Deck 10: The Internet and Social Media

Full screen (f)
exit full mode
Question
A _____________ is a personal Web page that comments on the news and provides links to stories that back up the commentary with evidence.

A) dialog
B) blog
C) usenet
D) listserv
Use Space or
up arrow
down arrow
to flip the card.
Question
The first electronic digital computer,_____________,was developed by the British during World War II to help break the German's secret code.

A) ENIAC
B) UNIVAC
C) Colossus
D) ARPA
Question
According to long-time New Yorker columnist A.J.Liebling,freedom of the press is guaranteed to

A) all.
B) the media literate.
C) those who own the presses.
D) citizens in a democracy.
Question
The idea that we use social media to communicate our actual identities is the

A) dual factor model of social media use.
B) fear of missing out.
C) idealized virtual identity hypothesis.
D) extended real-life hypothesis.
Question
Websites that function as online communities of users are called

A) listservs.
B) VoIP.
C) Usenet.
D) social networking sites.
Question
The idea that social media users tend to show idealized characteristics that don't represent who they are is

A) extended real-life hypothesis..
B) idealized virtual identity hypothesis.
C) fear of missing out.
D) dual factor model of social media use.
Question
Proponents of Internet freedom see its _____________ as providing protection for unpopular expression;proponents of greater Internet control see it as the Internet's greatest danger.

A) anonymity
B) reach
C) breadth
D) low cost
Question
The dual-factor model of social media use claims our engagement with social media is motivated by the need to belong and the need

A) for self-esteem.
B) for self-presentation.
C) to staying current.
D) to not miss out.
Question
The Apple II personal computer was developed by

A) Steve Jobs and Stephen Wozniak.
B) Bill Gates and Paul Allen.
C) Paul Baran and Paul Allen.
D) Steven Bellovin and Vinton Cerf.
Question
Computers that reduce information to a code made up of the digits 1 and 0 for storage and manipulation use a _____________ code.

A) abacus
B) binary
C) plenary
D) primary
Question
The "originator of the computer" was _____________,an Englishman,who in 1836 produced designs for a "computer" that could conduct algebraic computations using stored memory and punch cards for input and output.

A) John Napier
B) Blaise Pascal
C) Gottfried Leibnitz
D) Charles Babbage
Question
The global network of interconnected computers that communicate freely and share and exchange information is called the

A) Information Superhighway.
B) protocol.
C) World Wide Web.
D) Internet.
Question
The availability of trustworthy _____________-coding and decoding-technologies that make online use of credit and bank card numbers,addresses,social security numbers,and other sensitive information safer for both seller and buyer has fueled interest in the Internet as a place to do business.

A) Web-lock
B) encryption
C) Net filter
D) scanner
Question
In 1962,_____________ of the Rand Corporation proposed a packet-switching system that would allow the military to maintain command over its missiles and planes in the event of a nuclear attack.It is the basis of what we know today as the Internet.

A) John Mauchly
B) Paul Allen
C) Paul Baran
D) Steve Jobs
Question
The development of the _____________-with its small size,absence of heat,and low cost-made personal computers possible.

A) terminal
B) microcomputer
C) vacuum tube
D) semiconductor
Question
Computers that link individual personal computer users to the Internet are called

A) terminals.
B) mainframes.
C) ARPANET.
D) hosts.
Question
The "network of networks," consisting of LANs (Local Area Networks-networks connecting two or more computers,usually within the same building)and WANs (Wide Area Networks-networks that connect several LANs in different locations),is called the

A) provider.
B) World Wide Web.
C) Internet.
D) host.
Question
The most well known and arguably the most effective ______ Web site is MoveOn.org.

A) commercial
B) spam-free
C) blogging
D) activist
Question
The first "full-service" electronic computer,_____________,was based on the work of Iowa State University's John V.Atanasoff and introduced by scientists John Mauchly and John Presper Eckert of the University of Pennsylvania in 1946.

A) ENIAC
B) UNIVAC
C) Colossus
D) ARPA
Question
The first successful commercial computer,used by the Census Bureau in 1951,was

A) ENIAC.
B) UNIVAC.
C) Colossus.
D) ARPANET.
Question
The heart of the Web lies in the _____________ (common communication rules and languages)that define its use.

