Unit 1 Fund. Of Comp. Flashcards
The Ten Dos and Dont’s of Computer Ethics include guidelines such as NOT
using a computer to harm others.
True
False
True
Which of the following is considered an unethical practice in information
technology?
-Using company resources for work-related purposes only
-Completing personal tasks on company time
-Following the guidelines of the Code of Ethics
-Reporting security breaches promptly
Completing personal tasks on company time
Open-source licenses and free software licenses both focus on the availability
of the source code and the freedom to modify and share it.
True
False
False
Which U.S. law is considered the cornerstone of many computer-related federal
laws and enforcement efforts?
-Identity Theft and Assumption Deterrence Act of 1998
-Federal Privacy Act of 1974
-Computer Fraud and Abuse Act of 1986
-Computer Security Act of 1987
Computer Fraud and Abuse Act of 1986
The Federal Privacy Act of 1974 regulates government agencies but exempts
certain agencies from some regulations to protect health or safety.
True
False
True
Which of the following is the primary difference between fair use and open
source?
-Fair use is governed by international law, while open source is
governed by national laws
-Fair use allows for the distribution of copyrighted material without
permission, while open source focuses on the availability of source
code
-Fair use applies only to written works, while open source applies to
software development
-Fair use restricts the modification of copyrighted material, while
open source encourages modification and redistribution
Fair use restricts the modification of copyrighted material, while
open source encourages modification and redistribution
Which type of trademark requires examination, approval and registration with
the Trademark Office?
-Common-law trademark
-Collective trademark
-Service mark
-Registered trademark
Registered Trademark
The Computer Security Act of 1987 aimed to improve the security and privacy
of sensitive information in federal computer systems.
True
False
True
When a person claims a colleague’s work as their own achievement, what is the
likely cause of the unethical behavior?
-Ignorance
-Laziness
-Ambition
-Pressure
Ambition
Which of the following is defamation which is spoken?
-Libel
-Phishing
-Slander
-Cyberbully
Slander
Which of the following is also called a confidentiality agreement?
-Non-disclosure agreement
-Creative Commons license
-Patent
-Intellectual property agreement
Non-disclosure Agreement
Which of the following types of Creative Commons license adds the restriction
which no derivative works may be made from the original?
-CC-BY-NC
-CC-BY-NC-ND
-CC-BY
-CC-BY-ED
CC-BY-NC-ND
How long does a patent usually last in the United States?
-50 years
-20 years
-40 years
-10 years
20 Years
Which of the following is a trademark automatically received by an organization
when a symbol is being consistently used in the normal course of business?
-Open-source trademark
-Common-law trademark
-Common-license trademark
-Registered trademark
Common Law Trademark
How long does a copyright last?
-The life of the original author
-50 years
-The life of the original author -plus 70 years
-70 years
The life of the original author plus 70 years.
Which of the following organizations expanded the definition of identity theft?
-Federal Trade Commission
-Federal courts
-National Archives and Records Administration
-Bureau of Credit Reporting
Federal Trade Commission
Which of the following laws prohibits accessing a computer without
authorization or in excess of authorization?
-Identity Theft and Assumption Deterrence Act of 1998
-Computer Fraud and Abuse Act of 1986
-Computer Security Act of 1987
-Federal Privacy Act of 1974
Computer Fraud and Abuse Act of 1986
When a person plagiarizes another’s work to meet a deadline, what is the cause
of the unethical behavior?
-Ambition
-Ignorance
-Pressure
-Intent
Pressure
Which of the following is the act of damaging or attacking the reputation of
someone or something in a malicious or false way?
-Phishing
-Privacy invasion
-Cyberbully
-Defamation
Defamation
Which of the following is a symbol identifying a particular source of goods or
services from others?
-Creative Common license
-Copyright
-Patent
-Trademark
Trademark
Which of the following laws establishes a Code of Fair Information Practice?
-Federal Privacy Act of 1974
-Computer Fraud and Abuse Act of 1986
-Computer Security Act of 1987
-Identity Theft and Assumption Deterrence Act of 1998
Federal Privacy act of 1974
Which of the following laws aimed to improve the security and privacy of
sensitive information in federal computer systems?
-Identity Theft and Assumption -Deterrence Act of 1998
-Federal Privacy Act of 1974
-Computer Fraud and Abuse Act of 1986
-Computer Security Act of 1987
Computer Security Act of 1987
Which of the following terms best describes the rules members of a society
create to balance individual rights to self-determination against the needs of the
society as a whole?
-Laws
-Ethics
-Policies
-Regulations
Laws
Which of the following describes information literacy?
-The ability to find, evaluate and use information effectively and
ethically
-Using content online and sharing on digital platforms
-Creating and sharing information
-Sharing personal information online
The ability to find, evaluate and use information effectively and ethically
Which of the following is the primary goal of fact-checking resources?
-To promote specific political agendas
-To create and spread information
-To limit the use of electronic media
-To help users determine the accuracy of information
To help users determine the accuracy of information
Which of the following is NOT a strategy for determining the reliability of
information?
-Considering the date of the information
-Looking for multiple sources
-Checking the source
-Dismissing biases
Dismissing Biases
Which of the following best describes digital citizenship?
-Using the internet for personal entertainment
-The responsible and appropriate use of technology and the internet
-Sharing personal information online
-Posting comments or reviews -about others
The responsible use of technology and the internet
Which of the following is an example of cyberbullying?
-Disagreeing with someone’s opinion on social media
-Posting an embarrassing photo of a friend without their permission
-Posting a comment about a friend on social media
-Posting about a celebrity on social media
Posting and embarrassing photo of a friend without their permission
Which of the following is the purpose of fact-checking websites?
-To provide an opinion on current events
-To provide a list of credible sources for research
-To promote a specific political agenda
-To check the accuracy of claims made in news articles and other
sources
To check the accuracy of claims made in news articles and other sources
Which of the following is an important factor to consider when using a fact-
checking website?
-The website’s affiliation with a political party
-The website’s sources for its claims
-The website’s clear bias
-If the website is a non-profit or commercial organization
The website’s sources for its claims
Which of the following has the highest authentication setup?
-Face recognition
-Vein scanner
-Password
-Two-factor authentication
Vein Scanner
Which of the following can compromise the availability of information?
-Hardware failure
-Cyberattacks
-All the answer choices are correct
-Malware
All the answer choices are correct
How do businesses typically pay ransom?
-Cash on hand
-Employee salaries
-Business line of credit
-Insurance
Insurance
It is very easy to identify where ransomware, placed on a computer system,
originates.
-True
-False
False
What could happen to a business experiencing a ransomware attack where no
useable backup files are available?
-Data analyst insurance providers will recover the files for the
business
-Restore the system to the factory settings which is free of
ransomware
-Ransomware deletes all files from the network
-Pay the ransom to access the files
Pay the ransom to access the files
How can users avoid ransomware?
-Storing your files on a different network
-Having good backups of your files
-Storing your files somewhere other than your physical machine
-All of the answer choices are correct
All of the answer choices are correct