Exam 5: Freedom of Expression
Exam 1: An Overview of Ethics85 Questions
Exam 2: Ethics for It Workers and It Users85 Questions
Exam 3: Computer and Internet Crime90 Questions
Exam 4: Privacy95 Questions
Exam 5: Freedom of Expression90 Questions
Exam 6: Intellectual Property90 Questions
Exam 7: Software Development90 Questions
Exam 8: The Impact of Information Technology on Productivity and the Quality of Life90 Questions
Exam 9: Social Networking85 Questions
Exam 10: Ethics of It Organizations85 Questions
Select questions type
The ____________________ can be used to identify the sender of an e-mail or an online posting.
Free
(Short Answer)
4.7/5
(36)
Correct Answer:
IP address
With ____________________ filtering, a particular URL or domain name is identified as belonging to an objectionable site, and the user is not allowed access to it.
Free
(Short Answer)
4.9/5
(27)
Correct Answer:
URL
Making either an oral or a written statement of alleged fact that is false and harms another is called slander.
Free
(True/False)
5.0/5
(36)
Correct Answer:
False
Pornography purveyors are free to produce and publish whatever they want; however, if what they distribute is judged obscene, they are subject to prosecution under the Children's Internet Protection Act.
(True/False)
4.8/5
(39)
Employee blogging involves the risk that employees might reveal ____________________ or breach federal security disclosure laws.
(Short Answer)
4.9/5
(30)
The Second Amendment to the U.S. Constitution was adopted to guarantee the right to freedom of expression.
(True/False)
4.7/5
(40)
Pornography purveyors are free to produce and publish whatever they want; however, if what they distribute or exhibit is judged ____________________, they are subject to prosecution under obscenity laws.
(Short Answer)
4.8/5
(28)
Anonymous expression in the U.S. began around the time of ____.
(Multiple Choice)
4.8/5
(26)
Internet users who want to remain anonymous can send e-mail to a(n) ____________________ which uses software to strip our the originating IP number from the message and then forwards the message to the intended recipient.
(Short Answer)
4.7/5
(34)
Under the ICRA rating system, the ICRA does not rate Web content, the ____________________ do.
(Short Answer)
4.8/5
(30)
____________________ harassment aimed at a specific person can be prosecuted under the law.
or
or
or
(Short Answer)
4.8/5
(36)
Fewer and fewer organizations are allowing their employees to create their own personal blogs relating to their employment.
(True/False)
4.8/5
(43)
After a three judge federal panel ruled unanimously that the Communications Decency Act unconstitutionally restricted ____, the government appealed to the Supreme Court in a case that became known as Reno v. ACLU.
(Multiple Choice)
4.9/5
(36)
Its broad accessibility, open discussions, and ____________________ make the Internet a remarkable communications medium.
(Short Answer)
4.8/5
(35)
The Children's Internet Protection Act required federally financed ____________________ to use some form of technological protection to block computer access to material considered harmful to minors.
or
or
or
(Short Answer)
4.8/5
(29)
The California State Court in Pre-Paid Legal v. Sturtz et al. set a legal precedent that refined the criteria that courts apply when deciding whether or not to approve subpoenas requesting the identity of ____________________ Web posters.
(Short Answer)
4.9/5
(32)
Miller v. California is the Supreme Court case that established a test to determine ____.
(Multiple Choice)
4.8/5
(31)
In Reno v. ACLU, the Supreme Court ruled that the same free-speech protections apply to communication over the Internet as exists for print communication.
(True/False)
4.8/5
(31)
Showing 1 - 20 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)