Deck 3: Networked Communications

Full screen (f)
exit full mode
Question
Which of the following is not a variant of Internet addiction, according to psychiatrist Jerald Block?

A) excessive gaming
B) sexual preoccupations
C) cyberbullying
D) e-mail/text messaging
E) Actually, all of the above are variants of Internet addiction, according to Block.
Use Space or
up arrow
down arrow
to flip the card.
Question
According to John Stuart Mill's Principle of Harm, the only ground on which the government should intervene in the conduct of an individual is when

A) the individual is breaking the law.
B) it would clearly be to the benefit of the individual.
C) the individual is under 18 or over 65.
D) it would prevent harm to others.
E) According to Mill, the government should intervene if any of the above conditions are true.
Question
Sexting is causing a legal crisis because

A) police and prosecutors refuse to get involved in sexting cases.
B) police and prosecutors are treating sexting as a felony offense.
C) prisons are starting to fill up with people convicted of sexting.
D) police have been charged with possession of child pornography.
E) B and C.
Question
Revenge porn is a special case of

A) cyberbullying.
B) Internet addiction.
C) child abuse.
D) identity theft.
E) censorship.
Question
A wiki is

A) An online encyclopedia.
B) A personal journal kept on the Web.
C) An electronic profile constructed automatically by a Web browser.
D) A piece of software that allows ISPs to monitor who visits which Web sites.
E) A Web site that allows multiple people to contribute and edit its content.
Question
Many people are now using the Web not simply to download content, but to build communities and upload and share content they have created. This trend has been given the name

A) Persistent online reality
B) Online networking
C) Web 2.0
D) Interactive hypermedia
E) Virtual reality
Question
A Web filter is a piece of software that

A) keeps track of the pages your Web browser displays.
B) sends Google information about your Web surfing habits.
C) prevents certain Web pages from being displayed by your browser.
D) prevents unauthorized people from using your computer to surf the Web.
E) A and B.
Question
The volume of spam is increasing because

A) companies have found it to be effective.
B) it is 30,000 times less expensive than a traditional flyer sent via the U.S. mail.
C) some people respond to spam advertisements.
D) All of the above
E) None of the above
Question
The Enlightenment view of addiction is that

A) there is nothing wrong with addiction.
B) addiction is not real.
C) addiction can never be overcome by will-power alone.
D) society is responsible for the bad choices people make.
E) people are responsible for the choices they make.
Question
Which of the following laws was upheld as constitutional by the U.S. Supreme Court?

A) Communications Decency Act
B) Child Online Protection Act
C) Child Internet Protection Act
D) All of these laws were upheld as constitutional by the U.S. Supreme Court.
E) None of these laws were upheld as constitutional by the U.S. Supreme Court.
Question
Cyberbullying is defined as inflicting psychological harm on another person using

A) the phone system.
B) the Internet.
C) broadcast media such as radio or television.
D) A and B.
E) A, B, and C.
Question
In the United States, freedom of expression

A) is a positive right.
B) is not an absolute right.
C) is limited to political speech.
D) has been abolished by decisions of the U.S. Supreme Court.
E) is guaranteed by the Fourth Amendment to the U.S. Constitution.
Question
How many people trust a business more after reading positive online reviews?

A) A very small percentage of consumers.
B) About one-third of consumers.
C) About three-quarters of consumers.
D) Nearly 100% of consumers.
E) No one has ever conducted such a study.
Question
Sexting refers to

A) sending text messages with nude or nearly nude photographs.
B) sending emails with nude or nearly nude photographs.
C) posting nude or nearly nude photographs to a Web site.
D) A and B.
E) A, B, and C.
Question
How many Americans are victims of identity theft each year?

A) About 10,000.
B) About 100,000.
C) About 1 million.
D) About 10 million.
E) About 100 million.
Question
What is one reason why college students are five times more likely than other adults to be victims of identity theft?

A) Most college students use their parents' credit cards.
B) Most college students have at most one personal credit card.
C) College students are particularly vulnerable to phishing attacks.
D) Many students live in close proximity with others and do not do a good job securing checkbooks and financial documents.
E) All of the above.
Question
Unsolicited, bulk, commercial email is commonly called .
Question
A Korean cybercafé where people play on-line, persistent games is called a

A) coffee clubhouse.
B) computer commons.
C) PC bang.
D) Tenretni Internet spelled backwards).
E) virtual reality theater.
Question
Which of these is not an example of direct censorship?