A) software
B) operating systems
C) protocols
D) search engines
Question
In 2012,the Internet industry and federal government responded to users' fear for their
Personal privacy with ________________,voluntary guidelines asking sites to place a "do
Not track" button on their Web pages.

A) network neutrality
B) the Protect Intellectual Property Act
C) the Stop Online Piracy Act
D) the Consumer Privacy Bill of Rights
Question
_____________ is the massive collection,distillation,and distribution of consumer data willingly given by consumers.

A) Direct marketing
B) Authorized data sale
C) Dataveillance
D) Clipping
Question
_____________ is a form of technologically imposed censorship,in which people without the new communication technology have diminished access to the information it makes available.

A) Cyberdemocracy
B) The information gap
C) The Information slow lane
D) The technology gap
Question
_____________,the requirement that all ISPs
Allow the free and equal flow of all web traffic,is at the center of the fight over SOPA (Stop
Online Piracy Act)and the PIPA (Protect Intellectual Property Act).

A) Network neutrality
B) Opt-out
C) Opt-in
D) Consumer Privacy Bill of Rights
Question
Sensing that the future of computing was in personal computers and that computers' power would reside not in their size but in the software that ran them,_____________ dropped out of Harvard University in 1975 and,with his friend _____________,founded Microsoft Corporation.

A) Steve Jobs;Stephen Wozniak
B) Bill Gates;Paul Allen
C) Paul Baran;Paul Allen
D) Steven Bellovin;Vinton Cerf
Question
The intensity of the online world can sometimes trigger ____________ in teens.

A) Facebook depression.
B) social isolation.
C) Facebook envy.
D) fear of missing out.
Question
Telephone over the Internet in which voice messages are transmitted in digital packets is

A) IM.
B) Web telephony.
C) routing.
D) VoIP.
Question
Each file or directory on the Internet (that is,on the host computer connected to the Internet)is designated by an address,called its

A) Packet Locating Number (PLN).
B) Uniform Resource Locator (URL).
C) Local Area Network (LAN).
D) Internet Information Locator (IIL).
Question
Instances in which copyrighted material may be used without permission or payment are referred to as

A) commodification of information.
B) fair use.
C) blogs.
D) listservs.
Question
Privacy in the global village has two important dimensions: the use of personal information people willingly give online and the protection of

A) communication people wish to keep private.
B) credit card information.
C) important business/customer data.
D) hard discs from snooping software.
Question
The software that tells a computer how to work is called its

A) microprocessor.
B) MITS.
C) WAN.
D) operating system.
Question
People who have never known a world without the Internet are known as

A) baby boomers.
B) Generation X.
C) Generation Y.
D) digital natives.
Question
The widening disparity between the communication technology haves and have-nots is referred to as

A) flat rate billing.
B) the information gap.
C) the information slow lane.
D) the technology gap.
Question
Computer stations connected to large,centralized mainframes or minicomputers are called

A) personal computers.
B) terminals.
C) microcomputers.
D) LANs.
Question
The electronic tracking of the choices people make when they are surfing the Net is their

A) click stream.
B) MUD.
C) cybertrail.
D) cookie.
Question
_____ is identifying code placed on a computer by a website without permission or notification.

A) A cybersnoop
B) Spyware
C) A link
D) Censorware
Question
Finding information on the Web is easy thanks to _____________,which provide on-screen menus,making navigation of the Web as simple as pointing and clicking.

A) software links
B) operating systems
C) protocols
D) search engines
Question
The lack of technological access among people of color,the poor,the disabled,and those living in rural areas is called the

A) information gap.
B) digital divide.
C) information slow lane.
D) technology gap.
Question
Resenting the positive posts of friends on social media is known as

