Unit 1 Fund. Of Comp. Flashcards

1
Q

The Ten Dos and Dont’s of Computer Ethics include guidelines such as NOT
using a computer to harm others.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is considered an unethical practice in information
technology?
-Using company resources for work-related purposes only
-Completing personal tasks on company time
-Following the guidelines of the Code of Ethics
-Reporting security breaches promptly

A

Completing personal tasks on company time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Open-source licenses and free software licenses both focus on the availability
of the source code and the freedom to modify and share it.

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which U.S. law is considered the cornerstone of many computer-related federal
laws and enforcement efforts?

-Identity Theft and Assumption Deterrence Act of 1998
-Federal Privacy Act of 1974
-Computer Fraud and Abuse Act of 1986
-Computer Security Act of 1987

A

Computer Fraud and Abuse Act of 1986

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Federal Privacy Act of 1974 regulates government agencies but exempts
certain agencies from some regulations to protect health or safety.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is the primary difference between fair use and open
source?
-Fair use is governed by international law, while open source is
governed by national laws
-Fair use allows for the distribution of copyrighted material without
permission, while open source focuses on the availability of source
code
-Fair use applies only to written works, while open source applies to
software development
-Fair use restricts the modification of copyrighted material, while
open source encourages modification and redistribution

A

Fair use restricts the modification of copyrighted material, while
open source encourages modification and redistribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of trademark requires examination, approval and registration with
the Trademark Office?

-Common-law trademark
-Collective trademark
-Service mark
-Registered trademark

A

Registered Trademark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Computer Security Act of 1987 aimed to improve the security and privacy
of sensitive information in federal computer systems.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When a person claims a colleague’s work as their own achievement, what is the
likely cause of the unethical behavior?

-Ignorance
-Laziness
-Ambition
-Pressure

A

Ambition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is defamation which is spoken?

-Libel
-Phishing
-Slander
-Cyberbully

A

Slander

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is also called a confidentiality agreement?

-Non-disclosure agreement
-Creative Commons license
-Patent
-Intellectual property agreement

A

Non-disclosure Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following types of Creative Commons license adds the restriction
which no derivative works may be made from the original?

-CC-BY-NC
-CC-BY-NC-ND
-CC-BY
-CC-BY-ED

A

CC-BY-NC-ND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How long does a patent usually last in the United States?

-50 years
-20 years
-40 years
-10 years

A

20 Years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is a trademark automatically received by an organization
when a symbol is being consistently used in the normal course of business?

-Open-source trademark
-Common-law trademark
-Common-license trademark
-Registered trademark

A

Common Law Trademark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How long does a copyright last?

-The life of the original author
-50 years
-The life of the original author -plus 70 years
-70 years

A

The life of the original author plus 70 years.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following organizations expanded the definition of identity theft?
-Federal Trade Commission
-Federal courts
-National Archives and Records Administration
-Bureau of Credit Reporting

A

Federal Trade Commission

17
Q

Which of the following laws prohibits accessing a computer without
authorization or in excess of authorization?

-Identity Theft and Assumption Deterrence Act of 1998
-Computer Fraud and Abuse Act of 1986
-Computer Security Act of 1987
-Federal Privacy Act of 1974

A

Computer Fraud and Abuse Act of 1986

18
Q

When a person plagiarizes another’s work to meet a deadline, what is the cause
of the unethical behavior?

-Ambition
-Ignorance
-Pressure
-Intent

19
Q

Which of the following is the act of damaging or attacking the reputation of
someone or something in a malicious or false way?

-Phishing
-Privacy invasion
-Cyberbully
-Defamation

A

Defamation

20
Q

Which of the following is a symbol identifying a particular source of goods or
services from others?

-Creative Common license
-Copyright
-Patent
-Trademark

21
Q

Which of the following laws establishes a Code of Fair Information Practice?

-Federal Privacy Act of 1974
-Computer Fraud and Abuse Act of 1986
-Computer Security Act of 1987
-Identity Theft and Assumption Deterrence Act of 1998

A

Federal Privacy act of 1974

22
Q

Which of the following laws aimed to improve the security and privacy of
sensitive information in federal computer systems?

-Identity Theft and Assumption -Deterrence Act of 1998
-Federal Privacy Act of 1974
-Computer Fraud and Abuse Act of 1986
-Computer Security Act of 1987

A

Computer Security Act of 1987

23
Q

Which of the following terms best describes the rules members of a society
create to balance individual rights to self-determination against the needs of the
society as a whole?

-Laws
-Ethics
-Policies
-Regulations

24
Q

Which of the following describes information literacy?

-The ability to find, evaluate and use information effectively and
ethically
-Using content online and sharing on digital platforms
-Creating and sharing information
-Sharing personal information online

A

The ability to find, evaluate and use information effectively and ethically

25
Q

Which of the following is the primary goal of fact-checking resources?

-To promote specific political agendas
-To create and spread information
-To limit the use of electronic media
-To help users determine the accuracy of information

A

To help users determine the accuracy of information

26
Q

Which of the following is NOT a strategy for determining the reliability of
information?

-Considering the date of the information
-Looking for multiple sources
-Checking the source
-Dismissing biases

A

Dismissing Biases

27
Q

Which of the following best describes digital citizenship?

-Using the internet for personal entertainment
-The responsible and appropriate use of technology and the internet
-Sharing personal information online
-Posting comments or reviews -about others

A

The responsible use of technology and the internet

28
Q

Which of the following is an example of cyberbullying?

-Disagreeing with someone’s opinion on social media
-Posting an embarrassing photo of a friend without their permission
-Posting a comment about a friend on social media
-Posting about a celebrity on social media

A

Posting and embarrassing photo of a friend without their permission

29
Q

Which of the following is the purpose of fact-checking websites?

-To provide an opinion on current events
-To provide a list of credible sources for research
-To promote a specific political agenda
-To check the accuracy of claims made in news articles and other
sources

A

To check the accuracy of claims made in news articles and other sources

30
Q

Which of the following is an important factor to consider when using a fact-
checking website?

-The website’s affiliation with a political party
-The website’s sources for its claims
-The website’s clear bias
-If the website is a non-profit or commercial organization

A

The website’s sources for its claims

31
Q

Which of the following has the highest authentication setup?

-Face recognition
-Vein scanner
-Password
-Two-factor authentication

A

Vein Scanner

32
Q

Which of the following can compromise the availability of information?

-Hardware failure
-Cyberattacks
-All the answer choices are correct
-Malware

A

All the answer choices are correct

33
Q

How do businesses typically pay ransom?

-Cash on hand
-Employee salaries
-Business line of credit
-Insurance

34
Q

It is very easy to identify where ransomware, placed on a computer system,
originates.

-True
-False

35
Q

What could happen to a business experiencing a ransomware attack where no
useable backup files are available?

-Data analyst insurance providers will recover the files for the
business
-Restore the system to the factory settings which is free of
ransomware
-Ransomware deletes all files from the network
-Pay the ransom to access the files

A

Pay the ransom to access the files

36
Q

How can users avoid ransomware?

-Storing your files on a different network
-Having good backups of your files
-Storing your files somewhere other than your physical machine
-All of the answer choices are correct

A

All of the answer choices are correct