A) government monopolization
B) self-censorship
C) pre-publication review
D) licensing and registration
E) All of the above are examples of direct censorship.
Question
A blog is

A) a character in Lineage, a popular on-line game.
B) a personal journal kept on the Web.
C) a person who assumes a false identity in a chat room.
D) a special symbol visible on displays that show Unicode characters.
E) the Web version of a "couch potato."
Question
The Internet of Things refers to .
Question
In 2003, the U.S. Supreme Court ruled that the Child Internet Protection Act was .
Question
In 18sup>th/sup> century America, there were no prior restraints on publication. This meant that colonists had the freedom to .
Question
The attempt to suppress or regulate public access to material considered offensive or harmful is called .
Question
John Stuart Mill held that an institution to intervene in the conduct of an individual only when the intervention is needed to prevent harm to others. This is called the .
Question
The three forms of direct censorship are .
Question
The Amendment to the Constitution guarantees freedom of speech and freedom of the press.
Question
Web users have the ability to contribute content to the Web. This way of using the Web has been given the name .
Question
Responding to concerns about excessive Internet use by its youth, the government of issued a regulation requiring Internet providers to implement an
"anti-online game addiction system."
Question
A personal journal or diary kept on the Web is called a .
Question
From the point of view of Kant or Mill, the responsibility for excessive Internet use lies with .
Question
An online method to get information or ideas from a large group of people is commonly known as .
Question
Saudi Arabians have access to the Internet through a control center outside Riyadh which pornography sites, gambling sites, and sites offensive to Islam.
Question
Every object on the World Wide Web has a unique address called the .
Question
The act of assuming someone else's electronic identity is called .
Question
Chinese "gold farmers" make a living by playing persistent online games and .
Question
Mobile apps allow users of devices such as to access the Internet and download and upload data.
Question
Trying to create a list of valid email addresses by sending email to randomly generated addresses and seeing which ones are delivered is called a .
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/38
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Networked Communications
1
Which of the following is not a variant of Internet addiction, according to psychiatrist Jerald Block?

A) excessive gaming
B) sexual preoccupations
C) cyberbullying
D) e-mail/text messaging
E) Actually, all of the above are variants of Internet addiction, according to Block.
C
2
According to John Stuart Mill's Principle of Harm, the only ground on which the government should intervene in the conduct of an individual is when

A) the individual is breaking the law.
B) it would clearly be to the benefit of the individual.
C) the individual is under 18 or over 65.
D) it would prevent harm to others.
E) According to Mill, the government should intervene if any of the above conditions are true.
D
3
Sexting is causing a legal crisis because

A) police and prosecutors refuse to get involved in sexting cases.
B) police and prosecutors are treating sexting as a felony offense.
C) prisons are starting to fill up with people convicted of sexting.
D) police have been charged with possession of child pornography.
E) B and C.
B
4
Revenge porn is a special case of

A) cyberbullying.
B) Internet addiction.
C) child abuse.
D) identity theft.
E) censorship.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
5
A wiki is

A) An online encyclopedia.
B) A personal journal kept on the Web.
C) An electronic profile constructed automatically by a Web browser.
D) A piece of software that allows ISPs to monitor who visits which Web sites.
E) A Web site that allows multiple people to contribute and edit its content.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
6
Many people are now using the Web not simply to download content, but to build communities and upload and share content they have created. This trend has been given the name

A) Persistent online reality
B) Online networking
C) Web 2.0
D) Interactive hypermedia
E) Virtual reality
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
7
A Web filter is a piece of software that

A) keeps track of the pages your Web browser displays.
B) sends Google information about your Web surfing habits.
C) prevents certain Web pages from being displayed by your browser.
D) prevents unauthorized people from using your computer to surf the Web.
E) A and B.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
8
The volume of spam is increasing because

A) companies have found it to be effective.
B) it is 30,000 times less expensive than a traditional flyer sent via the U.S. mail.
C) some people respond to spam advertisements.
D) All of the above
E) None of the above
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
9
The Enlightenment view of addiction is that

A) there is nothing wrong with addiction.
B) addiction is not real.
C) addiction can never be overcome by will-power alone.
D) society is responsible for the bad choices people make.
E) people are responsible for the choices they make.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following laws was upheld as constitutional by the U.S. Supreme Court?

