













Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A set of practice questions and answers for a final exam in cis 3250, covering topics such as offshoring, cookies, informed consent, digital divide, technological singularity, and copyright law. The questions are multiple choice and offer a range of options for students to test their understanding of key concepts and terminology.
Typology: Exams
1 / 21
This page cannot be seen from the preview
Don't miss anything!
The practice of companies in other countries employing people in the U.S. is known as: A. Downsizing B. Inshoring C. Offshoring D. Globalization - ** VERIFIED ANSWERS **✔✔B. Inshoring What is a cookie? A. A virus placed on your computer B. Search features of some web sited C. Files a web site stores on a visitor's computer D. A bakery treat - ** VERIFIED ANSWERS **✔✔C. Files a web site stores on a visitor's computer Which of the following occupations can sometimes cause Repetitive Strain Injuries? A. Musician B. All of these C. Sign-language interpreter of the def D. Computer programmer - ** VERIFIED ANSWERS **✔✔B. All of these What is Informed Consent? A. You agree to waive your Constitutional rights B. In writing you waive your right to have an attorney present during an arrest
C. A ruling by the Supreme Court that requires police to obtain written permission before they start questioning you D. You are aware and agree to the data being collected about you - ** VERIFIED ANSWERS **✔✔D. You are aware and agree to the data being collected about you Which of the following factors contribute to security weakness? A. History of the Internet and the Web B. Human nature C. Speed at which new applications develop D. All of these - ** VERIFIED ANSWERS **✔✔D. All of these Digital Divide - ** VERIFIED ANSWERS **✔✔Refers to the fact that some people have access to computers and information technology while others do not Technological Singularity - ** VERIFIED ANSWERS **✔✔Point at which artificial intelligence advances so far that we cannot comprehend what lies on the other side One Laptop per Child - ** VERIFIED ANSWERS **✔✔A nonprofit organization that supplies an inexpensive laptop computers designed for elementary school children in developing countries Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studies are known as: A. Computer entrapment B. Hacker crackdown C. Honeypots D. Digital surveillance - ** VERIFIED ANSWERS **✔✔C. Honeypots Libel tourism does NOT have which of the following characteristics? A. The content was posted on the Web on servers outside of England
Which of the following is not a factor specified is U.S. copyright law for determining fair use? A. The for-profit or non-profit status of the copyright holder B. The amount and significance of the portion used C. The purpose and nature of the use D. The effect on the market for the copyrighted work - ** VERIFIED ANSWERS **✔✔A. The for-profit or non-profit status of the copyright holder When was the first U.S. copyright law passed? A. In 1970 B. In 1790 C. In 1780 D. In 1880 - ** VERIFIED ANSWERS **✔✔B. In 1790 Which of the following is NOT a principle for producing good systems? A. Understood what success means B. Overestimate the costs and time a project will take C. Include users in the design and testing stages D. Be open and honest about capabilities, safety and limitations of software - ** VERIFIED ANSWERS **✔✔B. Overestimate the costs and time a project will take Which of the following is NOT a Neo-Luddite criticism of computers? A. Use of computers in schools thwarts development of social skills B. Computers separate humans from nature and destroy the environment C. Computers cause social inequity D. None of these - ** VERIFIED ANSWERS **✔✔D. None of these Most of the delay in the opening of the Denver International Airport was because of problems with
The "safe harbor" provisions of _______________ protect Websites from lawsuits and criminal charges for copyright infringement when users post infringing material. A. No Electronic Theft Act B. U.S. copyright law C. Recording Industry Association of America Act D. Digital Millennium Copyright Act - ** VERIFIED ANSWERS **✔✔D. Digital Millennium Copyright Act In the term "Free Software", "free" implies all of the following except one. Which one? A. Free to modify B. Free to copy C. Free to cost D. Freedom - ** VERIFIED ANSWERS **✔✔C. Free of cost What is the Golden Rule? A. An eye for an eye and a tooth for a tooth B. Treat others as you would have them treat you C. There are no riles, only guidelines D. Each man/women for themselves - ** VERIFIED ANSWERS **✔✔B. Treat others as you would have them treat you When one goes behind Rawl's veil of ignorance, what is one ignorant of? A. Whether someone is telling the truth or not B. Of one's own prejudice C. Other individuals personal feelings D. Each person does not know his/her own gender, race, age, talents, wealth and so on - ** VERIFIED ANSWERS **✔✔D. Each person does not know his/her own gender, race, age, talents, wealth and so on
