• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

Multiple-choice Questions with answers and references to the text

Testbanks Dec 30, 2025 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

Multiple-choice Questions (with answers and references to the text) Chapter 1 1.Which of the following is an example of a negative right or liberty?(a)freedom of speech, as provided in the First Amendment of the U.S. Constitution (b)freedom of religion, as provided in the First Amendment of the U.S. Constitution (c)the right to use your labor, skills or mind to create goods and services (d)all of the above

Correct answer: d - pg 31

2.Claim rights or positive rights (a)are rights to act without interference (b)are guaranteed in the First Amendment (c)impose an obligation on some people to provide certain things for others (d)all of the above

Correct answer: c - pg 31

Chapter 2 1.When a person visits a Web site, his or her IP address and the links he or she clicked on are automatically recorded. This is an example of (a)secondary use (b)invisible information gathering (c)data spillage (d)data mining

Correct answer: b - pg 56-57

2.The Privacy Act of 1974 established rules to regulate (a)private sector databases only (b)all databases that contain personal information A Gift of Fire Social Legal and Ethical Issues for Computing Technology 4e Sara Baase (Test Bank All Chapters, 100% Original Verified, A+ Grade) 1 / 3

(c)all personal information, including surveillance data (d)Federal government databases only

Correct answer: d - pg 84

3.A cookie is (a)a feature of a Web site designed to attract children (b)an illegal use of information about a customer (c)a file that a Web site stores on a visitor's computer (d)a small reward that can be redeemed on a Web site

Correct answer: c - pg 58

4.If a business follows an "opt-in" policy for handling personal data, information about a customer (a)may not be released under any conditions (b)may not be released unless the customer gives permission (c)may be released unless the customer requests that the information be kept private (d)may be released for any legitimate business purpose

Correct answer: b - pg 59

5.The Communications Assistance for Law Enforcement Act (CALEA) said that (a)international electronic communications must be filtered through a single hub.(b)agents of a foreign power may be wiretapped with authorization from a secret court (c)telecommunications equipment must be designed to allow the interception of telephone calls (with a court order) (d)email should have the same degree of legal protection as telephone calls

Correct answer: c - pg 115

Chapter 3 1.The legal guidelines for determining whether material is obscene include all of the following EXCEPT (a)the material depicts particular sexual (or excretory) acts specified by state law (b)the material is patently offensive according to contemporary community standards 2 / 3

(c)the material has no serious artistic, literary, social, political, or scientific value (d)the material is intended for or distributed to persons under the age of 18

Correct answer: d - pg 140

2.Which of the following requirements was a key provision of the Children's Internet Protection Act (CIPA)?(a)proof of age must be provided to access Web sites containing pornography (b)children must not be allowed to access "hate material" online (c)filtering software must be installed on Internet terminals in schools and libraries (d)commercial Web sites must require parental consent for access by children

Correct answer: c - pg 142

3.Anonymizers allow a user to (a)obtain a new identity (b)send email and surf the Web anonymously (c)secretly spy on people visiting your Web site (d)randomly create a handle or avatar

Correct answer: b - pg 160-161

4.Which of the following are the two main arguments against the Communications Decency Act accepted by the courts?(a)it was not enforceable, and it did not use the least restrictive means of accomplishing the goal of protecting children (b)it was too vague and broad, and it did not use the least restrictive means of accomplishing the goal of protecting children (c)it was too vague and broad, and it did not use community standards to determine what would be harmful to minors (d)it was not enforceable, and it did not use community standards to determine what would be harmful to minors

Correct answer: b - pg 141

5.Many countries have tried to censor the Internet. Which country issued the following edict in 2001: The office of communications is ordered to find ways to ensure that the use of the Internet becomes impossible.

  • / 3

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

With its in-depth analysis, this document enhanced my understanding. Definitely a excellent choice!

Download Document

Buy This Document

$1.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Testbanks
Added: Dec 30, 2025
Description:

Multiple-choice Questions (with answers and references to the text) Chapter 1 1.Which of the following is an example of a negative right or liberty? (a)freedom of speech, as provided in the First A...

Unlock Now
$ 1.00