Deck 19: Legal and Ethical Aspects

ملء الشاشة (f)
exit full mode
سؤال
Land and things permanently attached to the land, such as trees, buildings, and stationary mobile homes are _______.

A) real property
B) cyber property
C) personal property
D) intellectual property
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The first comprehensive privacy legislation adopted in the UnitedStates was the Privacy Act of 1974.
سؤال
An example of a patent from the computer security realm is the RSApublic-key cryptosystem.
سؤال
Computer technology has involved the creation of new types ofentities for which no agreed ethical rules have previously been formed.
سؤال
The success of cybercriminals, and the relative lack of success of law enforcement, influence the behavior of _______.

A) cyber thieves
B) cybercrime victims
C) cybercrime acts
D) cyber detectives
سؤال
Computers as targets is a form of crime that involves an attack on dataintegrity, system integrity, data confidentiality, privacy, or availability.
سؤال
The Common Criteria specification is primarily concerned with theprivacy of personal information concerning the individual rather than the privacy of an individual with respect to that individual's use of computer resources.
سؤال
The purpose of the privacy functions is to provide a user protectionagainst discovery and misuse of identity by other users.
سؤال
Computer attacks are considered crimes but do not carry criminalsanctions.
سؤال
Any intangible asset that consists of human knowledge and ideas is _______.

A) cyber property
B) personal property
C) intellectual property
D) real property
سؤال
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the target system without authorization or payment, or to alter the integrity of data or interfere with the availability of the computer or server.

A) Computers as targets
B) Computers as storage devices
C) Computers as mediums
D) Computers as communication tools
سؤال
Software is an example of real property.
سؤال
The relative lack of success in bringing cybercriminals to justice hasled to an increase in their numbers, boldness, and the global scale of their operations.
سؤال
Concerns about the extent to which personal privacy has been andmay be compromised have led to a variety of legal and technical approaches to reinforcing privacy rights.
سؤال
Anyone can join the Ad Hoc Committee on Responsible Computing.
سؤال
No cybercriminal databases exist that can point investigators tolikely suspects.
سؤال
The successful use of law enforcement depends much more ontechnical skills than on people skills.
سؤال
Personal effects, moveable property and goods, such as cars, bank accounts, wages, securities, a small business, furniture, insurance policies, jewelry, patents, and pets are all examples of _________.

A) intellectual property
B) real property
C) personal property
D) cyber property
سؤال
A servicemark is the same as a trademark except that it identifies anddistinguishes the source of a service rather than a product.
سؤال
The legal and ethical aspects of computer security encompass a broadrange of topics.
سؤال
A ______ handles the financial transaction for issuing the digital license to the consumer and pays royalty fees to the content provider and distribution fees to the distributor accordingly.
سؤال
The invasion of the rights secured by patents, copyrights, and trademarks is ________.
سؤال
The three types of patents are: utility patents, design patents, and ________.
سؤال
The three main types of intellectual property for which legal protection is available are: copyrights, patents, and _______.
سؤال
________ ensures that a user may make multiple uses of resources or services without others being able to link these uses together.

A) Anonymity
B) Pseudonymity
C) Unobservability
D) Unlinkability
سؤال
_______ or cybercrime, is a term used broadly to describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity.
سؤال
The right to seek civil recourse against anyone infringing his or her property is granted to the ________.
سؤال
A _______ for an invention is the grant of a property right to the inventor.

A) patent
B) copyright
C) trademark
D) claim
سؤال
________ rights may be used to prevent others from using a confusingly similar mark, but not to prevent others from making the same goods or from selling the same goods or services under a clearly different mark.
سؤال
________ is a function that removes specific identifying information from query results, such as last name and telephone number, but creates some sort of unique identifier so that analysts can detect connections between queries.

A) Anonymization
B) Data transformation
C) Immutable audit
D) Selective revelation
سؤال
________ is a method for minimizing exposure of individual information while enabling continuous analysis of potentially interconnected data.

A) Immutable audit
B) Selective revelation
C) Associative memory
D) Anonymization
سؤال
The copyright owner has which exclusive right(s)?

A) reproduction right
B) distribution right
C) modification right
D) all of the above
سؤال
______ is intended to permit others to perform, show, quote, copy, and otherwise distribute portions of the work for certain purposes.

A) Reverse engineering
B) Personal privacy
C) Fair use
D) Encryption research
سؤال
A ______ is a word, name, symbol, or device that is used in trade with goods to indicate the source of the goods and to distinguish them from the goods of others.

A) copyright
B) patent
C) trademark
D) all of the above
سؤال
The U.S. legal system distinguishes three primary types of property: real property, personal property, and _________ property.
سؤال
A ________ provides distribution channels, such as an online shop or a Web retailer.

A) content provider
B) distributor
C) consumer
D) clearinghouse
سؤال
A(n) _________ may be granted to anyone who invents or discovers any new and useful process, machine, article of manufacture, or composition of matter, or any new and useful improvement thereof.
سؤال
The 2001 _________ is the first international treaty seeking to address Internet crimes by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations.
سؤال
_____ strengthens the protection of copyrighted materials in digital format.

A) HIPPA
B) DMCA
C) WIPO
D) DRM
سؤال
_____ can be copyrighted.

A) Dramatic works
B) Architectural works
C) Software-related works
D) All of the above
سؤال
Both policy and ________ approaches are needed to protect privacy when both government and nongovernment organization seek to learn as much as possible about individuals.
سؤال
The ___________ Act places restrictions on online organizations in the collection of data from children under the age of 13.
سؤال
The _________ Act confers certain rights on individuals and obligations on credit reporting agencies.
سؤال
Privacy is broken down into four major areas: anonymity, unlinkability, unobservability, and _________.
سؤال
_______ refers to a system of moral principles that relates to the benefits and harms of particular actions, and to the rightness and wrongness of motives and ends of those actions.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 19: Legal and Ethical Aspects
1
Land and things permanently attached to the land, such as trees, buildings, and stationary mobile homes are _______.

