Deck 3: Networked Communications

Full screen (f)
exit full mode
Question
A wiki is

A) An online encyclopedia.
B) A personal journal kept on the Web.
C) An electronic profile constructed automatically by a Web browser.
D) A piece of software that allows ISPs to monitor who visits which Web sites.
E) A Web site that allows multiple people to contribute and edit its content.
Use Space or
up arrow
down arrow
to flip the card.
Question
Many people are now using the Web not simply to download content, but to build communities and upload and share content they have created. This trend has been given the name

A) Persistent online reality
B) Online networking
C) Web 2.0
D) Interactive hypermedia
E) Virtual reality
Question
Messages embedded in files transferred from one computer to another are commonly called

A) email.
B) the World Wide Web.
C) software.
D) the operating system.
E) the Internet.
Question
Cyberbullying is defined as inflicting psychological harm on another person using

A) the phone system.
B) the Internet.
C) broadcast media such as radio or television.
D) A and B.
E) A, B, and C.
Question
The volume of spam is increasing because

A) companies have found it to be effective.
B) it is 100 times less expensive than a traditional flyer sent via the U.S. mail.
C) some people respond to spam advertisements.
D) All of the above
E) None of the above
Question
A Web filter is a piece of software that

A) keeps track of the pages your Web browser displays.
B) sends Google information about your Web surfing habits.
C) prevents certain Web pages from being displayed by your browser.
D) prevents unauthorized people from using your computer to surf the Web.
E) A and B.
Question
How many Americans were the victims of identity theft in 2008 because of their online activities?

A) About 10,000.
B) About 100,000.
C) About 1 million.
D) About 10 million.
E) About 100 million.
Question
Sexting is causing a legal crisis because

A) police and prosecutors refuse to get involved in sexting cases.
B) police and prosecutors are treating sexting as a felony offense.
C) prisons are starting to fill up with people convicted of sexting.
D) police have been charged with possession of child pornography.
E) B and C.
Question
Which of the following laws was upheld as constitutional by the U.S. Supreme Court?

A) Communications Decency Act
B) Child Online Protection Act
C) Child Internet Protection Act
D) All of these laws were upheld as constitutional by the U.S. Supreme Court.
E) None of these laws were upheld as constitutional by the U.S. Supreme Court.
Question
Kimberly Young's test for Internet addiction is based on the diagnosis of

A) pathological gambling.
B) obsessive/compulsive behavior.
C) chronic sleeplessness.
D) anxiety disorders.
E) schizophrenia.
Question
The Enlightenment view of addiction is that

A) there is nothing wrong with addiction.
B) addiction is not real.
C) addiction can never be overcome by will-power alone.
D) society is responsible for the bad choices people make.
E) people are responsible for the choices they make.
Question
A Korean cybercafé where people play on-line, persistent games is called a

A) coffee clubhouse.
B) computer commons.
C) PC bang.
D) Tenretni Internet spelled backwards).
E) virtual reality theater.
Question
Trying to create a list of valid email addresses by sending email to randomly generated addresses and seeing which ones are delivered is called a .
Question
According to John Stuart Mill's Principle of Harm, the only ground on which the government should intervene in the conduct of an individual is when

A) the individual is breaking the law.
B) it would clearly be to the benefit of the individual.
C) the individual is under 18 or over 65.
D) it would prevent harm to others.
E) According to Mill, the government should intervene if any of the above conditions are true.
Question
Unsolicited, bulk, commercial email is commonly called .
Question
A blog is

A) a character in Lineage, a popular on-line game.
B) a personal journal kept on the Web.
C) a person who assumes a false identity in a chat room.
D) a special symbol visible on displays that show Unicode characters.
E) the Web version of a "couch potato."
Question
Sexting refers to

A) sending text messages with nude or nearly nude photographs.
B) sending emails with nude or nearly nude photographs.
C) posting nude or nearly nude photographs to a Web site.
D) A and B.
E) A, B, and C.
Question
Every object on the World Wide Web has a unique address called the .
Question
Which of these is not an example of direct censorship?

A) government monopolization
B) self-censorship.
C) pre-publication review.
D) licensing and registration.
E) All of the above are examples of direct censorship.
Question
In the United States, freedom of expression

A) is a positive right.
B) is not an absolute right.
C) is limited to political speech.
D) has been abolished by decisions of the U.S. Supreme Court.
E) is guaranteed by the Fourth Amendment to the U.S. Constitution.
Question
Chinese "gold farmers" make a living by playing persistent online games and .
Question
In 2003, the U.S. Supreme Court ruled that the Child Internet Protection Act was .
Question
The three forms of direct censorship are .
Question
A personal journal or diary kept on the Web is called a .
Question
Saudi Arabians have access to the Internet through a control center outside Riyadh which pornography sites, gambling sites, and sites offensive to Islam.
Question
The attempt to suppress or regulate public access to material considered offensive or harmful is called .
Question
John Stuart Mill held that an institution to intervene in the conduct of an individual only when the intervention is needed to prevent harm to others. This is called the .
Question
The Amendment to the Constitution guarantees freedom of speech and freedom of the press.
Question
From the point of view of Kant or Mill, the responsibility for excessive Internet use lies with .
Question
The Web is no longer a medium used to download information. Web users now have the ability to contribute content to the Web. This new way of using the Web has been given the name .
Question
The act of assuming someone else's electronic identity is called .
Question
In 18th century America, there were no prior restraints on publication. This meant that colonists had the freedom to .
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/32
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Networked Communications
1
A wiki is

