Exam 29: Computer Privacy and Speech

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Transferring funds from one bank account to another, changing students' grades in college computer files, and crediting accounts for purchases made are not instances of unauthorized use of computers.

(True/False)
4.8/5
(32)

A file that is imbedded on the hard drive of a computer, often without a person's knowledge, that collects and stores information about the user and his or her behavior, including the Web sites that have been visited, is known as a:

(Multiple Choice)
4.9/5
(32)

A bank employee who programs the bank's computer to make deductions from one or several accounts, and to deposit the funds to an account set up and controlled by the employee, could be prosecuted for ______________even though he or she had not touched actual currency.

(Multiple Choice)
5.0/5
(38)

Spam is undesirable because it can drain an ISP's resources, strain network bandwidth, and clog a user's e-mail folders.

(True/False)
4.9/5
(41)

Federal legislation disallows most, but not all kinds of online:

(Multiple Choice)
4.8/5
(43)

There are _______ distinct rights of privacy generally recognized in the United States.

(Multiple Choice)
4.7/5
(31)

The laws governing online gambling vary from state to state, and most states have pending regulations that would severely restrict how and when such gambling may take place.

(True/False)
4.7/5
(33)

Speech that harms a person's reputation is referred to as:

(Multiple Choice)
4.8/5
(30)

The rules relating to legal purpose and competent parties in contract law do not apply to agreements made in the form of wagers placed online.

(True/False)
4.8/5
(38)

Even if an employer promises not to read the employee's e-mail messages, courts in some states have still ruled that the promise does not create a reasonable expectation of privacy.

(True/False)
4.8/5
(43)

Identify and describe the three major areas that the Computer Fraud and Abuse Act (CFAA) covers.

(Essay)
4.9/5
(39)

The process in which a legitimate Web site is reproduced in order to fool users into thinking that they are connected to a trusted site is known as:

(Multiple Choice)
4.8/5
(37)

Defamatory statements include slander but not libel.

(True/False)
4.8/5
(43)

Many experts argue that the problem with the legal definition of __________ is that it is too vague and ambiguous.

(Multiple Choice)
4.9/5
(39)

The Electronic Communications Privacy Act (ECPA) states that individuals may not gain access to a(n) _____without permission.

(Multiple Choice)
4.9/5
(30)

It is not a crime under the ECPA to disclose to a third party the contents of stored computer information that has been obtained without permission.

(True/False)
4.8/5
(42)

Unauthorized access to computers invites violation of:

(Multiple Choice)
4.9/5
(37)

When a person sustains severe anxiety, the injured party may sue the offending party for:

(Multiple Choice)
4.9/5
(39)

Unsolicited e-mails sent for commercial purposes are popularly referred to as:

(Multiple Choice)
4.8/5
(39)

Do Internet Service Providers have the legal right to monitor their subscribers' e-mail without consent, and what steps do these ISPs take to protect themselves in this process?

(Essay)
4.8/5
(44)
Showing 21 - 40 of 43
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)