The Fourth Amendment to the U.S. Constitution has to do with
freedom of speech and religion.
search warrants.
the right to bear arms.
quartering of soldiers in private homes.
self-incrimination.
Answer: p. 278 (note: page numbers taken from Quinn, 7th edition)
After the terrorist attacks of September 11, 2001, the U.S. Congress
passed this legislation, which gave federal law enforcement and
intelligence officials greater authority to monitor communications.
Privacy Act
Freedom of Information Act
War on Terror Act
National Security Act
USA Patriot Act
Answer: p. 288
Chapter 7: Computer and Network Security
The Internet worm was released by
John Barlow.
Katie Hafner.
John Markoff.
Robert Morris, Jr.
Bruce Sterling.
Answer: p. 328+
A program with a benign capability that conceals another, sinister purpose is called a
hack
rogue
Trojan horse
virus
worm
Answer: p. 336
Chapter 8: Computer Reliability
The Patriot missile system
was designed to shoot down airplanes.
failed to shoot down a Scud missile that killed 28 U.S. soldiers in the Gulf War.
failed because it had been left running too long.
failed because of a computer error.
All of the above
Answer: p. 368–9
Computers that process data from sensors as events occur are called
distributed computer
event-driven simulation
pseudo-sensory system
real-time systems
time-activated system
Answer: p. 372
Chapter 9: Professional Ethics
The process giving someone the legal right to practice a profession is called
certification
licensing
matriculation
professional ethics
professional development
Answer: p. 409
A mature profession insists that its members complete an initial
professional education. The process by which the profession assures that
this formal course work meets its standards is called
certification
licensing
accreditation
graduation
ratification
Answer: p. 415
Chapter 10: Work and Wealth
According to Max Weber, the growth of capitalism was stimulated by a new
attitude toward work brought about by
the Industrial Revolution
the Protestant Reformation
the English Civil War
the Lisbon earthquake of 1755
the American Revolution
Answer: p. 457
Artificial intelligence is the field of computer science and engineering that focuses on ways to get machines to exhibit
consciousness
ethical behavior
intelligent behavior
philosophical insights
scientific breakthroughs
Answer: p. 465
Exam coverage of multimedia and news is
intended to evaluate whether you paid attention to them and comprehended
their historical and ethical significance. For example:
Multimedia
In his TED talk, cybersecurity specialist James Lyne
demonstrates this kind of attack on his website
IncrediblyHacked.com.
distributed denial of service
SQL injection
phishing
cross-site scripting
worm
In his TED talk, cybersecurity expert Mikko Hypponen asserts that NSA
surveillance must be countered by creating tech solutions that are not
based in the U.S., and this can be accomplished through