The Fourth Amendment to the U.S. Constitution has to do with
freedom of speech and religion.
the right to bear arms.
quartering of soldiers in private homes.
Answer: p. 278 (note: page numbers taken from Quinn, 7th edition)
After the terrorist attacks of September 11, 2001, the U.S. Congress
passed this legislation, which gave federal law enforcement and
intelligence officials greater authority to monitor communications.
Freedom of Information Act
War on Terror Act
National Security Act
USA Patriot Act
Answer: p. 288
Chapter 7: Computer and Network Security
The Internet worm was released by
Robert Morris, Jr.
Answer: p. 328+
A program with a benign capability that conceals another, sinister purpose is called a
Answer: p. 336
Chapter 8: Computer Reliability
The Patriot missile system
was designed to shoot down airplanes.
failed to shoot down a Scud missile that killed 28 U.S. soldiers in the Gulf War.
failed because it had been left running too long.
failed because of a computer error.
All of the above
Answer: p. 368–9
Computers that process data from sensors as events occur are called
Answer: p. 372
Chapter 9: Professional Ethics
The process giving someone the legal right to practice a profession is called
Answer: p. 409
A mature profession insists that its members complete an initial
professional education. The process by which the profession assures that
this formal course work meets its standards is called
Answer: p. 415
Chapter 10: Work and Wealth
According to Max Weber, the growth of capitalism was stimulated by a new
attitude toward work brought about by
the Industrial Revolution
the Protestant Reformation
the English Civil War
the Lisbon earthquake of 1755
the American Revolution
Answer: p. 457
Artificial intelligence is the field of computer science and engineering that focuses on ways to get machines to exhibit
Answer: p. 465
Exam coverage of multimedia and news is
intended to evaluate whether you paid attention to them and comprehended
their historical and ethical significance. For example:
In his TED talk, cybersecurity specialist James Lyne
demonstrates this kind of attack on his website
distributed denial of service
In his TED talk, cybersecurity expert Mikko Hypponen asserts that NSA
surveillance must be countered by creating tech solutions that are not
based in the U.S., and this can be accomplished through