Ethics in Information Technology 5Th Ed by George Reynolds – Test Bank

$20.00

Pay And Download

 

 

Complete Test Bank With Answers

 

 

 

Sample Questions Posted Below

 

 

 

 

  1. Anonymous political expression played an important role in the early formation of the United
    1. True
    2. False

 

ANSWER:  True

 

  1. The Fifth Amendment protects American’s rights to freedom of religion and freedom of
    1. True
    2. False

 

ANSWER:  False

 

  1. The Supreme Court has ruled that the Fifth Amendment protects the right to speak anonymously as part of the guarantee of free
    1. True
    2. False

 

ANSWER:  False

 

  1. In general, the closer an Internet service provider (ISP) is to a pure service provider than to a content provider, the more likely that the Section 230 immunity of the Communications Decency Act (CDA) will
    1. True
    2. False

 

ANSWER:  True

 

  1. An oral defamatory statement is
    1. True
    2. False

 

ANSWER:  False

 

  1. With dynamic content filtering, each Web site’s content is evaluated immediately before it is displayed, using

techniques such as object analysis and image recognition.

  1. True
  2. False

 

ANSWER:  True

 

  1. Typically, Internet service providers (ISPs) have the resources to prescreen online
    1. True
    2. False

 

ANSWER:  False

 

 

  1. Anti-SLAPP laws can identify whether there are any merits to a
    1. True
    2. False

 

ANSWER:  True

 

  1. The goal of the Child Online Protection Act (COPA) was to protect children from harmful material on the World Wide Web, however, it was ruled
    1. True
    2. False

 

ANSWER:  True

 

  1. Over the years, a number of federal, state, and local laws have been found unconstitutional because they violated one of the tenets of the First
    1. True
    2. False

 

ANSWER:  True

 

  1. With URL filtering, a particular URL or domain name is identified as an objectionable site and the user is not allowed access to
    1. True
    2. False

 

ANSWER:  True

 

  1. Free-speech advocates believe that purchasing adult pornographic material is illegal and wrong even for consenting
    1. True
    2. False

 

ANSWER:  False

 

  1. The right to freedom of expression is restricted when the expressions, whether spoken or written, are untrue and cause harm to another
    1. True
    2. False

 

ANSWER:  True

 

  1. A strategic lawsuit against public participation (SLAPP) is typically without
    1. True
    2. False

 

ANSWER:  True

 

 

  1. The Children’s Internet Protection Act (CIPA) was an attempt to protect children from accessing pornography and

other explicit material online.

  1. True
  2. False

 

ANSWER:  True

 

  1. A S. citizen who posts material on the Web that is illegal in a foreign country cannot be prosecuted in that country.
    1. True
    2. False

 

ANSWER:  False

 

  1. Internet filters cannot block users from accessing useful
    1. True
    2. False

 

ANSWER:  False

 

  1. Anonymity on the Internet is practically
    1. True
    2. False

 

ANSWER:  False

 

  1. Each violation of the provisions of the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN- SPAM) Act can result in a fine of up to $250 for each unsolicited email, and fines can be tripled in certain
    1. True
    2. False

 

ANSWER:  True

 

  1. Messages whose primary purpose is to communicate information about a specific transaction are subject to the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM)
    1. True
    2. False

 

ANSWER:  False

 

  1. Private schools may prohibit students, instructors, and other employees from engaging in offensive
    1. True
    2. False

 

ANSWER:  True

 

 

  1. The plaintiff in a strategic lawsuit against public participation (SLAPP) can present themselves to the court admitting that their intent is to censor their
    1. True
    2. False

 

ANSWER:  False

 

  1. Anti-SLAPP laws are designed to protect children from
    1. True
    2. False

 

ANSWER:  False

 

  1. Pornography purveyors are free to produce and publish whatever they want; however, if what they distribute is judged obscene, they are subject to prosecution under the obscenity
    1. True
    2. False

 

ANSWER:  True

 

  1. Most countries other than the United States do not provide constitutional protection for hate
    1. True
    2. False

 

ANSWER:  True

 

  1. If an employee sees a coworker viewing porn on a workplace computer, the organization can be sued in a sexual harassment
    1. True
    2. False

 

ANSWER:  True

 

  1. The Bill of Rights provides protection for the expression of minority views including speech that is unpopular or highly offensive to a majority of
    1. True
    2. False

 

ANSWER:  True

 

  1. The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act can be used in the fight against the dissemination of
    1. True
    2. False

 

ANSWER:  True

 

 

  1. An approach to restricting access to Web sites is to subscribe to an Internet service provider (ISP) that performs the
    1. True
    2. False

 

ANSWER:  True

 

  1. The Communications Decency Act was aimed at protecting children from pornography, but it was found
    1. True
    2. False

