Chapter 5. Freedom of Expression
A survey by the Nielsen found that of the workforce accessed pornography from their workplace computer. a. less than 15 percent b. 29 percent c. 50 percent d. nearly 75 percent
29 percent
1. Which of the following can be used against an anonymous defendant to reveal truths about the defendant's identity? a. Internet censorship b. A John Doe lawsuit c. Hate speech d. An anti-SLAPP law
A John Doe lawsuit
______________allows people to state their opinions without revealing their identity. a. Defamation b. Anonymous expression c. Libel d. A John Doe lawsuit
Anonymous expression
Which of the following statements is true of Children's Internet Protection Act (CIPA)? a. In case of CIPA, Congress specifically defined what content or Web sites should be forbidden and the measures to be used. b. CIPA requires the tracking of Internet use by minors or adults. c. In June 2004, the Supreme Court ruling in the case of Ashcroft v. American Civil Liberties Union made it clear that CIPA was unconstitutional. d. CIPA requires federally financed schools to use some form of technological protection to block computer access to obscene material.
CIPA requires federally financed schools to use some form of technological protection to block computer access to obscene material.
1. Miller v. __________________is the Supreme Court case that established a test to determine if material is obscene and therefore not protected by the First Amendment. a. Brown b. California c.Stern d.Texas
California
Violation of the can cause a school or public library to lose funding to help pay for its Internet connections. a. Child Online Protection Act (COPA) b. Children's Internet Protection Act (CIPA) c. Children's Online Privacy Protection Act (COPPA) d. Communications Decency Act (CDA)
Children's Internet Protection Act (CIPA)
_________________ has the largest online population in the world and also perhaps the most rigorous Internet censorship. a. United States b. India c. Japan d. China ANSWER: d
China
Section 230 of the provides immunity to an Internet service provider (ISP) that publishes user-generated content, as long as its actions do not rise to the level of a content provider. a. Online Protection Act b. Online Privacy Protection Act c. Internet Freedom and Nondiscrimination Act d. Communications Decency Act
Communications Decency Act
______________ involves the examination of Internet records in an attempt to reveal the identity of an anonymous poster. a. Remailing b. Doxing c. Slandering d. Libeling
Doxing
In the United States, speech that is merely annoying, critical, demeaning, or offensive enjoys protection under the__ Amendment. a. First b. Second c. Fourth d. Fifth
First
1. A(n) is software that can be installed with a Web browser to block access to certain Web sites that contain inappropriate or offensive material. a. Internet filter b. router c. bridge d. Web modem
Internet Filter
Proponents of the Children's Internet Protection Act (CIPA) contended that shielding children from drugs, hate, pornography, and other topics is a sufficient reason to justify . a. Internet filters b. spams c. compression d. encryption
Internet Filters
_________________ is the control or suppression of the publishing or accessing of information on the Internet. a. Internet filtering b. Anonymous expression c. Internet censorship d. Slander
Internet cenorship
Proponents of the Children's Internet Protection Act (CIPA) argued that: a. schools can define what sites to block. b. Internet filters are highly flexible and customizable. c. the motives of private software companies who develop the Internet filters are clear. d. CIPA transfers power to education over private software companies who develop the Internet filters.
Internet filters are highly flexible and customizable
A defining moment in the history of freedom of the press in the United States came in 1735 when jurors refused to convict for seditious libel. a. George Washington b. Ben Franklin c. Paul Revere d. John Zenger
John Zenger
Which of the following can provide a virtually untraceable level of anonymity to email messages? a. Relay servers b. Podcasts c. Web mail servers d. Remailers
Remailers
________________ is a strategy employed by corporations, government officials, and others against citizens and community groups who oppose them on matters of public interest. a. A John Doe lawsuit b. A SLAPP c. Internet censorship d. Anonymous expression
SLAPP
Which of the following statements best describes the reason why social networking companies cannot be sued for defamation for user postings that appear on their sites? a. The Communications Decency Act (CDA) uses a vague definition of indecency. b. The Communications Decency Act (CDA) is not applicable to social networking sites. c. Section 230 of the Communications Decency Act (CDA) is not considered unconstitutional. d. Section 230 of the Communications Decency Act (CDA) does not provide immunity to an Internet service provider (ISP).
Section 230 of the Communications Decency Act (CDA) is not considered unconstitutional.
The ________________ became law in 1996. Its purpose was to allow freer competition among phone, cable, and TV companies. a. Telecommunications Act b. Telecommunications Deregulation and Reform Act c. Child Online Protection Act d. Communications Opportunity, Promotion and Enhancement Bill
Telecommunications Act
Which of the following statements is true of Communications Decency Act (CDA)? a. Title V of the CDA was the Telecommunications Act, aimed at protecting children from pornography. b. The CDA imposed a $150,000 fine and a prison term of up to five years for the transmission of "indecent" material over the Internet. c. The problem with the CDA was its broad language and vague definition of "indecency," a standard that was left to individual communities to determine. d. In June 2004, the ruling by the Supreme Court in the case of Ashcroft v. American Civil Liberties Union made it clear that CDA was unconstitutional.
The problem with the CDA was its broad language and vague definition of "indecency," a standard that was left to individual communities to determine.
_______________ is an absolute defense against a charge of defamation. a. Libel b. Slander c. The First Amendment d. Truth
Truth
Despite the importance of in early America, it took nearly 200 years for the Supreme Court to render rulings that addressed it as an aspect of the Bill of Rights. a. privacy b. freedom c. anonymity d. rights
anonymity
1. If an employee sees a coworker viewing porn on a workplace computer, that employee may be able to claim that the company has . a. encouraged defamation of the character of its employees b. engaged in racial discrimination c. violated the employee's First Amendment rights d. created a hostile work environment
created a hostile work environment
Although people have the right to express opinions, they must exercise care in their Internet communications to avoid possible charges of _______________. a. Internet censorship b. doxing c. declamation d. defamation
defamation
The Supreme Court has held that obscene speech and are not protected by the First Amendment and may be forbidden by the government. a. audition b. defamation c. declamation d. demarcation
defamation
U.S. laws do not allow a person to be for engaging in an activity protected by the U.S. Constitution, even if the activity violates the criminal laws of another country. a. imprisoned b. sued c. extradited d. judged
extradited
Possession of child pornography is a federal offense punishable by up to years in prison. a. two b. five c. seven d. ten
five
Although they may implement a speech code, are legally considered agents of the government and therefore must follow the First Amendment's prohibition against speech restrictions based on content or viewpoint. a. religious institutions b. public schools and universities c. Internet service providers d. communications providers
public schools and universities
1. An oral defamatory statement is called . a. libel b. hate speech c. slander d. exaggeration
slander
The California State Court in Pre-Paid Legal v. Sturtz et al. set a legal precedent that refined the criteria courts apply to . a. subpoenas requesting the identity of anonymous Web posters b. determination of obscene material c. Internet filtering within public libraries d. identification of hate speech
subpoenas requesting the identity of anonymous Web posters