Deck 3: Networked Communications

ملء الشاشة (f)
exit full mode
سؤال
A wiki is

A) An online encyclopedia.
B) A personal journal kept on the Web.
C) An electronic profile constructed automatically by a Web browser.
D) A piece of software that allows ISPs to monitor who visits which Web sites.
E) A Web site that allows multiple people to contribute and edit its content.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Many people are now using the Web not simply to download content, but to build communities and upload and share content they have created. This trend has been given the name

A) Persistent online reality
B) Online networking
C) Web 2.0
D) Interactive hypermedia
E) Virtual reality
سؤال
Messages embedded in files transferred from one computer to another are commonly called

A) email.
B) the World Wide Web.
C) software.
D) the operating system.
E) the Internet.
سؤال
Cyberbullying is defined as inflicting psychological harm on another person using

A) the phone system.
B) the Internet.
C) broadcast media such as radio or television.
D) A and B.
E) A, B, and C.
سؤال
The volume of spam is increasing because

A) companies have found it to be effective.
B) it is 100 times less expensive than a traditional flyer sent via the U.S. mail.
C) some people respond to spam advertisements.
D) All of the above
E) None of the above
سؤال
A Web filter is a piece of software that

A) keeps track of the pages your Web browser displays.
B) sends Google information about your Web surfing habits.
C) prevents certain Web pages from being displayed by your browser.
D) prevents unauthorized people from using your computer to surf the Web.
E) A and B.
سؤال
How many Americans were the victims of identity theft in 2008 because of their online activities?

A) About 10,000.
B) About 100,000.
C) About 1 million.
D) About 10 million.
E) About 100 million.
سؤال
Sexting is causing a legal crisis because

A) police and prosecutors refuse to get involved in sexting cases.
B) police and prosecutors are treating sexting as a felony offense.
C) prisons are starting to fill up with people convicted of sexting.
D) police have been charged with possession of child pornography.
E) B and C.
سؤال
Which of the following laws was upheld as constitutional by the U.S. Supreme Court?

A) Communications Decency Act
B) Child Online Protection Act
C) Child Internet Protection Act
D) All of these laws were upheld as constitutional by the U.S. Supreme Court.
E) None of these laws were upheld as constitutional by the U.S. Supreme Court.
سؤال
Kimberly Young's test for Internet addiction is based on the diagnosis of

A) pathological gambling.
B) obsessive/compulsive behavior.
C) chronic sleeplessness.
D) anxiety disorders.
E) schizophrenia.
سؤال
The Enlightenment view of addiction is that

A) there is nothing wrong with addiction.
B) addiction is not real.
C) addiction can never be overcome by will-power alone.
D) society is responsible for the bad choices people make.
E) people are responsible for the choices they make.
سؤال
A Korean cybercafé where people play on-line, persistent games is called a

A) coffee clubhouse.
B) computer commons.
C) PC bang.
D) Tenretni Internet spelled backwards).
E) virtual reality theater.
سؤال
Trying to create a list of valid email addresses by sending email to randomly generated addresses and seeing which ones are delivered is called a .
سؤال
According to John Stuart Mill's Principle of Harm, the only ground on which the government should intervene in the conduct of an individual is when

A) the individual is breaking the law.
B) it would clearly be to the benefit of the individual.
C) the individual is under 18 or over 65.
D) it would prevent harm to others.
E) According to Mill, the government should intervene if any of the above conditions are true.
سؤال
Unsolicited, bulk, commercial email is commonly called .
سؤال
A blog is

A) a character in Lineage, a popular on-line game.
B) a personal journal kept on the Web.
C) a person who assumes a false identity in a chat room.
D) a special symbol visible on displays that show Unicode characters.
E) the Web version of a "couch potato."
سؤال
Sexting refers to

A) sending text messages with nude or nearly nude photographs.
B) sending emails with nude or nearly nude photographs.
C) posting nude or nearly nude photographs to a Web site.
D) A and B.
E) A, B, and C.
سؤال
Every object on the World Wide Web has a unique address called the .
سؤال
Which of these is not an example of direct censorship?

A) government monopolization
B) self-censorship.
C) pre-publication review.
D) licensing and registration.
E) All of the above are examples of direct censorship.
سؤال
In the United States, freedom of expression

A) is a positive right.
B) is not an absolute right.
C) is limited to political speech.
D) has been abolished by decisions of the U.S. Supreme Court.
E) is guaranteed by the Fourth Amendment to the U.S. Constitution.
سؤال
Chinese "gold farmers" make a living by playing persistent online games and .
سؤال
In 2003, the U.S. Supreme Court ruled that the Child Internet Protection Act was .
سؤال
The three forms of direct censorship are .
سؤال
A personal journal or diary kept on the Web is called a .
سؤال
Saudi Arabians have access to the Internet through a control center outside Riyadh which pornography sites, gambling sites, and sites offensive to Islam.
سؤال
The attempt to suppress or regulate public access to material considered offensive or harmful is called .
سؤال
John Stuart Mill held that an institution to intervene in the conduct of an individual only when the intervention is needed to prevent harm to others. This is called the .
سؤال
The Amendment to the Constitution guarantees freedom of speech and freedom of the press.
سؤال
From the point of view of Kant or Mill, the responsibility for excessive Internet use lies with .
سؤال
The Web is no longer a medium used to download information. Web users now have the ability to contribute content to the Web. This new way of using the Web has been given the name .
سؤال
The act of assuming someone else's electronic identity is called .
سؤال
In 18th century America, there were no prior restraints on publication. This meant that colonists had the freedom to .
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/32
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Networked Communications
1
A wiki is