 

ANSWER:  True

 

  1.         is an absolute defense against a charge of
    1. Libel Slander
    2. c. The First Amendment Truth

 

ANSWER:  d

 

  1. Miller v. is the Supreme Court case that established a test to determine if material is obscene and therefore not protected by the First
    1. Brown California
    2. c. Stern Texas ANSWER: b

 

  1. Which of the following can provide a virtually untraceable level of anonymity to email messages?
    1. Relay servers Podcasts
    2. c. Web mail servers Remailers

 

ANSWER:  d

 

  1.         is a strategy employed by corporations, government officials, and others against citizens and community groups who oppose them on matters of public
    1. A John Doe lawsuit A SLAPP
    2. c. Internet censorship Anonymous expression

 

ANSWER:  b

 

  1. Section 230 of the provides immunity to an Internet service provider (ISP) that publishes user-generated content, as long as its actions do not rise to the level of a content
    1. Online Protection Act Online Privacy Protection Act
    2. c. Internet Freedom and Nondiscrimination Act Communications Decency Act

 

ANSWER:  d

 

 

  1. Proponents of the Children’s Internet Protection Act (CIPA) contended that shielding children from drugs, hate,

pornography, and other topics is a sufficient reason to justify           .

  1. Internet filters spams
  2. c. compression encryption

 

ANSWER:  a

 

  1. Although people have the right to express opinions, they must exercise care in their Internet communications to avoid possible charges of .
    1. Internet censorship doxing
    2. c. declamation defamation

 

ANSWER:  d

 

  1. Possession of child pornography is a federal offense punishable by up to years in
    1. two five
    2. c. seven ten

 

ANSWER:  b

 

  1. The Supreme Court has held that obscene speech and are not protected by the First Amendment and may be forbidden by the
    1. audition defamation
    2. c. declamation demarcation

 

ANSWER:  b

 

  1. A defining moment in the history of freedom of the press in the United States came in 1735 when jurors refused to convict for seditious
    1. George Washington Ben Franklin
    2. c. Paul Revere John Zenger

 

ANSWER:  d

 

  1. Which of the following statements best describes the reason why social networking companies cannot be sued for defamation for user postings that appear on their sites?
    1. The Communications Decency Act (CDA) uses a vague definition of
    2. The Communications Decency Act (CDA) is not applicable to social networking
    3. Section 230 of the Communications Decency Act (CDA) is not considered
    4. Section 230 of the Communications Decency Act (CDA) does not provide immunity to an Internet service provider (ISP).

 

ANSWER:  c

 

 

  1. Despite the importance of in early America, it took nearly 200 years for the Supreme Court to render rulings that addressed it as an aspect of the Bill of
    1. privacy freedom
    2. c. anonymity rights

 

ANSWER:  c

 

  1. The became law in 1996. Its purpose was to allow freer competition among phone, cable, and TV
    1. Telecommunications Act
    2. Telecommunications Deregulation and Reform Act
    3. Child Online Protection Act
    4. Communications Opportunity, Promotion and Enhancement Bill

 

ANSWER:  a

 

  1. Which of the following can be used against an anonymous defendant to reveal truths about the defendant’s identity?
    1. Internet censorship A John Doe lawsuit
    2. c. Hate speech An anti-SLAPP law

 

ANSWER:  b

 

  1. Which of the following statements is true of Communications Decency Act (CDA)?
    1. Title V of the CDA was the Telecommunications Act, aimed at protecting children from
    2. The CDA imposed a $150,000 fine and a prison term of up to five years for the transmission of “indecent”

material over the Internet.

  1. The problem with the CDA was its broad language and vague definition of “indecency,” a standard that was left to individual communities to
  2. In June 2004, the ruling by the Supreme Court in the case of Ashcroft v. American Civil Liberties Union

made it clear that CDA was unconstitutional.

 

ANSWER:  c

 

  1. The California State Court in Pre-Paid Legal v. Sturtz et al. set a legal precedent that refined the criteria courts apply to .
    1. subpoenas requesting the identity of anonymous Web posters determination of obscene material
    2. c. Internet filtering within public libraries identification of hate speech

 

ANSWER:  a

 

  1. Although they may implement a speech code, are legally considered agents of the government and therefore must follow the First Amendment’s prohibition against speech restrictions based on content or
    1. religious institutions public schools and universities
    2. c. Internet service providers communications providers

 

ANSWER:  b

 

  1. S. laws do not allow a person to be for engaging in an activity protected by the U.S. Constitution, even if the activity violates the criminal laws of another country.
    1. imprisoned sued
    2. c. extradited judged

 

ANSWER:  c

 

  1. If an employee sees a coworker viewing porn on a workplace computer, that employee may be able to claim that the company has .
    1. encouraged defamation of the character of its employees engaged in racial discrimination
    2. c. violated the employee’s First Amendment rights created a hostile work environment

 

ANSWER:  d

 

  1. Which of the following statements is true of Children’s Internet Protection Act (CIPA)?
    1. In case of CIPA, Congress specifically defined what content or Web sites should be forbidden and the measures to be
    2. CIPA requires the tracking of Internet use by minors or
    3. In June 2004, the Supreme Court ruling in the case of Ashcroft v. American Civil Liberties Union made it clear that CIPA was
    4. CIPA requires federally financed schools to use some form of technological protection to block computer access to obscene

 

ANSWER:  d

 

  1.         is the control or suppression of the publishing or accessing of information on the
    1. Internet filtering Anonymous expression
    2. c. Internet censorship Slander

 

ANSWER:  c

 

  1. Violation of the can cause a school or public library to lose funding to help pay for its Internet
    1. Child Online Protection Act (COPA) Children’s Internet Protection Act (CIPA)
    2. c. Children’s Online Privacy Protection Act (COPPA) Communications Decency Act (CDA)

 

ANSWER:  b

 

 

 

  1. In the United States, speech that is merely annoying, critical, demeaning, or offensive enjoys protection under the­­­__
    1. First Second
    2. c. Fourth Fifth

 

ANSWER:  a

 

  1. A(n) is software that can be installed with a Web browser to block access to certain Web sites that contain inappropriate or offensive
    1. Internet filter router
    2. c. bridge Web modem

 

ANSWER:  a

 

  1.          has the largest online population in the world and also perhaps the most rigorous Internet
    1. United States India
    2. c. Japan China

 

ANSWER:  d

 

  1. A survey by the Nielsen found that of the workforce accessed pornography from their workplace
    1. less than 15 percent 29 percent
    2. c. 50 percent nearly 75 percent

 

ANSWER:  b

 

  1. Proponents of the Children’s Internet Protection Act (CIPA) argued that:
    1. schools can define what sites to
    2. Internet filters are highly flexible and
    3. the motives of private software companies who develop the Internet filters are
    4. CIPA transfers power to education over private software companies who develop the Internet

 

ANSWER:  b

 

  1.         allows people to state their opinions without revealing their
    1. Defamation Anonymous expression
    2. c. Libel A John Doe lawsuit

 

ANSWER:  b

 

 

 

  1.         involves the examination of Internet records in an attempt to reveal the identity of an anonymous
    1. Remailing Doxing
    2. c. Slandering Libeling

 

ANSWER:  b

 

  1. An oral defamatory statement is called .
    1. libel hate speech
    2. c. slander exaggeration

 

ANSWER:  c

 

  1. A S. citizen who posts material on the Web that is illegal in a foreign country can be prosecuted if he subjects himself to the of that country.

 

ANSWER:  jurisdiction

 

  1. The on each packet of a message can identify where the email originated from and who sent

 

ANSWER:  header

 

  1. One of the key requirements of the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN- SPAM) Act is that an email must be identified as a(n) and include a valid physical postal address for the

 

ANSWER:  advertisement

 

  1. The best Internet filters use a combination of URL, , and dynamic content

 

ANSWER:  keyword

 

  1. Making an oral or a written statement of alleged fact that is false and that harms another person is .

 

ANSWER:  defamation

 

  1. In June 2004, the Supreme Court ruled in Ashcroft v. American Civil Liberties Union that the _____ was

 

ANSWER:  Child Online Protection Act

COPA

Child Online Protection Act (COPA) (COPA) Child Online Protection Act

 

  1. The key question in deciding what Internet material is obscene is: “Whose standards are used?”

 

ANSWER:  community

 

 

 

  1. Its broad accessibility, open discussions, and anonymity make the a powerful communications

 

ANSWER:  Internet

 

  1. Opponents of the feared that it transferred power over education to private software companies who developed the Internet filters and defined which sites to

 

ANSWER:  CIPA

Children’s Internet Protection Act Children’s Internet Protection Act (CIPA) CIPA (Children’s Internet Protection Act)

 

  1. The goal of the was to protect children from pornography, and if the act had been judged constitutional, it would have opened all aspects of Internet content to legal

 

ANSWER:  CDA

Communications Decency Act Communications Decency Act (CDA) CDA (Communications Decency Act)

 

  1. The Amendment to the S. Constitution protects Americans’ rights to freedom of religion and freedom of

expression.