A) Communications Decency Act
B) Child Online Protection Act
C) Child Internet Protection Act
D) All of these laws were upheld as constitutional by the U.S. Supreme Court.
E) None of these laws were upheld as constitutional by the U.S. Supreme Court.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
11
Cyberbullying is defined as inflicting psychological harm on another person using

A) the phone system.
B) the Internet.
C) broadcast media such as radio or television.
D) A and B.
E) A, B, and C.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
12
In the United States, freedom of expression

A) is a positive right.
B) is not an absolute right.
C) is limited to political speech.
D) has been abolished by decisions of the U.S. Supreme Court.
E) is guaranteed by the Fourth Amendment to the U.S. Constitution.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
13
How many people trust a business more after reading positive online reviews?

A) A very small percentage of consumers.
B) About one-third of consumers.
C) About three-quarters of consumers.
D) Nearly 100% of consumers.
E) No one has ever conducted such a study.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
14
Sexting refers to

A) sending text messages with nude or nearly nude photographs.
B) sending emails with nude or nearly nude photographs.
C) posting nude or nearly nude photographs to a Web site.
D) A and B.
E) A, B, and C.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
15
How many Americans are victims of identity theft each year?

A) About 10,000.
B) About 100,000.
C) About 1 million.
D) About 10 million.
E) About 100 million.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
16
What is one reason why college students are five times more likely than other adults to be victims of identity theft?

A) Most college students use their parents' credit cards.
B) Most college students have at most one personal credit card.
C) College students are particularly vulnerable to phishing attacks.
D) Many students live in close proximity with others and do not do a good job securing checkbooks and financial documents.
E) All of the above.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
17
Unsolicited, bulk, commercial email is commonly called .
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
18
A Korean cybercafé where people play on-line, persistent games is called a

A) coffee clubhouse.
B) computer commons.
C) PC bang.
D) Tenretni Internet spelled backwards).
E) virtual reality theater.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
19
Which of these is not an example of direct censorship?

A) government monopolization
B) self-censorship
C) pre-publication review
D) licensing and registration
E) All of the above are examples of direct censorship.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
20
A blog is

A) a character in Lineage, a popular on-line game.
B) a personal journal kept on the Web.
C) a person who assumes a false identity in a chat room.
D) a special symbol visible on displays that show Unicode characters.
E) the Web version of a "couch potato."
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
21
The Internet of Things refers to .
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
22
In 2003, the U.S. Supreme Court ruled that the Child Internet Protection Act was .
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
23
In 18sup>th/sup> century America, there were no prior restraints on publication. This meant that colonists had the freedom to .
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
24
The attempt to suppress or regulate public access to material considered offensive or harmful is called .
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
25
John Stuart Mill held that an institution to intervene in the conduct of an individual only when the intervention is needed to prevent harm to others. This is called the .
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
26
The three forms of direct censorship are .
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
27
The Amendment to the Constitution guarantees freedom of speech and freedom of the press.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
28
Web users have the ability to contribute content to the Web. This way of using the Web has been given the name .
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
29
Responding to concerns about excessive Internet use by its youth, the government of issued a regulation requiring Internet providers to implement an
"anti-online game addiction system."
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
30
A personal journal or diary kept on the Web is called a .
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
31
From the point of view of Kant or Mill, the responsibility for excessive Internet use lies with .
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
32
An online method to get information or ideas from a large group of people is commonly known as .
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
33
Saudi Arabians have access to the Internet through a control center outside Riyadh which pornography sites, gambling sites, and sites offensive to Islam.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
34
Every object on the World Wide Web has a unique address called the .
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
35
The act of assuming someone else's electronic identity is called .
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
36
Chinese "gold farmers" make a living by playing persistent online games and .
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
37
Mobile apps allow users of devices such as to access the Internet and download and upload data.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
38
Trying to create a list of valid email addresses by sending email to randomly generated addresses and seeing which ones are delivered is called a .
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 38 flashcards in this deck.