A) social isolation.
B) peer pressure.
C) Facebook envy.
D) Facebook depression
Question
What are the Five Internet Freedoms? Briefly describe each.
Question
How has the introduction of new computer technologies changed the issue of privacy in mass communication?
Question
Software programs loaded onto users' computers and used to download and view Web files are known as browsers.
Question
Although some critics see the Internet as possibly harmful to the democratic process,more traditional media-radio,for example-were universally hailed as bringing more people into the political process.
Question
Fear of missing out (FOMO)is also known as Facebook envy.
Question
People using the World Wide Web encounter hosts,URLs,browsers,search engines,and home pages.Define each of these terms.
Question
It is illegal for social media Web pages to collect personal information.
Question
The first successful commercial computer,used in the 1950s by the Census Bureau,was UNIVAC.
Question
What is the significance of Colossus,ENIAC,and UNIVAC?
Question
Tim Berners-Lee developed the hypertext transfer protocol (HTTP).
Question
Why is it inaccurate to speak of the Internet's audience?
Question
The "originator of the computer" is considered to be German Gottfried Leibnitz.
Question
Personal computer,microcomputer,and terminal are all synonymous.
Question
When people go online,the click streams they leave provide them with privacy protection.
Question
What does it mean to say that media are extensions of our bodies? Give an example.
Question
Facebook depression is not recognized by the American Academy of Pediatrics.
Question
What are the primary arguments for and against concern over the digital divide?
Question
There is little doubt that municipal Wi-Fi is a fundamental right that should be available to all citizens.
Question
Distinguish between LANs and WANs.
Question
The massive collection and distillation of consumer data is referred to as dataveillance.
Question
How do the technology gap and information gap differ? How are they related?
Question
Commercialization of the Internet will open it up to even more users.Commercialization of the Internet will cheapen it,making it just another ad-dominated entertainment medium like television.These are two sides in another raging Internet controversy.What is your opinion of the commercialization of the Internet? Defend your position.
Question
Supporters of Internet freedom see the medium's anonymity as one of its greatest strengths.Proponents of stricter Internet control see it as one of its greatest threats.Discuss the position of each side in the debate over control of Internet expression and then take-and defend-your own position.
Question
What does A.J.Liebling mean when he says that freedom of the press is guaranteed only to those who own the presses?
Question
Users of the Internet are worried about their privacy.Explain the Consumer Privacy Bill of Rights and the difference between opt-in and opt-out.
Question
What are the particular problems facing copyright protection on the Internet? What are some of the possible solutions? How far do you think the government should go in protecting intellectual property rights on the Internet? Defend your position.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/66
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: The Internet and Social Media
1
A _____________ is a personal Web page that comments on the news and provides links to stories that back up the commentary with evidence.

A) dialog
B) blog
C) usenet
D) listserv
B
2
The first electronic digital computer,_____________,was developed by the British during World War II to help break the German's secret code.

A) ENIAC
B) UNIVAC
C) Colossus
D) ARPA
C
3
According to long-time New Yorker columnist A.J.Liebling,freedom of the press is guaranteed to

A) all.
B) the media literate.
C) those who own the presses.
D) citizens in a democracy.
C
4
The idea that we use social media to communicate our actual identities is the

A) dual factor model of social media use.
B) fear of missing out.
C) idealized virtual identity hypothesis.
D) extended real-life hypothesis.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
5
Websites that function as online communities of users are called

A) listservs.
B) VoIP.
C) Usenet.
D) social networking sites.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
6
The idea that social media users tend to show idealized characteristics that don't represent who they are is

A) extended real-life hypothesis..
B) idealized virtual identity hypothesis.
C) fear of missing out.
D) dual factor model of social media use.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
7
Proponents of Internet freedom see its _____________ as providing protection for unpopular expression;proponents of greater Internet control see it as the Internet's greatest danger.

A) anonymity
B) reach
C) breadth
D) low cost
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
8
The dual-factor model of social media use claims our engagement with social media is motivated by the need to belong and the need

A) for self-esteem.
B) for self-presentation.
C) to staying current.
D) to not miss out.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
9
The Apple II personal computer was developed by

A) Steve Jobs and Stephen Wozniak.
B) Bill Gates and Paul Allen.
C) Paul Baran and Paul Allen.
D) Steven Bellovin and Vinton Cerf.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
10
Computers that reduce information to a code made up of the digits 1 and 0 for storage and manipulation use a _____________ code.

A) abacus
B) binary
C) plenary
D) primary
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
11
The "originator of the computer" was _____________,an Englishman,who in 1836 produced designs for a "computer" that could conduct algebraic computations using stored memory and punch cards for input and output.

