IS3340 CHAPTER 2 Flashcards

1
Q

Software that displays advertising banners, re-directs a user to Web sites, and conducts advertising on a user’s computer. It also displays pop-up advertisements and is called ___?

A

ADWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data about a person’s physical or behavioral traits used to identify a particular person. This is unique because it can’t be changed and is called ___?

A

BIOMETRIC DATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A personal online journal is called a ___?

A

BLOG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The data trail that an Internet user creates while browsing. This is a record of the pages that a computer user visits when navigating on a particular Web site and is called ___?

A

CLICKSTREAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A body of law that is developed because of legal tradition and court cases. This was also a body of law inherited from England and is called ___?

A

COMMON LAW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A small string of code that a Web site stores on a user’s computer. Web sites use this to remember specific information about visitors to the site and is called ___?

A

COOKIE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A tort that involves maliciously saying false things about another person is called ___?

A

DEFAMATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The official schedule of a court and the events in the cases pending before a court is called a ___?

A

DOCKET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Looking through discarded trash for personal information is called ___?

A

DUMPSTER DIVING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Guidelines used to help describe how personal information should be collected and used is called ___?

A

FAIR INFORMATION PRACTICE PRINCIPLES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A navigation technology that uses satellites above the earth to compute the location of a certain type of receiver is called ___?

A

GLOBAL POSITIONING SYSTEM (GPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A crime that takes place when a person’s personally identifiable information is used without permission in order to commit other crimes is called a ___?

A

IDENTITY THEFT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The practice of tracking a user’s actions on the Internet in order to create an information outline of that user. It can be used to direct targeted advertising toward a particular user and is called ___?

A

ONLINE PROFILING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Documents filed in a court case are called ___?

A

PLEADINGS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Advertisements that open a new Web browser window to display the contents is called ___?

A

POP-UP ADVERTISEMENTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A person’s right to have control of his or her own personal data. The person has the right to specify how that data is collected, used, and shared. This is called ___?

A

PRIVACY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

People that work for the federal or state government are called ___?

A

PUBLIC EMPLOYEES

18
Q

Information required by law to be made available to the public. This type of information is made or filed by a governmental entity and is called ___?

A

PUBLIC RECORDS

19
Q

A wireless technology that uses radio waves to transmit data to a receiver is called ___?

A

RADIO FREQUENCY IDENTIFICATION (RFID)

20
Q

A legal concept used to describe an ordinary person. This fictitious ordinary person is used to represent how an average person would think and act and is called a ___?

A

REASONABLE PERSON STANDARD

21
Q

A program administered by a trusted organization that verifies that another organization meets recognized privacy practices is called a ___?

A

SEAL PROGRAM

22
Q

A program that retrieves files and data from a computer network. These are used to examine the Internet for information. This is called a ___?

A

SEARCH ENGINE

23
Q

Any compromise of a computer system that results in the loss of personally identifiable information is called ___?

A

SECURITY BREACH

24
Q

Web site applications that allow users to post information about themselves is called ___?

A

SOCIAL NETWORKING SITES

25
Q

A wrongful act or harm for which a civil action can be brought. This type of law governs disputes between individuals and is called ___?

A

TORT

26
Q

A small, invisible electronic file that is placed on a Web page or in an email message and is called ___?

A

WEB BEACON

27
Q

These issues are encountered in the workplace. Hiring and firing practices and daily performance practices all have potential privacy concerns and is called ___?

A

WORKPLACE PRIVACY

28
Q
  1. What does a seal program verify?
  2. That an organization meets recognized privacy principles
  3. that an organization misfits recognized security principles
  4. That a third party is trusted
  5. that a Web site does not use cookies
A

That an organization meets recognized privacy principles

29
Q
  1. What techniques are used to create a list of the Web pages that a computer user visits?
  2. Adware, malware, and phishing
  3. Malware, cookies, and Web beacons
  4. Web beacons, clickstreams, and spyware
  5. Malware, spyware, and cookies
  6. Clickstreams, cookies, and Web beacons
A

Clickstreams, cookies, and Web beacons

30
Q
  1. Which amendment protects against unreasonable searches and seizures?
  2. First
  3. Third
  4. Fourth
  5. Fifth
  6. Seventh
A

Fourth

31
Q
  1. Privacy refers to a person’s right to control personal data.
    TRUE OR FALSE
A

TRUE

32
Q
  1. What is the source of legal authority for the US government?
  2. The US Code
  3. The common law
  4. Supreme Court decisions
  5. The US Constitution
  6. The Declaration of Independence
A

The US Constitution

33
Q
  1. Which of the following is NOT a privacy tort?
  2. Intrusion into seclusion
  3. Portrayal in a false light
  4. Appropriation of likeness or identity
  5. Defamation
  6. Public disclosure of private facts
A

Defamation

34
Q
  1. The OECD privacy protection guidelines contain ___ privacy principles.
A

8

35
Q
  1. Which principle means that an individual should be told the reason for data collection before the data is collected?
  2. The collection limitation principle
  3. The purpose specification principle
  4. The use limitation principle
  5. The openness principle
  6. The accountability principle
A

The purpose specification principle

36
Q
  1. What are the two types of cookies?
  2. First-party and third party cookies
  3. Active and passive cookies
  4. First party and second party cookies
  5. Rational and irrational cookies
A

First-party and third party cookies

37
Q
  1. What is a Web beacon?
  2. Text stored on a computer user’s hard drive
  3. A small, invisible electronic file
  4. A pop-up advertisement
  5. Executable code
  6. A data trail left by a computer user
A

A small, invisible electronic file

38
Q
  1. Employer monitoring of employees in the workplace is generally allowed.
    TRUE OR FALSE
A

TRUE

39
Q
  1. To monitor telephone conversations, an employer must use equipment provided by a phone system service provider and have ___.
A

A legitimate business reason

40
Q
  1. Why is biometric data unique?
  2. It can be used to identify a person
  3. It is data about a person’s physical traits
  4. It can used to commit identity theft
  5. It cannot be changed
  6. None of the above
A

It cannot be changed

41
Q
  1. Which of the following is NOT a people-based privacy threat?
  2. Social engineering
  3. Web beacons
  4. Shoulder surfing
  5. Dumpster diving
  6. Social networks
A

Web beacons

42
Q
  1. What is used to ensure privacy?
  2. Biometric data
  3. Encryption
  4. Information security
  5. Monitoring
  6. Online profiling
A

Information security