Exam 3: Networked Communications
Exam 1: Catalysts for Chang67 Questions
Exam 2: Introduction to Ethics50 Questions
Exam 3: Networked Communications38 Questions
Exam 4: Intellectual Property44 Questions
Exam 5: Information Privacy24 Questions
Exam 6: Privacy and the Government38 Questions
Exam 7: Computer and Network Security19 Questions
Exam 8: Computer Reliability27 Questions
Exam 9: Professional Ethics17 Questions
Exam 10: Work and Wealth27 Questions
Select questions type
Every object on the World Wide Web has a unique address called the __________________.
(Short Answer)
4.9/5
(37)
From the point of view of Kant or Mill, the responsibility for excessive Internet use lies with__________________ .
(Short Answer)
4.7/5
(42)
John Stuart Mill held that an institution to intervene in the conduct of an individual only when the intervention is needed to prevent harm to others. This is called the __________________.
(Short Answer)
4.7/5
(32)
In 2003, the U.S. Supreme Court ruled that the Child Internet Protection Act was_________ .
(Short Answer)
4.8/5
(42)
Many people are now using the Web not simply to download content, but to build communities and upload and share content they have created. This trend has been given the name
(Multiple Choice)
4.8/5
(40)
Th_________ Amendment to the Constitution guarantees freedom of speech and freedom of the press.
(Short Answer)
5.0/5
(33)
The act of assuming someone else's electronic identity is called _________.
(Short Answer)
4.9/5
(34)
Responding to concerns about excessive Internet use by its youth, the government of __________________issued a regulation requiring Internet providers to implement an "anti-online game addiction system."
(Short Answer)
4.8/5
(33)
Chinese "gold farmers" make a living by playing persistent online games and___________________________ .
(Short Answer)
4.9/5
(40)
Unsolicited, bulk, commercial email is commonly called_________.
(Short Answer)
4.7/5
(40)
In 18sup>th/sup> century America, there were no prior restraints on publication. This meant that colonists had the freedom to__________________ .
(Short Answer)
4.9/5
(41)
Trying to create a list of valid email addresses by sending email to randomly generated addresses and seeing which ones are delivered is called a _________.
(Short Answer)
4.8/5
(30)
A personal journal or diary kept on the Web is called a _________.
(Short Answer)
4.9/5
(36)
A Korean cybercafé where people play on-line, persistent games is called a
(Multiple Choice)
4.8/5
(39)
The three forms of direct censorship are___________________________and___________________________ .
(Short Answer)
4.7/5
(35)
Showing 21 - 38 of 38
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)