A) An online encyclopedia.
B) A personal journal kept on the Web.
C) An electronic profile constructed automatically by a Web browser.
D) A piece of software that allows ISPs to monitor who visits which Web sites.
E) A Web site that allows multiple people to contribute and edit its content.
E
2
Many people are now using the Web not simply to download content, but to build communities and upload and share content they have created. This trend has been given the name

A) Persistent online reality
B) Online networking
C) Web 2.0
D) Interactive hypermedia
E) Virtual reality
C
3
Messages embedded in files transferred from one computer to another are commonly called

A) email.
B) the World Wide Web.
C) software.
D) the operating system.
E) the Internet.
A
4
Cyberbullying is defined as inflicting psychological harm on another person using

A) the phone system.
B) the Internet.
C) broadcast media such as radio or television.
D) A and B.
E) A, B, and C.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
5
The volume of spam is increasing because

A) companies have found it to be effective.
B) it is 100 times less expensive than a traditional flyer sent via the U.S. mail.
C) some people respond to spam advertisements.
D) All of the above
E) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
6
A Web filter is a piece of software that

A) keeps track of the pages your Web browser displays.
B) sends Google information about your Web surfing habits.
C) prevents certain Web pages from being displayed by your browser.
D) prevents unauthorized people from using your computer to surf the Web.
E) A and B.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
7
How many Americans were the victims of identity theft in 2008 because of their online activities?

A) About 10,000.
B) About 100,000.
C) About 1 million.
D) About 10 million.
E) About 100 million.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
8
Sexting is causing a legal crisis because

A) police and prosecutors refuse to get involved in sexting cases.
B) police and prosecutors are treating sexting as a felony offense.
C) prisons are starting to fill up with people convicted of sexting.
D) police have been charged with possession of child pornography.
E) B and C.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following laws was upheld as constitutional by the U.S. Supreme Court?

A) Communications Decency Act
B) Child Online Protection Act
C) Child Internet Protection Act
D) All of these laws were upheld as constitutional by the U.S. Supreme Court.
E) None of these laws were upheld as constitutional by the U.S. Supreme Court.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
10
Kimberly Young's test for Internet addiction is based on the diagnosis of

A) pathological gambling.
B) obsessive/compulsive behavior.
C) chronic sleeplessness.
D) anxiety disorders.
E) schizophrenia.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
11
The Enlightenment view of addiction is that

A) there is nothing wrong with addiction.
B) addiction is not real.
C) addiction can never be overcome by will-power alone.
D) society is responsible for the bad choices people make.
E) people are responsible for the choices they make.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
12
A Korean cybercafé where people play on-line, persistent games is called a

A) coffee clubhouse.
B) computer commons.
C) PC bang.
D) Tenretni Internet spelled backwards).
E) virtual reality theater.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
13
Trying to create a list of valid email addresses by sending email to randomly generated addresses and seeing which ones are delivered is called a .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
14
According to John Stuart Mill's Principle of Harm, the only ground on which the government should intervene in the conduct of an individual is when

A) the individual is breaking the law.
B) it would clearly be to the benefit of the individual.
C) the individual is under 18 or over 65.
D) it would prevent harm to others.
E) According to Mill, the government should intervene if any of the above conditions are true.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
15
Unsolicited, bulk, commercial email is commonly called .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
16
A blog is

A) a character in Lineage, a popular on-line game.
B) a personal journal kept on the Web.
C) a person who assumes a false identity in a chat room.
D) a special symbol visible on displays that show Unicode characters.
E) the Web version of a "couch potato."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
17
Sexting refers to

A) sending text messages with nude or nearly nude photographs.
B) sending emails with nude or nearly nude photographs.
C) posting nude or nearly nude photographs to a Web site.
D) A and B.
E) A, B, and C.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
18
Every object on the World Wide Web has a unique address called the .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of these is not an example of direct censorship?

A) government monopolization
B) self-censorship.
C) pre-publication review.
D) licensing and registration.
E) All of the above are examples of direct censorship.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
20
In the United States, freedom of expression

A) is a positive right.
B) is not an absolute right.
C) is limited to political speech.
D) has been abolished by decisions of the U.S. Supreme Court.
E) is guaranteed by the Fourth Amendment to the U.S. Constitution.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
21
Chinese "gold farmers" make a living by playing persistent online games and .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
22
In 2003, the U.S. Supreme Court ruled that the Child Internet Protection Act was .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
23
The three forms of direct censorship are .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
24
A personal journal or diary kept on the Web is called a .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
25
Saudi Arabians have access to the Internet through a control center outside Riyadh which pornography sites, gambling sites, and sites offensive to Islam.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
26
The attempt to suppress or regulate public access to material considered offensive or harmful is called .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
27
John Stuart Mill held that an institution to intervene in the conduct of an individual only when the intervention is needed to prevent harm to others. This is called the .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
28
The Amendment to the Constitution guarantees freedom of speech and freedom of the press.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
29
From the point of view of Kant or Mill, the responsibility for excessive Internet use lies with .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
30
The Web is no longer a medium used to download information. Web users now have the ability to contribute content to the Web. This new way of using the Web has been given the name .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
31
The act of assuming someone else's electronic identity is called .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
32
In 18th century America, there were no prior restraints on publication. This meant that colonists had the freedom to .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.