Deck 29: Computer Privacy and Speech

ملء الشاشة (f)
exit full mode
سؤال
Online marketers of products and services have quickly recognized that learning about consumers' online behavior presents a real opportunity to increase their:

A) sales.
B) interests.
C) forces.
D) departments.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Federal criminal statutes are not used to prosecute computer crime.
سؤال
The rules relating to legal purpose and competent parties in contract law do not apply to agreements made in the form of wagers placed online.
سؤال
Even if an employer promises not to read the employee's e-mail messages,courts in some states have still ruled that the promise does not create a reasonable expectation of privacy.
سؤال
It is not a crime under the ECPA to disclose to a third party the contents of stored computer information that has been obtained without permission.
سؤال
The process in which a legitimate Web site is reproduced in order to fool users into thinking that they are connected to a trusted site is known as:

A) spoofing.
B) cookie.
C) crunch.
D) froth.
سؤال
The rules of defamation vary depending on whether one is or is not a public figure.
سؤال
Under the ECPA there must be intent to exceed authorization for a crime to be committed; the Computer Fraud and Abuse Act (CFAA)also requires such intent if the intrusion onto another person's computer stored information causes damage.
سؤال
When individuals learn that someone has posted an untruth about them,especially when such untruth harms them professionally,they often attempt to hold their ISP liable.
سؤال
Transferring funds from one bank account to another,changing students' grades in college computer files,and crediting accounts for purchases made are not instances of unauthorized use of computers.
سؤال
Spam is undesirable because it can drain an ISP's resources,strain network bandwidth,and clog a user's e-mail folders.
سؤال
Sometimes pictures that are contained on Web sites are alleged to be defamatory.
سؤال
There are _______ distinct rights of privacy generally recognized in the United States.

A) six
B) four
C) five
D) two
سؤال
While there are currently no federal laws prohibiting the use of cookies when gathering information regarding adults,the Children's Online Privacy Protection Act prohibits this practice when minors are involved,unless there is parental consent.
سؤال
The Electronic Communications Privacy Act (ECPA)makes it a federal crime to monitor e-mail during real time,that is,when it is being sent or received.
سؤال
The rapid advances in technology being experienced today make it difficult for people to maintain online anonymity or distance between themselves and powerful:

A) sales.
B) interests.
C) forces.
D) departments.
سؤال
The laws governing online gambling vary from state to state,and most states have pending regulations that would severely restrict how and when such gambling may take place.
سؤال
A file that is imbedded on the hard drive of a computer,often without a person's knowledge,that collects and stores information about the user and his or her behavior,including the Web sites that have been visited,is known as a:

A) spoof.
B) cookie.
C) crunch.
D) froth.
سؤال
From a legal standpoint,it is not allowable for a seller to solicit via e-mail.
سؤال
Defamatory statements would include slander but not libel.
سؤال
Even if a person's intent is good and his or her conduct accidentally causes damage,then he or she may be prosecuted for a federal crime under the:

A) Can-Spam Act.
B) Electronic Communications Privacy Act.
C) Computer Fraud and Abuse Act.
D) Electronic Funds Transfer Act.
سؤال
To use any device that is part of an electronic transfer mechanism to steal money,goods,or services or to alter data,interrupt wire transmissions,or use stolen codes or passwords,when the purpose of such activity is to obtain something of value unlawfully,is a federal offense under the:

A) Can-Spam Act.
B) Electronic Communications Privacy Act.
C) Computer Fraud and Abuse Act.
D) Electronic Funds Transfer Act.
سؤال
Federal and state laws make most forms of gambling:

A) official.
B) illegal.
C) unethical.
D) beneficial.
سؤال
The Electronic Communications Privacy Act (ECPA)states that individuals may not gain access without permission to a(n):

A) fund transfer system.
B) cyberspace privacy system.
C) electronic communication system.
D) antiviral organization.
سؤال
Under the ECPA,to disclose to a third party the contents of stored computer information that has been obtained without permission is a(n):

A) treachery.
B) crime.
C) tort.
D) allegiance.
سؤال
In the case of newspapers,the ___________ may not recover damages unless he or she can show that the newspaper acted with actual malice.

A) journalist
B) agent
C) individual inflicted with distress
D) defamed individual
سؤال
A bank employee who programs the bank's computer to make deductions from one or several accounts,and to deposit the funds to an account set up and controlled by the employee,could be prosecuted for ______________even though he or she had not touched actual currency.

A) counterfeiting
B) embezzlement
C) falsification
D) fraud
سؤال
Many experts argue that the problem with the legal definition of __________ is that it is too vague and ambiguous.

