CS 202 EXAM 1 – Flashcards
Unlock all answers in this set
Unlock answersquestion
microblogging and life streaming are both forms of transparency
answer
true
question
the digitization of intellectual property and widespread internet use have made it easier to protect intellectual property from illegal distribution
answer
false
question
__________ is considered the most invasive
answer
network behavioral targeting
question
twitter is a _______ site
answer
microblogging
question
the DMCA was drafted and passed by the______
answer
United States
question
software distributed free of charge via the internet, where the developer retains the software rights
answer
freeware
question
software whose ownership rights are public property, and which is available to anyone at no cost
answer
public domain
question
software designed to meet the unique needs of an organization or business
answer
custom
question
type of software where some applications are free, some require a one-time registration fee, and some require a periodic subscription charge
answer
web apps
question
copyrighted software, such as Linux, that is typically distributed free of charge and can be customized
answer
open source
question
by learning how to protect stand-alone PCs, you also learn about he first line of defense for the networks to which those PCs may be connected
answer
true
question
rather than creating an archive, some users prefer to create an exact copy of their data files, using a technique called mirroring
answer
true
question
is a security process in which the identity of a person is verified
answer
authentication
question
Microsoft word uses___ Encryption, which is machine-level data encryption that can secure the entire hard drive and protect the data even if the PC is stolen
answer
BitLocker Drive
question
typical backup software collects the files you wish to back up into a compressed file called
answer
archive
question
a worm attaches itself to other programs, emailing those programs numerous times in an effort to overwhelm systems
answer
false
question
the second most common type of fraud is non-delivery of merchandise, which accounts for around 25% of internet fraud
answer
true
question
a hacker is an individual who subverts____ without authorization
answer
computer security
question
information security often comes at the cost of some level of connivence and privacy
answer
true
question
the free flow of digital information has created the need for a number of laws to protect the private information of consumers
answer
true
question
wiretapping involves secretly listening in on conversations taking place over telecommunications networks, including telephone, email, instant messaging, VoIP, and other internet communications
answer
true
question
privacy refers to being free from______
answer
intrusion
question
U.S._______laws refer to legislation that is invasive to individual privacy for a perceived greater good of the country
answer
privacy-invasive
question
traditional marketing uses a technique known as market______, where ads target customers based on their race, gender, income, education,age, and other general characteristics.
answer
segmentation
question
a copyright protects words, music,and other expressions for the life of the copyright holder plus 70 years
answer
true
question
the RISS has been successful in shutting down or helping to shut down most P2P services
answer
true
question
plagiarism has been an issue of legal and social concern for as long as people have produced intellectual property
answer
true
question
the digitization of intellectual property and widespread______ use have made it very difficult to protect intellectual property from illegal distribution
answer
internet
question
involves the illegal copying, use, and distribution of digital intellectual property such as software, music, and movies
answer
piracy
question
stealing others ideas and thoughts and presenting them as your own is a serious breach of ________ matched by serious penalties if you are caught
answer
copyright
question
DRM is typically associated with digital____files but is also used with other forms of online intellectual property
answer
audio
question
in ________, the Digital Millennium Copyright Act was made law
answer
1998