AND ANSWERS GRADED A+
✔✔Positive uses of anonymity include: - ✔✔protects against retaliation and
embarrassment
✔✔A web filter is a piece of software that - ✔✔prevents certain Web pages from being
displayed by your browser.
✔✔refers to the way a software program appears to the end-user as opposed to the
computer code in which the program is written - ✔✔"look and feel"
✔✔studying an existing program in order to determine how it was created - ✔✔Reverse
Engineering
✔✔a collection of technologies (hardware and software) that control use of intellectual
property in digital formats - ✔✔DRM
✔✔an Act which prohibits making, distributing, or using tools(devices, software, or
services) to circumvent technological copyright protection systems - ✔✔DMCA
✔✔program in which the base code is modifiable by an end-user - ✔✔Open Source
Software
✔✔When was the first copyright law passed? - ✔✔1790
✔✔In the term "Free Software," "free" implies all of the following except one. Which
one? - ✔✔Free of cost
✔✔Which of the following is not an exclusive right (subject to some exceptions) granted
by copyright law? - ✔✔profit from the work
✔✔Which of the following is not a factor in determining fair use? - ✔✔the for-profit or
non-profit status of the copyright holder
✔✔The U.S. Supreme Court decision in Sony v. Universal City Studios established the
concept of - ✔✔recording for viewing at a later time
✔✔A program with a benign capability that conceals another, sinister purpose is called
a - ✔✔Trojan horse
✔✔Which of the following is NOT an example of biometrics: - ✔✔digital signatures
, ✔✔Hacktivism is: - ✔✔the use of hacking to promote a political cause
✔✔Websites that are made to look attractive to hackers, but are closely monitored so
that everything the hacker does is tracked, recorded, and studied is know as -
✔✔honeypots
✔✔Collecting evidence from computer files and disks is called: - ✔✔computer forensics
✔✔An attack in which a botnet overwhelms websites, mail servers, or other Internet
locations with so many requests for service that normal users cannot access the sites or
services is called: - ✔✔denial of service
✔✔Manipulating someone within an organization to gain access to confidential
information is called - ✔✔social engineering
✔✔Determining that a person is who he or she claims to be on a computer is called -
✔✔authentication
✔✔False web sites that seek private and financial information by planting false URLs in
domain name servers are called - ✔✔pharming
✔✔Various crimes in which criminals use the identity of an unknowing, innocent person
is called - ✔✔identity theft
✔✔An obligation of some people to provide certain things for others - ✔✔positive rights
(claim-rights)
✔✔The right to act without interference - ✔✔negative rights (liberties)
✔✔Tend to emphasize duty and absolute rules, to be followed whether they lead to
good or ill consequences in particular cases. - ✔✔Deontologists
✔✔Restricts the way in which personal data can be used by federal agencies.
Individuals must be permitted access to information stored about them and may correct
any information that is incorrect. Agencies must insure both the security and
confidentiality of any sensitive information. - ✔✔Privacy Act of 1974
✔✔Person must request (usually by checking a box) that an organization not use
information. - ✔✔Opt-out
✔✔First major Internet censorship law. Tried to avoid conflict with the 1st amendment
by focusing on children making it a crime for any obscene communication with anyone
under 18. Unconstitutional. - ✔✔Communications Decency Act (CDA)