A) John Napier
B) Blaise Pascal
C) Gottfried Leibnitz
D) Charles Babbage
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
12
The global network of interconnected computers that communicate freely and share and exchange information is called the

A) Information Superhighway.
B) protocol.
C) World Wide Web.
D) Internet.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
13
The availability of trustworthy _____________-coding and decoding-technologies that make online use of credit and bank card numbers,addresses,social security numbers,and other sensitive information safer for both seller and buyer has fueled interest in the Internet as a place to do business.

A) Web-lock
B) encryption
C) Net filter
D) scanner
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
14
In 1962,_____________ of the Rand Corporation proposed a packet-switching system that would allow the military to maintain command over its missiles and planes in the event of a nuclear attack.It is the basis of what we know today as the Internet.

A) John Mauchly
B) Paul Allen
C) Paul Baran
D) Steve Jobs
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
15
The development of the _____________-with its small size,absence of heat,and low cost-made personal computers possible.

A) terminal
B) microcomputer
C) vacuum tube
D) semiconductor
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
16
Computers that link individual personal computer users to the Internet are called

A) terminals.
B) mainframes.
C) ARPANET.
D) hosts.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
17
The "network of networks," consisting of LANs (Local Area Networks-networks connecting two or more computers,usually within the same building)and WANs (Wide Area Networks-networks that connect several LANs in different locations),is called the

A) provider.
B) World Wide Web.
C) Internet.
D) host.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
18
The most well known and arguably the most effective ______ Web site is MoveOn.org.

A) commercial
B) spam-free
C) blogging
D) activist
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
19
The first "full-service" electronic computer,_____________,was based on the work of Iowa State University's John V.Atanasoff and introduced by scientists John Mauchly and John Presper Eckert of the University of Pennsylvania in 1946.

A) ENIAC
B) UNIVAC
C) Colossus
D) ARPA
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
20
The first successful commercial computer,used by the Census Bureau in 1951,was

A) ENIAC.
B) UNIVAC.
C) Colossus.
D) ARPANET.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
21
The heart of the Web lies in the _____________ (common communication rules and languages)that define its use.

A) software
B) operating systems
C) protocols
D) search engines
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
22
In 2012,the Internet industry and federal government responded to users' fear for their
Personal privacy with ________________,voluntary guidelines asking sites to place a "do
Not track" button on their Web pages.

A) network neutrality
B) the Protect Intellectual Property Act
C) the Stop Online Piracy Act
D) the Consumer Privacy Bill of Rights
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
23
_____________ is the massive collection,distillation,and distribution of consumer data willingly given by consumers.

A) Direct marketing
B) Authorized data sale
C) Dataveillance
D) Clipping
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
24
_____________ is a form of technologically imposed censorship,in which people without the new communication technology have diminished access to the information it makes available.

A) Cyberdemocracy
B) The information gap
C) The Information slow lane
D) The technology gap
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
25
_____________,the requirement that all ISPs
Allow the free and equal flow of all web traffic,is at the center of the fight over SOPA (Stop
Online Piracy Act)and the PIPA (Protect Intellectual Property Act).

A) Network neutrality
B) Opt-out
C) Opt-in
D) Consumer Privacy Bill of Rights
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
26
Sensing that the future of computing was in personal computers and that computers' power would reside not in their size but in the software that ran them,_____________ dropped out of Harvard University in 1975 and,with his friend _____________,founded Microsoft Corporation.

A) Steve Jobs;Stephen Wozniak
B) Bill Gates;Paul Allen
C) Paul Baran;Paul Allen
D) Steven Bellovin;Vinton Cerf
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
27
The intensity of the online world can sometimes trigger ____________ in teens.