 

ANSWER:  First

 

  1. Persistent or malicious harassment aimed at a specific person is known as .

 

ANSWER:  hate speech

 

  1. Implementing the in libraries is difficult because their services are open to people of all ages, including adults who have First Amendment rights to access a broader range of Internet materials than are allowed under the

 

ANSWER:  CIPA

Children’s Internet Protection Act Children’s Internet Protection Act (CIPA) CIPA (Children’s Internet Protection Act)

 

  1. A written defamatory statement is called .

 

ANSWER:  libel

 

 

 

  1. Some Internet users would like to ban Web because they think that its use increases the risks of defamation, fraud, libel, and exploitation of

 

ANSWER:  anonymity

 

  1. By filing a , companies gain immediate subpoena power to identify information on anonymous online

 

ANSWER:  lawsuit

 

  1.         uses terms or phrases—such as sex, Satan, and gambling—to trigger the blocking of Web

 

ANSWER:  Keyword filtering

 

  1. Because prohibitions against hate speech are included in the between a private ISP and its subscribers, and

do no involve the federal government, they do not violate the subscriber’s First Amendment rights.

 

ANSWER:  service contracts

 

  1. Access via the enables pornography consumers to avoid offending others or being embarrassed by others observing their

 

ANSWER:  Internet

 

  1. The is charged with enforcing the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act, and the agency maintains a consumer complaint database relating to the

 

ANSWER: Federal Trade Commission (FTC) FTC (Federal Trade Commission) Federal Trade Commission

FTC

 

  1. The act of sending sexual messages, nude or seminude photos, or sexually explicit videos over a cell phone is known as

 

ANSWER:  sexting

 

  1.         advocates believe that there is nothing illegal or wrong about purchasing adult pornographic material made by and for consenting

 

ANSWER:  Free-speech

Free speech

 

  1. A negative side of is that they can block too much content, keeping users from accessing useful

 

ANSWER:  Internet filters

  1. Internet users who do not want to reveal their identity can send email to a(n) service, which uses a computer program to strip the originating IP number or header from the

 

ANSWER:  anonymous remailer

 

  1.         can take many forms-such as limiting access to certain Web sites, allowing access to only some content or modified content at certain Web sites, rejecting the use of certain keywords in search engine searches, tracking and monitoring the Internet activities of individuals, and harassing or even jailing individuals for their Internet

 

ANSWER:  Internet censorship

 

  1. How has the definition of freedom of speech evolved over time as the courts have ruled on First Amendment cases?

 

ANSWER:  The First Amendment has been interpreted by the Supreme Court as applying to the entire federal government, even though it only expressly refers to Congress. Numerous court decisions have broadened the definition of speech to include nonverbal, visual, and symbolic forms of expression, such as flag burning, dance movements, and hand gestures.

 

  1. Explain a John Doe

 

ANSWER:  An aggrieved party can file a John Doe lawsuit against a defendant whose identity is temporarily unknown because he or she is communicating anonymously or using a pseudonym. Once the John Doe lawsuit is filed, the plaintiff can request court permission to issue subpoenas to command a person to appear under penalty. If the court grants permission, the plaintiff can serve subpoenas on any third party—such as an ISP or a Web site hosting firm—that may have information about the true identity of the defendant. When, and if, the identity becomes known, the complaint is modified to show the correct name(s) of the defendant(s). This approach is also frequently employed in copyright infringement lawsuits where unknown parties have downloaded movies or music from the Internet.

 

  1. Discuss why S. organizations must be very careful when dealing with issues relating to pornography in the workplace.

 

ANSWER:  By providing computers, Internet access, and training in how to use those computers and the Internet, companies could be seen by the law as purveyors of pornography because they have enabled employees to store pornographic material and retrieve it on demand. In addition, if an employee sees a coworker viewing porn on a workplace computer, that employee may be able to claim that the company has created a hostile environment.

 

  1. Why do some people believe that the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN- SPAM) Act has increased the amount of spam?

 

ANSWER:  The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act clearly defines the conditions under which the sending of spam is legal, and as long as mass emailers meet those requirements, they cannot be prosecuted. Some suggest that the act could be improved by penalizing the companies that use spam to advertise, as well as ISPs who support the spammers.

 

 

 

  1. How can speech be considered obscene and not protected under the First Amendment?

 

ANSWER:  In its 1973 ruling in Miller v. California case, the Supreme Court determined that speech can be considered obscene and not protected under the First Amendment, based on the following three questions:

  • Would the average person, applying contemporary community standards, find that the work, taken as a whole, appeals to the prurient interest?
  • Does the work depict or describe, in a patently offensive way, sexual conduct specifically defined by the applicable state law?
  • Does the work, taken as a whole, lack serious literary, artistic, political, or scientific value?

There are no reviews yet.

Add a review

Be the first to review “Ethics in Information Technology 5Th Ed by George Reynolds – Test Bank”

Your email address will not be published. Required fields are marked *

Category:
Updating…
  • No products in the cart.