A) defamation
B) sexual harassment
C) spoofing
D) obscenity
سؤال
Unsolicited e-mails sent for commercial purposes are popularly referred to as:

A) spam.
B) cookie.
C) virus.
D) spyware.
سؤال
A person who gains unauthorized access to computers,either for mischief or with criminal intent,is called a(n):

A) imposter.
B) fraud.
C) genius.
D) hacker.
سؤال
Unauthorized access to computers invites violation of:

A) objectives.
B) duties.
C) rights.
D) goals.
سؤال
Speech that harms a person's reputation is referred to as:

A) intentional infliction of emotional distress.
B) obscene statement.
C) defamation.
D) deception.
سؤال
When a person sustains severe anxiety,the injured party may sue the offending party for causing:

A) illegal interference in privacy.
B) intentional infliction of emotional distress.
C) obscene statement.
D) defamation.
سؤال
Instructions hidden in software with the potential to cause significant damage to both hardware and software is a:

A) virus.
B) piracy.
C) corruption.
D) façade.
سؤال
It is a problematic issue as to how offshore gambling can be regulated,where ___________ laws generally do not apply.

A) consumer protection
B) human rights
C) constitutional
D) administrative
سؤال
Federal legislation disallows most,but not all kinds of online:

A) gambling.
B) surfing.
C) monitoring.
D) screening.
سؤال
Many computer crimes,particularly those in which the computer is used as a means of engaging in criminal activity,are simply technologically advanced versions of:

A) precipitate crimes.
B) statutory crimes.
C) standard crimes.
D) narcissistic crimes.
سؤال
Consumers who believe that their right to privacy is being violated by the embedding of software can complain to the:

A) Federal Tort Curbing Agency.
B) Administration and Trade Commission.
C) Agency against Unfair Trade Practices.
D) Federal Trade Commission.
سؤال
The ECPA also grants an Internet service provider (ISP)the right to __________ e-mail messages without the subscriber's consent.

A) monitor
B) screen
C) block
D) redirect
سؤال
A federal statute passed to regulate Web sites that contain obscene material or child pornography has now been ruled by the courts to violate due process of law to be:

A) ambiguous.
B) ultravirus.
C) unconstitutional.
D) unstatutory.
سؤال
Identify and describe the three major areas that the Computer Fraud and Abuse Act (CFAA)covers.
سؤال
Do Internet Service Providers have the legal right to monitor their subscribers' e-mail without consent,and what steps do these ISPs take to protect themselves in this process?
سؤال
Bryan,an employee of Anderson Co.,regularly placed orders for raw materials with Sasha,an employee of Kleinman Glass Corporation.Bryan then sent an e-mail to Sasha through his work e-mail account,asking her to go out to dinner with him.Bryan's immediate supervisor at Anderson Co.read the e-mail.What consequences will Bryan have to face for his act?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/43
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 29: Computer Privacy and Speech
1
Online marketers of products and services have quickly recognized that learning about consumers' online behavior presents a real opportunity to increase their:

A) sales.
B) interests.
C) forces.
D) departments.
A
2
Federal criminal statutes are not used to prosecute computer crime.
False
3
The rules relating to legal purpose and competent parties in contract law do not apply to agreements made in the form of wagers placed online.
False
4
Even if an employer promises not to read the employee's e-mail messages,courts in some states have still ruled that the promise does not create a reasonable expectation of privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
5
It is not a crime under the ECPA to disclose to a third party the contents of stored computer information that has been obtained without permission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
6
The process in which a legitimate Web site is reproduced in order to fool users into thinking that they are connected to a trusted site is known as:

A) spoofing.
B) cookie.
C) crunch.
D) froth.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
7
The rules of defamation vary depending on whether one is or is not a public figure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
8
Under the ECPA there must be intent to exceed authorization for a crime to be committed; the Computer Fraud and Abuse Act (CFAA)also requires such intent if the intrusion onto another person's computer stored information causes damage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
9
When individuals learn that someone has posted an untruth about them,especially when such untruth harms them professionally,they often attempt to hold their ISP liable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
10
Transferring funds from one bank account to another,changing students' grades in college computer files,and crediting accounts for purchases made are not instances of unauthorized use of computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
11
Spam is undesirable because it can drain an ISP's resources,strain network bandwidth,and clog a user's e-mail folders.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
12
Sometimes pictures that are contained on Web sites are alleged to be defamatory.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
13
There are _______ distinct rights of privacy generally recognized in the United States.

