CIS 324 Midterm Exam

CIS 324 Computer Ethics Midterm Exam, questions and answers screenshots in a 7 page pdf

Question 1
Which of the following changed its name to Arcadia University in 2001 in part because filters used to protect children blocked its Web site?

Question 2
The legal guidelines for determining whether material is obscene include all of the following EXCEPT

Question 3
Hacktivism is:


Download Now
(sent via email)


Question 4
Which of the following is NOT a provision of the CAN-SPAM Act that applies to commercial e-mailers?

Question 5
Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as:

Question 6
Which of the following is NOT a malicious program used by hackers to gain access to your computer:

Question 7
A cookie is

Question 8
In the early days of computing (1960’s to the early 1970’s), a “hacker” was:

Question 9
Personal data, including credit histories, for over 160,000 people were stolen from ChoicePoint. What technique did the thieves use?

Question 10
One of the reasons the court ruled against Napster was:

Question 11
Which of the following requirements was a key provision of the Children’s Internet Protection Act (CIPA)?

Question 12
Software that monitors incoming communications and filters out those that are from untrusted sites, or fit a profile of suspicious activity, is called:

Question 13
If a business follows an “opt-in” policy for handling personal data, information about a customer

Question 14
In January 2000 Yahoo!, eBay, Amazon, E*Trade and other Web sites were shut down for several hours by what kind of attack?

Question 15
Which of the following limits deceptive commercial e-mail and outlines spammers’ responsibilities:

Question 16
Which of the following is an example of biometrics:

Question 17
Claim rights or positive rights:

Question 18
Which of the following is an example of a negative right or liberty:

Question 19
When was the first copyright law passed?

Question 20
When a person visits a Web site, his or her IP address and the links he or she clicked on are automatically recorded. This is an example of

Question 21
Facebook, one of the first social-networking sites, was started as an online version of hardcopy student directories available at many colleges. Where did Facebook start?

Question 22
Which of the following is not an exclusive right (subject to some exceptions) granted by copyright law?

Question 23
A Trap and Trace logs

Question 24
In the term “Free Software,” “free” implies all of the following except one. Which one?

Question 25
The hacker group that broke into the BellSouth computers in the late 1980’s was known as:

Question 26
The Communications Assistance for Law Enforcement Act (CALEA) said that

Question 27
Dishonest sellers using online auction sites sometimes will bid on their own items to drive up the price. This practice is known as:

Question 28
In 2000, a French court ordered Yahoo! to block access by French people to

Question 29
Collecting evidence from computer files and disks is called:

Question 30
Anonymizer.com provides tools and services to

Question 31
Many countries have tried to censor the Internet. Which country issued the following edict in 2001: The office of communications is ordered to find ways to ensure that the use of the Internet becomes impossible.

Question 32
The Privacy Act of 1974 established rules to regulate

Question 33
Which of the following are the two main arguments against the Communications Decency Act accepted by the courts?

Question 34
Which of the following is not a factor in determining fair use?


Download Now
(sent via email)

Leave a Reply