AND ANSWERS GRADED A+
✔✔Analyzing data to determine characteristics of people most likely to engage in a
certain behavior is: - ✔✔Computer profiling
✔✔For providing informed consent, the collector of the information may use information
only if person explicitly permits use (usually by checking a box) is: - ✔✔Opt-In
✔✔The Communications Assistance for Law Enforcement Act (CALEA): - ✔✔Requires
telecommunications equipment be designed to ensure that the government can
intercept telephone calls (with a court order or other authorization).
✔✔____ refers to a variety of proposals on how telecommunications companies interact
with their broadband customers and how they set charges for services. - ✔✔Net
neutrality
✔✔The CAN_SPAM Act applies to - ✔✔email sent to mobile devices only.
✔✔The First Amendment does NOT protect - ✔✔libel and specific threats.
✔✔The NSA contractor that passed thousands of documents to a reporter that showed
the extent to which the NSA was spying on U.S. citizens was: - ✔✔Edward Snowden
✔✔Countries where the national government owns the internet backbone include: -
✔✔Saudi Arabia
✔✔Which of the following is considered a free speech principle? - ✔✔Covers spoken
and written words, art, pictures and other forms of expression of ideas and opinion.
✔✔Most efforts to censor the internet focuses on: - ✔✔pornographic and other sexually
explicit material
✔✔The federal crime for commercial web sites to make available to minors materials
"harmful to minors" as judged by community standards (which was later found to be
unconstitutional) was the - ✔✔Child Online Protection Act of 1998 (COPA).
✔✔Positive uses of anonymity include: - ✔✔protects against retaliation and
embarrassment
✔✔A web filter is a piece of software that - ✔✔prevents certain Web pages from being
displayed by your browser.
, ✔✔studying an existing program in order to determine how it was created - ✔✔Reverse
Engineering
✔✔refers to the way a software program appears to the end-user as opposed to the
computer code in which the program is written - ✔✔"look and feel"
✔✔an Act which prohibits making, distributing, or using tools(devices, software, or
services) to circumvent technological copyright protection systems - ✔✔DMCA
✔✔program in which the base code is modifiable by an end-user - ✔✔Open Source
Software
✔✔a collection of technologies (hardware and software) that control use of intellectual
property in digital formats - ✔✔DRM
✔✔When was the first copyright law passed? - ✔✔1790
✔✔In the term "Free Software," "free" implies all of the following except one. Which
one? - ✔✔Free of cost
✔✔Which of the following is not an exclusive right (subject to some exceptions) granted
by copyright law? - ✔✔profit from the work
✔✔Which of the following is not a factor in determining fair use? - ✔✔the for-profit or
non-profit status of the copyright holder
✔✔The U.S. Supreme Court decision in Sony v. Universal City Studios established the
concept of - ✔✔recording for viewing at a later time
✔✔A program with a benign capability that conceals another, sinister purpose is called
a - ✔✔Trojan horse
✔✔Which of the following is NOT an example of biometrics: - ✔✔digital signatures
✔✔Hacktivism is: - ✔✔the use of hacking to promote a political cause
✔✔Websites that are made to look attractive to hackers, but are closely monitored so
that everything the hacker does is tracked, recorded, and studied is know as -
✔✔honeypots
✔✔Collecting evidence from computer files and disks is called: - ✔✔computer forensics