A) six
B) four
C) five
D) two
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
14
While there are currently no federal laws prohibiting the use of cookies when gathering information regarding adults,the Children's Online Privacy Protection Act prohibits this practice when minors are involved,unless there is parental consent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
15
The Electronic Communications Privacy Act (ECPA)makes it a federal crime to monitor e-mail during real time,that is,when it is being sent or received.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
16
The rapid advances in technology being experienced today make it difficult for people to maintain online anonymity or distance between themselves and powerful:

A) sales.
B) interests.
C) forces.
D) departments.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
17
The laws governing online gambling vary from state to state,and most states have pending regulations that would severely restrict how and when such gambling may take place.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
18
A file that is imbedded on the hard drive of a computer,often without a person's knowledge,that collects and stores information about the user and his or her behavior,including the Web sites that have been visited,is known as a:

A) spoof.
B) cookie.
C) crunch.
D) froth.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
19
From a legal standpoint,it is not allowable for a seller to solicit via e-mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
20
Defamatory statements would include slander but not libel.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
21
Even if a person's intent is good and his or her conduct accidentally causes damage,then he or she may be prosecuted for a federal crime under the:

A) Can-Spam Act.
B) Electronic Communications Privacy Act.
C) Computer Fraud and Abuse Act.
D) Electronic Funds Transfer Act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
22
To use any device that is part of an electronic transfer mechanism to steal money,goods,or services or to alter data,interrupt wire transmissions,or use stolen codes or passwords,when the purpose of such activity is to obtain something of value unlawfully,is a federal offense under the:

A) Can-Spam Act.
B) Electronic Communications Privacy Act.
C) Computer Fraud and Abuse Act.
D) Electronic Funds Transfer Act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
23
Federal and state laws make most forms of gambling:

A) official.
B) illegal.
C) unethical.
D) beneficial.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
24
The Electronic Communications Privacy Act (ECPA)states that individuals may not gain access without permission to a(n):

A) fund transfer system.
B) cyberspace privacy system.
C) electronic communication system.
D) antiviral organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
25
Under the ECPA,to disclose to a third party the contents of stored computer information that has been obtained without permission is a(n):

A) treachery.
B) crime.
C) tort.
D) allegiance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
26
In the case of newspapers,the ___________ may not recover damages unless he or she can show that the newspaper acted with actual malice.

A) journalist
B) agent
C) individual inflicted with distress
D) defamed individual
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
27
A bank employee who programs the bank's computer to make deductions from one or several accounts,and to deposit the funds to an account set up and controlled by the employee,could be prosecuted for ______________even though he or she had not touched actual currency.

A) counterfeiting
B) embezzlement
C) falsification
D) fraud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
28
Many experts argue that the problem with the legal definition of __________ is that it is too vague and ambiguous.

A) defamation
B) sexual harassment
C) spoofing
D) obscenity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
29
Unsolicited e-mails sent for commercial purposes are popularly referred to as:

A) spam.
B) cookie.
C) virus.
D) spyware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
30
A person who gains unauthorized access to computers,either for mischief or with criminal intent,is called a(n):

A) imposter.
B) fraud.
C) genius.
D) hacker.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
31
Unauthorized access to computers invites violation of:

A) objectives.
B) duties.
C) rights.
D) goals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
32
Speech that harms a person's reputation is referred to as:

A) intentional infliction of emotional distress.
B) obscene statement.
C) defamation.
D) deception.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
33
When a person sustains severe anxiety,the injured party may sue the offending party for causing:

A) illegal interference in privacy.
B) intentional infliction of emotional distress.
C) obscene statement.
D) defamation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
34
Instructions hidden in software with the potential to cause significant damage to both hardware and software is a:

A) virus.
B) piracy.
C) corruption.
D) façade.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
35
It is a problematic issue as to how offshore gambling can be regulated,where ___________ laws generally do not apply.

A) consumer protection
B) human rights
C) constitutional
D) administrative
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
36
Federal legislation disallows most,but not all kinds of online:

A) gambling.
B) surfing.
C) monitoring.
D) screening.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
37
Many computer crimes,particularly those in which the computer is used as a means of engaging in criminal activity,are simply technologically advanced versions of:

A) precipitate crimes.
B) statutory crimes.
C) standard crimes.
D) narcissistic crimes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
38
Consumers who believe that their right to privacy is being violated by the embedding of software can complain to the:

A) Federal Tort Curbing Agency.
B) Administration and Trade Commission.
C) Agency against Unfair Trade Practices.
D) Federal Trade Commission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
39
The ECPA also grants an Internet service provider (ISP)the right to __________ e-mail messages without the subscriber's consent.

A) monitor
B) screen
C) block
D) redirect
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
40
A federal statute passed to regulate Web sites that contain obscene material or child pornography has now been ruled by the courts to violate due process of law to be:

A) ambiguous.
B) ultravirus.
C) unconstitutional.
D) unstatutory.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
41
Identify and describe the three major areas that the Computer Fraud and Abuse Act (CFAA)covers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
42
Do Internet Service Providers have the legal right to monitor their subscribers' e-mail without consent,and what steps do these ISPs take to protect themselves in this process?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
43
Bryan,an employee of Anderson Co.,regularly placed orders for raw materials with Sasha,an employee of Kleinman Glass Corporation.Bryan then sent an e-mail to Sasha through his work e-mail account,asking her to go out to dinner with him.Bryan's immediate supervisor at Anderson Co.read the e-mail.What consequences will Bryan have to face for his act?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.