A) Facebook depression.
B) social isolation.
C) Facebook envy.
D) fear of missing out.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
28
Telephone over the Internet in which voice messages are transmitted in digital packets is

A) IM.
B) Web telephony.
C) routing.
D) VoIP.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
29
Each file or directory on the Internet (that is,on the host computer connected to the Internet)is designated by an address,called its

A) Packet Locating Number (PLN).
B) Uniform Resource Locator (URL).
C) Local Area Network (LAN).
D) Internet Information Locator (IIL).
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
30
Instances in which copyrighted material may be used without permission or payment are referred to as

A) commodification of information.
B) fair use.
C) blogs.
D) listservs.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
31
Privacy in the global village has two important dimensions: the use of personal information people willingly give online and the protection of

A) communication people wish to keep private.
B) credit card information.
C) important business/customer data.
D) hard discs from snooping software.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
32
The software that tells a computer how to work is called its

A) microprocessor.
B) MITS.
C) WAN.
D) operating system.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
33
People who have never known a world without the Internet are known as

A) baby boomers.
B) Generation X.
C) Generation Y.
D) digital natives.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
34
The widening disparity between the communication technology haves and have-nots is referred to as

A) flat rate billing.
B) the information gap.
C) the information slow lane.
D) the technology gap.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
35
Computer stations connected to large,centralized mainframes or minicomputers are called

A) personal computers.
B) terminals.
C) microcomputers.
D) LANs.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
36
The electronic tracking of the choices people make when they are surfing the Net is their

A) click stream.
B) MUD.
C) cybertrail.
D) cookie.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
37
_____ is identifying code placed on a computer by a website without permission or notification.

A) A cybersnoop
B) Spyware
C) A link
D) Censorware
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
38
Finding information on the Web is easy thanks to _____________,which provide on-screen menus,making navigation of the Web as simple as pointing and clicking.

A) software links
B) operating systems
C) protocols
D) search engines
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
39
The lack of technological access among people of color,the poor,the disabled,and those living in rural areas is called the

A) information gap.
B) digital divide.
C) information slow lane.
D) technology gap.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
40
Resenting the positive posts of friends on social media is known as

A) social isolation.
B) peer pressure.
C) Facebook envy.
D) Facebook depression
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
41
What are the Five Internet Freedoms? Briefly describe each.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
42
How has the introduction of new computer technologies changed the issue of privacy in mass communication?
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
43
Software programs loaded onto users' computers and used to download and view Web files are known as browsers.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
44
Although some critics see the Internet as possibly harmful to the democratic process,more traditional media-radio,for example-were universally hailed as bringing more people into the political process.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
45
Fear of missing out (FOMO)is also known as Facebook envy.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
46
People using the World Wide Web encounter hosts,URLs,browsers,search engines,and home pages.Define each of these terms.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
47
It is illegal for social media Web pages to collect personal information.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
48
The first successful commercial computer,used in the 1950s by the Census Bureau,was UNIVAC.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
49
What is the significance of Colossus,ENIAC,and UNIVAC?
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
50
Tim Berners-Lee developed the hypertext transfer protocol (HTTP).
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
51
Why is it inaccurate to speak of the Internet's audience?
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
52
The "originator of the computer" is considered to be German Gottfried Leibnitz.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
53
Personal computer,microcomputer,and terminal are all synonymous.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
54
When people go online,the click streams they leave provide them with privacy protection.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
55
What does it mean to say that media are extensions of our bodies? Give an example.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
56
Facebook depression is not recognized by the American Academy of Pediatrics.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
57
What are the primary arguments for and against concern over the digital divide?
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
58
There is little doubt that municipal Wi-Fi is a fundamental right that should be available to all citizens.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
59
Distinguish between LANs and WANs.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
60
The massive collection and distillation of consumer data is referred to as dataveillance.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
61
How do the technology gap and information gap differ? How are they related?
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
62
Commercialization of the Internet will open it up to even more users.Commercialization of the Internet will cheapen it,making it just another ad-dominated entertainment medium like television.These are two sides in another raging Internet controversy.What is your opinion of the commercialization of the Internet? Defend your position.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
63
Supporters of Internet freedom see the medium's anonymity as one of its greatest strengths.Proponents of stricter Internet control see it as one of its greatest threats.Discuss the position of each side in the debate over control of Internet expression and then take-and defend-your own position.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
64
What does A.J.Liebling mean when he says that freedom of the press is guaranteed only to those who own the presses?
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
65
Users of the Internet are worried about their privacy.Explain the Consumer Privacy Bill of Rights and the difference between opt-in and opt-out.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
66
What are the particular problems facing copyright protection on the Internet? What are some of the possible solutions? How far do you think the government should go in protecting intellectual property rights on the Internet? Defend your position.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 66 flashcards in this deck.