There are four factors to consider in deciding whether a use of copyrighted material is a fair use. Which of the following is not one of those factors? A. The effect of the use on potential market for or value of the copyrighted work B. The nature of the copyright work C. The amount and significance of the portion used D. The purpose and nature of the use us only for nonprofit organizational purposes - ** VERIFIED ANSWERS **✔✔D. The purpose and nature of the use us only for nonprofit organizational purposes Phishing is defined as which of the following? A. An attack in which hackers overload a target site with requests for information B. Websites that are specifically designed to be attractive to hackers C. Planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site D. Sending millions of emails requesting information to use to impersonate someone and steal money or goods - ** VERIFIED ANSWERS **✔✔D. Sending millions of emails requesting information to use to impersonate someone and steal money or goods What does the term personal information mean? A. Relationship issues B. Personal preference information about things like favorite food or color C. Bits of data that can be used to uniquely identify a person D. Any information relating to, it traceable to, and individual person - ** VERIFIED ANSWERS **✔✔D. Any information relating to, it traceable to, and individual person Select an application referenced in the book for speech recognition A. Teach foreign language B. Answer questions from Apple's Siri
What areas is covered by the topics of Free Speech? A. Other forms of expression and opinion B. Spoken and written Words C. All of these D. Pictures and Art - ** VERIFIED ANSWERS **✔✔C. All of these Which of the following is not an example of biometrics: A. Fingerprints B. Passport C. DNA D. Voice prints - ** VERIFIED ANSWERS **✔✔B. Passport Which of the following is not a way for software to be protected against copyright infringement? A. Hardware B. Registrations C. Make all software free D. Self-destructive software - ** VERIFIED ANSWERS **✔✔C. Make all software free Which of the following is NOT a purpose of monitoring employee communications? A. Initiate complaints of harassment B. Checking compliance with rules of communications C. Measuring or increasing productivity D. Training - ** VERIFIED ANSWERS **✔✔A. Initiate complaints of harassment In 2000,a French court ordered Yahoo! to block access by French people to A. A Website containing instructions for making bombs
B. Online auction sites containing Nazi materials C. Websites containing pornography D. An Al Qaeda manual - ** VERIFIED ANSWERS **✔✔B. Online auction sites containing Nazi materials In one application of a voice-recognition system, the system failed to recognize female speakers. A likely reason was A. Women do not speak as loudly as men, and the systems used inferior microphones B. The program was specifically designed for men C. The program was primarily developed and tested by men D. Womens voices are inherently harder to recognize - ** VERIFIED ANSWERS **✔✔C. The program was primarily developed and tested by men Honey pots is defined as which of the following? A. Planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site B. Websites that are specifically designed to be attractive to hackers C. Sending millions of emails requesting information to use to impersonate someone and steal money or goods D. An attack in which hackers overload a target site with requests for information - ** VERIFIED ANSWERS **✔✔B. Websites that are specifically designed to be attractive to hackers Which one of the media areas has the most First Amendment protection? A. Broadcast B. Interpersonal communication C. Common Carriers D. Print - ** VERIFIED ANSWERS **✔✔D. Print Lawsuits in 1978 delayed the introduction of technology for consumer CD- recoding devices for music
Some computer errors are actually system failures, in that it was the human/computer interface which caused the resulting problem.
The USA PATRIOT ACT (2001) gives individuals more protection from governmental intrusion