Answers complete @ https://www.stuvia.com/doc/2111581/ccm-computingcarnegie-
mellon-exam_answered-2022.
Which of the following best summarizes the Computing Policy?
A. The Computing Policy is a community standard that establishes your responsibility
to behave as a mature, reasonable and ethical person.
B. The Computing Policy establishes specific student responsibilities for behaving in
compliance with state and federal law.
C. The Computing Policy explicitly defines all prohibited computing behaviors as
required by the DMCA.
Which of the following options is NOT a possible penalty for violating the university's
Computing Policy?
A. Community service
B. Confiscation of personal computing equipment
C. Academic suspension
D. Fines
Which of the following is NOT a responsibility established by the Computing Policy?
A. Maintain the security and confidentiality of your account.
B. Behave in ways that are respectful of others' property and privacy rights.
C. Communicate in proper and legal ways.
D. Use computing resources only for academic coursework.
E. Share resources in a responsible way.
---------addresses the question of how certain you can be about the accuracy of your
resources and information.
A. Integrity
B. Confidentiality
C. Availability
D. None of the above
Maintaining the --------- of information means ensuring that the data has not been
changed inappropriately, whether these changes are accidental and innocent or are
intentional and malicious.
A. Integrity
B. Confidentiality
C. Availability
D. None of the above
Devon visits his neighbor's room to get help on a homework assignment. While there,
he logs into his Andrew account and forgets to log out before he leaves. His neighbor
notices that the account is still logged in and adds a course to Devon's academic
schedule. Which of the following has been violated?
, A. Confidentiality
B. Integrity
C. Availability
D. None of the above
The ------ of a resource refers to how timely and reliable access to that resource is.
A. Confidentiality
B. Integrity
C. Availability
D. None of the above
Maintaining the ------ of a resource means that authorized users are able to reliably get
to the specific machine or information when needed.
A. Confidentiality
B. Integrity
C. Availability
D. None of the above
---------- is about ensuring that only authorized users have access and that unauthorized
users are excluded.
A. Confidentiality
B. Integrity
C. Availability
D. None of the above
After dating for a year, Guadalupe and Harley share everything, including their Andrew
passwords. Guadalupe begins reading Harley's mail and discovers that Harley's been
seeing other people. In a rage, Guadalupe deletes mail and changes the password.
Guadalupe has compromised the ----------- of Harley's account.
A. Confidentiality
B. Integrity
C. Availability
D. None of the above
P2P applications:
A. are not permitted on the Carnegie Mellon network.
B. are illegal to use in the United States.
C. can allow users to exchange files directly with other users.
D. are built only to facilitate illegal sharing of music and movies.
The Digital Millennium Copyright Act:
A. Extends the duration of copyright for digital works published after 2000.
B. Exempts institutions of higher education from copyright compliance requirements.
C. Provides rules for online service providers that can limit their liability for copyright
violations.
D. Criminalizes the use of P2P applications for any use whatsoever.
Under the provisions of the DMCA, Carnegie Mellon is obligated to: