some cancer patients in one case study.
Therac-25