A) An online encyclopedia.
B) A personal journal kept on the Web.
C) An electronic profile constructed automatically by a Web browser.
D) A piece of software that allows ISPs to monitor who visits which Web sites.
E) A Web site that allows multiple people to contribute and edit its content.
E
2
Many people are now using the Web not simply to download content, but to build communities and upload and share content they have created. This trend has been given the name

A) Persistent online reality
B) Online networking
C) Web 2.0
D) Interactive hypermedia
E) Virtual reality
C
3
Messages embedded in files transferred from one computer to another are commonly called

A) email.
B) the World Wide Web.
C) software.
D) the operating system.
E) the Internet.
A
4
Cyberbullying is defined as inflicting psychological harm on another person using

A) the phone system.
B) the Internet.
C) broadcast media such as radio or television.
D) A and B.
E) A, B, and C.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
5
The volume of spam is increasing because

A) companies have found it to be effective.
B) it is 100 times less expensive than a traditional flyer sent via the U.S. mail.
C) some people respond to spam advertisements.
D) All of the above
E) None of the above
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
6
A Web filter is a piece of software that

A) keeps track of the pages your Web browser displays.
B) sends Google information about your Web surfing habits.
C) prevents certain Web pages from being displayed by your browser.
D) prevents unauthorized people from using your computer to surf the Web.
E) A and B.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
7
How many Americans were the victims of identity theft in 2008 because of their online activities?

A) About 10,000.
B) About 100,000.
C) About 1 million.
D) About 10 million.
E) About 100 million.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
8
Sexting is causing a legal crisis because

A) police and prosecutors refuse to get involved in sexting cases.
B) police and prosecutors are treating sexting as a felony offense.
C) prisons are starting to fill up with people convicted of sexting.
D) police have been charged with possession of child pornography.
E) B and C.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following laws was upheld as constitutional by the U.S. Supreme Court?

A) Communications Decency Act
B) Child Online Protection Act
C) Child Internet Protection Act
D) All of these laws were upheld as constitutional by the U.S. Supreme Court.
E) None of these laws were upheld as constitutional by the U.S. Supreme Court.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
10
Kimberly Young's test for Internet addiction is based on the diagnosis of

A) pathological gambling.
B) obsessive/compulsive behavior.
C) chronic sleeplessness.
D) anxiety disorders.
E) schizophrenia.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
11
The Enlightenment view of addiction is that

A) there is nothing wrong with addiction.
B) addiction is not real.
C) addiction can never be overcome by will-power alone.
D) society is responsible for the bad choices people make.
E) people are responsible for the choices they make.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
12
A Korean cybercafé where people play on-line, persistent games is called a

A) coffee clubhouse.
B) computer commons.
C) PC bang.
D) Tenretni Internet spelled backwards).
E) virtual reality theater.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
13
Trying to create a list of valid email addresses by sending email to randomly generated addresses and seeing which ones are delivered is called a .
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
14
According to John Stuart Mill's Principle of Harm, the only ground on which the government should intervene in the conduct of an individual is when

A) the individual is breaking the law.
B) it would clearly be to the benefit of the individual.
C) the individual is under 18 or over 65.
D) it would prevent harm to others.
E) According to Mill, the government should intervene if any of the above conditions are true.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
15
Unsolicited, bulk, commercial email is commonly called .
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
16
A blog is

A) a character in Lineage, a popular on-line game.
B) a personal journal kept on the Web.
C) a person who assumes a false identity in a chat room.
D) a special symbol visible on displays that show Unicode characters.
E) the Web version of a "couch potato."
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
17
Sexting refers to

A) sending text messages with nude or nearly nude photographs.
B) sending emails with nude or nearly nude photographs.
C) posting nude or nearly nude photographs to a Web site.
D) A and B.
E) A, B, and C.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
18
Every object on the World Wide Web has a unique address called the .
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
19
Which of these is not an example of direct censorship?

A) government monopolization
B) self-censorship.
C) pre-publication review.
D) licensing and registration.
E) All of the above are examples of direct censorship.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
20
In the United States, freedom of expression

A) is a positive right.
B) is not an absolute right.
C) is limited to political speech.
D) has been abolished by decisions of the U.S. Supreme Court.
E) is guaranteed by the Fourth Amendment to the U.S. Constitution.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
21
Chinese "gold farmers" make a living by playing persistent online games and .
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
22
In 2003, the U.S. Supreme Court ruled that the Child Internet Protection Act was .
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
23
The three forms of direct censorship are .
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
24
A personal journal or diary kept on the Web is called a .
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
25
Saudi Arabians have access to the Internet through a control center outside Riyadh which pornography sites, gambling sites, and sites offensive to Islam.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
26
The attempt to suppress or regulate public access to material considered offensive or harmful is called .
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
27
John Stuart Mill held that an institution to intervene in the conduct of an individual only when the intervention is needed to prevent harm to others. This is called the .
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
28
The Amendment to the Constitution guarantees freedom of speech and freedom of the press.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
29
From the point of view of Kant or Mill, the responsibility for excessive Internet use lies with .
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
30
The Web is no longer a medium used to download information. Web users now have the ability to contribute content to the Web. This new way of using the Web has been given the name .
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
31
The act of assuming someone else's electronic identity is called .
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
32
In 18th century America, there were no prior restraints on publication. This meant that colonists had the freedom to .
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 32 flashcards in this deck.