PY360 Lesson 2 Exam SCORE 95 PERCEN

Question 1
The act of assuming someone else's electronic identity is called:
Question options:

identity theft.

masking.

networking.

spamming.
Question 2
According to John Stuart Mill's Principle of Harm, the only ground on which the government should intervene in the conduct of an individual is when:
Question options:

the individual is breaking the law.

it would clearly be to the benefit of the individual.

the individual is under 18 or over 65.

it would prevent harm to others.
Question 3
Kimberly Young's test for Internet addiction is based on the diagnosis of:
Question options:

pathological gambling.

obsessive/compulsive behavior.

chronic sleeplessness.

anxiety disorders.
Question 4
A Korean cybercafé where people play on-line, persistent games is called a:
Question options:

coffee clubhouse.

computer commons.

PC bang.

Tenretni (Internet spelled backwards).
Question 5
Which of the following laws was upheld as constitutional by the U.S. Supreme Court?
Question options:

Communications Decency Act

Child Online Protection Act

Child Internet Protection Act

All of these laws were upheld as constitutional by the U.S. Supreme Court.
Question 6
A blog is a:
Question options:

character in Lineage, a popular on-line game.

personal journal kept on the Web.

person who assumes a false identity in a chat room.

special symbol visible on displays that show Unicode characters.
Question 7
Which of the following is NOT an example of cyberbullying?
Question options:

Spreading lies.

"Outing".

Forwarding spam.

Tricking someone into revealing personal information.
Question 8
Which of these is NOT an example of direct censorship?
Question options:

Government monopolization

Self-censorship

Pre-publication review

Licensing and registration
Question 9
The Internet and __________ are powerful and flexible tools that support a wide variety of social interactions.
Question options:

the telephone system

email

social web sites

instant messaging
Question 10
The volume of spam is increasing because:
Question options:

companies have found it to be effective.

it is 100 times less expensive than a traditional flyer sent via the U.S. mail.

some people respond to spam advertisements.

All of the above
Question 11
A wiki is a(n):
Question options:

online encyclopedia.

personal journal kept on the Web.

electronic profile constructed automatically by a Web browser.

Web site that allows multiple people to contribute and edit its content.
Question 12
Trying to create a list of valid email addresses by sending email to randomly generated addresses and seeing which ones are delivered is called:
Question options:

a direct attack.

identity theft.

spamming.

a dictionary attack.
Question 13
The __________ Amendment to the Constitution guarantees freedom of speech and freedom of the press.
Question options:

Fifth

First

Second

Sixth
Question 14
Messages embedded in files transferred from one computer to another are commonly called:
Question options:

email.

the World Wide Web.

software.

the operating system.
Question 15
The Enlightenment view of addiction is that:
Question options:

there is nothing wrong with addiction.

addiction is not real.

addiction can never be overcome by will-power alone.

people are responsible for the choices they make.
Question 16
In the United States, freedom of expression is:
Question options:

guaranteed by the Fourth Amendment to the United States Constitution.

a positive right.

limited to political speech.

not an absolute right.
Question 17
The attempt to deceive Internet users into disclosing personal information through the use of official-looking emails is called:
Question options:

identity theft.

deceiving or faking.

phishing.

spoofing.
Question 18
Unsolicited, bulk, commercial email is commonly called:
Question options:

spam.

hacking.

a cookie.

a Trojan horse.
Question 19
From the point of view of Kant or Mill, the responsibility for excessive Internet use lies with:
Question options:

society.

the government.

chat room predators.

the individual user.
Question 20
Many people are now using the Web not simply to download content, but to build communities and upload and share content they have created. This trend has been given the name:
Question options:

persistent online reality.

online networking.

Web 2.0.

interactive hypermedia.

     

No comments:

Post a Comment