CIS 324 Computer Ethics Midterm Exam, questions and answers screenshots in a 7 page pdf
Which of the following changed its name to Arcadia University in 2001 in part because filters used to protect children blocked its Web site?
The legal guidelines for determining whether material is obscene include all of the following EXCEPT
Download Now(sent via email)
Which of the following is NOT a provision of the CAN-SPAM Act that applies to commercial e-mailers?
Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as:
Which of the following is NOT a malicious program used by hackers to gain access to your computer:
A cookie is
In the early days of computing (1960’s to the early 1970’s), a “hacker” was:
Personal data, including credit histories, for over 160,000 people were stolen from ChoicePoint. What technique did the thieves use?
One of the reasons the court ruled against Napster was:
Which of the following requirements was a key provision of the Children’s Internet Protection Act (CIPA)?
Software that monitors incoming communications and filters out those that are from untrusted sites, or fit a profile of suspicious activity, is called:
If a business follows an “opt-in” policy for handling personal data, information about a customer
In January 2000 Yahoo!, eBay, Amazon, E*Trade and other Web sites were shut down for several hours by what kind of attack?
Which of the following limits deceptive commercial e-mail and outlines spammers’ responsibilities:
Which of the following is an example of biometrics:
Claim rights or positive rights:
Which of the following is an example of a negative right or liberty:
When was the first copyright law passed?
When a person visits a Web site, his or her IP address and the links he or she clicked on are automatically recorded. This is an example of
Facebook, one of the first social-networking sites, was started as an online version of hardcopy student directories available at many colleges. Where did Facebook start?
Which of the following is not an exclusive right (subject to some exceptions) granted by copyright law?
A Trap and Trace logs
In the term “Free Software,” “free” implies all of the following except one. Which one?
The hacker group that broke into the BellSouth computers in the late 1980’s was known as:
The Communications Assistance for Law Enforcement Act (CALEA) said that
Dishonest sellers using online auction sites sometimes will bid on their own items to drive up the price. This practice is known as:
In 2000, a French court ordered Yahoo! to block access by French people to
Collecting evidence from computer files and disks is called:
Anonymizer.com provides tools and services to
Many countries have tried to censor the Internet. Which country issued the following edict in 2001: The office of communications is ordered to find ways to ensure that the use of the Internet becomes impossible.
The Privacy Act of 1974 established rules to regulate
Which of the following are the two main arguments against the Communications Decency Act accepted by the courts?
Which of the following is not a factor in determining fair use?