Quiz 3 Flashcards
A blog is
A) the Web version of a “couch potato.”
B) a special symbol visible on displays that show Unicode characters.
C) a character in Lineage, a popular on-line game.
D) a personal journal kept on the Web.
E) a person who assumes a false identity in a chat room.
D) a personal journal kept on the Web.
A Korean cybercafé where people play on-line, persistent games is called a
A) coffee clubhouse.
B) PC bang.
C) Tenretni (Internet spelled backwards).
D) computer commons.
E) virtual reality theater.
B) PC bang.
The act of assuming someone else’s electronic identity is called ________________.
identity theft
In the United States, freedom of expression
A) is a positive right.
B) is not an absolute right.
C) has been abolished by decisions of the U.S. Supreme Court.
D) is guaranteed by the Fourth Amendment to the United States Constitution.
E) is limited to political speech.
B) is not an absolute right.
Every object on the World Wide Web has a unique address called the __________________.
Uniform Resource Locator (URL)
Kimberly Young’s test for Internet addiction is based on the diagnosis of A) anxiety disorders. B) obsessive/compulsive behavior. C) pathological gambling. D) schizophrenia. E) chronic sleeplessness.
C) pathological gambling.
The Enlightenment view of addiction is that
A) people are responsible for the choices they make.
B) society is responsible for the bad choices people make.
C) addiction can never be overcome by will-power alone.
D) addiction is not real.
E) there is nothing wrong with addiction.
A) people are responsible for the choices they make.
The volume of spam is increasing because
A) some people respond to spam advertisements.
B) companies have found it to be effective.
C) it is 100 times less expensive than a traditional flyer sent via the U.S. mail.
D) None of these
E) All of these
E) All of these
A wiki is
A) An online encyclopedia.
B) A piece of software that allows ISPs to monitor who visits which Web sites.
C) A Web site that allows multiple people to contribute and edit its content.
D) A personal journal kept on the Web.
E) An electronic profile constructed automatically by a Web browser.
C) A Web site that allows multiple people to contribute and edit its content.
Messages embedded in files transferred from one computer to another are commonly called A) software. B) the World Wide Web. C) the operating system. D) email. E) the Internet.
D) email.
Sexting refers to
A) sending text messages with nude or nearly nude photographs.
B) sending emails with nude or nearly nude photographs.
C) posting nude or nearly nude photographs to a Web site.
D) A and B.
E) A, B, and C.
D) A and B.
A Web filter is a piece of software that
A) keeps track of the pages your Web browser displays.
B) sends Google information about your Web surfing habits.
C) prevents certain Web pages from being displayed by your browser.
D) prevents unauthorized people from using your computer to surf the Web.
E) A and B.
C) prevents certain Web pages from being displayed by your browser.
According to John Stuart Mill’s Principle of Harm, the only ground on which the government should intervene in the conduct of an individual is when
A) it would clearly be to the benefit of the individual.
B) it would prevent harm to others.
C) According to Mill, the government should intervene if any of the above conditions are true.
D) the individual is breaking the law.
E) the individual is under 18 or over 65.
B) it would prevent harm to others.
Trying to create a list of valid email addresses by sending email to randomly generated addresses and seeing which ones are delivered is called a _______________.
dictionary attack
How many Americans were the victims of identity theft in 2010 because of their online activities? A) About 100 million. B) About 100,000. C) About 8 million. D) About 1 million. E) About 10,000.
C) About 8 million.