Ethics Chapter 3
Every object on the World Wide Web has a unique address called the ________
Uniform Resource Locator (URL).
50. The Web is no longer a medium used to download information. Web users now have the ability to contribute content to the Web. This new way of using the Web has been given the name _____
Web 2.0
64. Messages embedded in files transferred from one computer to another are commonly called a) email. b) the World Wide Web. c) software. d) the operating system. e) the Internet.
a) email.
79. Kimberly Young's test for Internet addiction is based on the diagnosis of a) pathological gambling. b) obsessive/compulsive behavior. c) chronic sleeplessness. d) anxiety disorders. e) schizophrenia.
a) pathological gambling.
A blog is a) a character in Lineage, a popular on-line game. b) a personal journal kept on the Web. c) a person who assumes a false identity in a chat room. d) a special symbol visible on displays that show Unicode characters. e) the Web version of a "couch potato."
b) a personal journal kept on the Web.
72. In the United States, freedom of expression a) is a positive right. b) is not an absolute right. c) is limited to political speech. d) has been abolished by decisions of the U.S. Supreme Court. e) is guaranteed by the Fourth Amendment to the U.S. Constitution.
b) is not an absolute right.
Sexting is causing a legal crisis because a) police and prosecutors refuse to get involved in sexting cases. b) police and prosecutors are treating sexting as a felony offense. c) prisons are starting to fill up with people convicted of sexting. d) police have been charged with possession of child pornography. B and C.
b) police and prosecutors are treating sexting as a felony offense.
70. Which of these is not an example of direct censorship? a) government monopolization b) self-censorship. c) pre-publication review. d) licensing and registration. e) All of the above are examples of direct censorship.
b) self-censorship.
52. Saudi Arabians have access to the Internet through a control center outside Riyadh which _____ pornography sites, gambling sites, and sites offensive to Islam.
blocks (filters out)
A personal journal or diary kept on the Web is called a _____
blog
77. How many Americans were the victims of identity theft in 2008 because of their online activities? a) About 10,000. b) About 100,000. c) About 1 million. d) About 10 million. e) About 100 million
c) About 1 million.
74. Which of the following laws was upheld as constitutional by the U.S. Supreme Court? a) Communications Decency Act b) Child Online Protection Act c) Child Internet Protection Act d) All of these laws were upheld as constitutional by the U.S. Supreme Court. e) None of these laws were upheld as constitutional by the U.S. Supreme Court.
c) Child Internet Protection Act
66. A Korean cybercafé where people play on-line, persistent games is called a a) coffee clubhouse. b) computer commons. c) PC bang. d) Tenretni (Internet spelled backwards). e) virtual reality theater.
c) PC bang.
Many people are now using the Web not simply to download content, but to build communities and upload and share content they have created. This trend has been given the name a) Persistent online reality b) Online networking c) Web 2.0 d) Interactive hypermedia e) Virtual reality
c) Web 2.0
73. A Web filter is a piece of software that a) keeps track of the pages your Web browser displays. b) sends Google information about your Web surfing habits. c) prevents certain Web pages from being displayed by your browser. d) prevents unauthorized people from using your computer to surf the Web. e) A and B.
c) prevents certain Web pages from being displayed by your browser.
54. The attempt to suppress or regulate public access to material considered offensive or harmful is called ____
censorship.
53. In 2003, the U.S. Supreme Court ruled that the Child Internet Protection Act was______
constitutional.
75. Sexting refers to a) sending text messages with nude or nearly nude photographs. b) sending emails with nude or nearly nude photographs. c) posting nude or nearly nude photographs to a Web site. d) A and B. e) A, B, and C
d) A and B.
78. Cyberbullying is defined as inflicting psychological harm on another person using a) the phone system. b) the Internet. c) broadcast media such as radio or television. d) A and B. e) A, B, and C
d) A and B.
65. The volume of spam is increasing because a) companies have found it to be effective. b) it is 100 times less expensive than a traditional flyer sent via the U.S. mail. c) some people respond to spam advertisements. d) All of the above e) None of the above
d) All of the above
71. According to John Stuart Mill's Principle of Harm, the only ground on which the government should intervene in the conduct of an individual is when a) the individual is breaking the law. b) it would clearly be to the benefit of the individual. c) the individual is under 18 or over 65. d) it would prevent harm to others. e) According to Mill, the government should intervene if any of the above conditions are true.
d) it would prevent harm to others.
Trying to create a list of valid email addresses by sending email to randomly generated addresses and seeing which ones are delivered is called a _______.
dictionary attack
A wiki is a) An online encyclopedia. b) A personal journal kept on the Web. c) An electronic profile constructed automatically by a Web browser. d) A piece of software that allows ISPs to monitor who visits which Web sites. e) A Web site that allows multiple people to contribute and edit its content.
e) A Web site that allows multiple people to contribute and edit its content.
80. The Enlightenment view of addiction is that a) there is nothing wrong with addiction. b) addiction is not real. c) addiction can never be overcome by will-power alone. d) society is responsible for the bad choices people make. e) people are responsible for the choices they make.
e) people are responsible for the choices they make
58. The ____ Amendment to the Constitution guarantees freedom of speech and freedom of the press
first
51. Chinese "gold farmers" make a living by playing persistent online games and selling virtual objects such as ________
gold and artifacts over the Internet.
55. The three forms of direct censorship are _____,____,_____.
government monopoly, pre-publication review, and licensing and registration.
59. The act of assuming someone else's electronic identity is called _____
identity theft.
57. In 18th century America, there were no prior restraints on publication. This meant that colonists had the freedom to_______
publish without a license
Unsolicited, bulk, commercial email is commonly called ____.
spam
60. From the point of view of Kant or Mill, the responsibility for excessive Internet use lies with ______
the individual user.
56. John Stuart Mill held that an institution to intervene in the conduct of an individual only when the intervention is needed to prevent harm to others. This is called the _______
Principle of Harm