A) real property
B) cyber property
C) personal property
D) intellectual property
A
2
The first comprehensive privacy legislation adopted in the UnitedStates was the Privacy Act of 1974.
True
3
An example of a patent from the computer security realm is the RSApublic-key cryptosystem.
True
4
Computer technology has involved the creation of new types ofentities for which no agreed ethical rules have previously been formed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
5
The success of cybercriminals, and the relative lack of success of law enforcement, influence the behavior of _______.

A) cyber thieves
B) cybercrime victims
C) cybercrime acts
D) cyber detectives
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
6
Computers as targets is a form of crime that involves an attack on dataintegrity, system integrity, data confidentiality, privacy, or availability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
7
The Common Criteria specification is primarily concerned with theprivacy of personal information concerning the individual rather than the privacy of an individual with respect to that individual's use of computer resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
8
The purpose of the privacy functions is to provide a user protectionagainst discovery and misuse of identity by other users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
9
Computer attacks are considered crimes but do not carry criminalsanctions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
10
Any intangible asset that consists of human knowledge and ideas is _______.

A) cyber property
B) personal property
C) intellectual property
D) real property
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
11
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the target system without authorization or payment, or to alter the integrity of data or interfere with the availability of the computer or server.

A) Computers as targets
B) Computers as storage devices
C) Computers as mediums
D) Computers as communication tools
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
12
Software is an example of real property.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
13
The relative lack of success in bringing cybercriminals to justice hasled to an increase in their numbers, boldness, and the global scale of their operations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
14
Concerns about the extent to which personal privacy has been andmay be compromised have led to a variety of legal and technical approaches to reinforcing privacy rights.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
15
Anyone can join the Ad Hoc Committee on Responsible Computing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
16
No cybercriminal databases exist that can point investigators tolikely suspects.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
17
The successful use of law enforcement depends much more ontechnical skills than on people skills.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
18
Personal effects, moveable property and goods, such as cars, bank accounts, wages, securities, a small business, furniture, insurance policies, jewelry, patents, and pets are all examples of _________.

A) intellectual property
B) real property
C) personal property
D) cyber property
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
19
A servicemark is the same as a trademark except that it identifies anddistinguishes the source of a service rather than a product.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
20
The legal and ethical aspects of computer security encompass a broadrange of topics.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
21
A ______ handles the financial transaction for issuing the digital license to the consumer and pays royalty fees to the content provider and distribution fees to the distributor accordingly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
22
The invasion of the rights secured by patents, copyrights, and trademarks is ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
23
The three types of patents are: utility patents, design patents, and ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
24
The three main types of intellectual property for which legal protection is available are: copyrights, patents, and _______.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
25
________ ensures that a user may make multiple uses of resources or services without others being able to link these uses together.

A) Anonymity
B) Pseudonymity
C) Unobservability
D) Unlinkability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
26
_______ or cybercrime, is a term used broadly to describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
27
The right to seek civil recourse against anyone infringing his or her property is granted to the ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
28
A _______ for an invention is the grant of a property right to the inventor.

A) patent
B) copyright
C) trademark
D) claim
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
29
________ rights may be used to prevent others from using a confusingly similar mark, but not to prevent others from making the same goods or from selling the same goods or services under a clearly different mark.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
30
________ is a function that removes specific identifying information from query results, such as last name and telephone number, but creates some sort of unique identifier so that analysts can detect connections between queries.

A) Anonymization
B) Data transformation
C) Immutable audit
D) Selective revelation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
31
________ is a method for minimizing exposure of individual information while enabling continuous analysis of potentially interconnected data.

A) Immutable audit
B) Selective revelation
C) Associative memory
D) Anonymization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
32
The copyright owner has which exclusive right(s)?

A) reproduction right
B) distribution right
C) modification right
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
33
______ is intended to permit others to perform, show, quote, copy, and otherwise distribute portions of the work for certain purposes.

A) Reverse engineering
B) Personal privacy
C) Fair use
D) Encryption research
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
34
A ______ is a word, name, symbol, or device that is used in trade with goods to indicate the source of the goods and to distinguish them from the goods of others.

A) copyright
B) patent
C) trademark
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
35
The U.S. legal system distinguishes three primary types of property: real property, personal property, and _________ property.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
36
A ________ provides distribution channels, such as an online shop or a Web retailer.

A) content provider
B) distributor
C) consumer
D) clearinghouse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
37
A(n) _________ may be granted to anyone who invents or discovers any new and useful process, machine, article of manufacture, or composition of matter, or any new and useful improvement thereof.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
38
The 2001 _________ is the first international treaty seeking to address Internet crimes by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
39
_____ strengthens the protection of copyrighted materials in digital format.

A) HIPPA
B) DMCA
C) WIPO
D) DRM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
40
_____ can be copyrighted.

A) Dramatic works
B) Architectural works
C) Software-related works
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
41
Both policy and ________ approaches are needed to protect privacy when both government and nongovernment organization seek to learn as much as possible about individuals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
42
The ___________ Act places restrictions on online organizations in the collection of data from children under the age of 13.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
43
The _________ Act confers certain rights on individuals and obligations on credit reporting agencies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
44
Privacy is broken down into four major areas: anonymity, unlinkability, unobservability, and _________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
45
_______ refers to a system of moral principles that relates to the benefits and harms of particular actions, and to the rightness and wrongness of motives and ends of those actions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.