Вы находитесь на странице: 1из 3


Chapter 1
______ More people worldwide have access to a cellphone than to a toilet. (T)
______ Wikipedia relies upon an advertising-based business model. (F)
______ A Turing Test determines the strength of an encryption method. (F)
______ Accelerometers help robots stay upright. (T)
______ Researchers are developing brain-computer interfaces to enable severely handicapped
people to control appliances with their thoughts. (T)

Chapter 2
______ In Olmsted v. United States (1928), the U.S. Supreme Court interpreted the Fourth
Amendment to apply only to physical intrusion. (T)
______ In Katz v. United States (1967), the U.S. Supreme Court determined that the government
needs a court order to intrude where a reasonable person has a reasonable expectation of privacy.
______ The Omnibus Crime Control and Safe Streets (1968) explicitly allowed wiretapping and
electronic surveillance by law enforcement agencies with a warrant. (T)
______ The USA PATRIOT Act (2001) gives individuals more protection from governmental
intrusion. (F)
______ In Kyllo v. United States (2001), the U.S. Supreme Court ruled that when the government
uses a device that's not in use by the general public to "see" things it could not without intrusion,
that is a "search" and requires a warrant. (T)
______ U.S. v. Jones (2012) was the first major case of digital technology surveillance and
involved police attaching a GPS tracking device to a person's vehicle without a search warrant.

Chapter 3

______ Broadcast media traditionally has had the strongest First Amendment protection
(meaning the fewest regulatory restrictions) while print media has the weakest First Amendment
protection. (F)
______ The U.S. Supreme Court ruled that requiring content filters on public library computers
was unconstitutional. (F)
______ Miller v. California (1973) ruled that community standards could not play a role in
whether or not material was deemed obscene. (F)

Chapter 4
______ Sony v. Universal City Studios (1983) ruled that private, non-commercial copying for
personal use was fair use. (T)
______ Sega v. Accolade, Inc. (1992) helped determine that reverse engineering was allowable
(fair research use) in order to make a compatible product. (T)
______ All peer-to-peer technologies were found to be illegal as a result of the Napster case. (F)
______ Copyright law protects processes and inventions, while patent law protects the particular
expression of an idea. (F)

Chapter 5
______ The government cannot monitor online activity of suspected hackers without a court
order. (F)
______ Computer forensics specialists cannot recover deleted files from an erased disk. (F)

Chapter 6
______ Roughly half of major companies in the U.S. sometimes monitor the email or voice mail
of their employees on company systems. (T)
______ The Electronic Communications Privacy Act (ECPA) prohibits employers from
intercepting and reading employees' stored email. (F)

______ In the 1980's, the AFL-CIO advocated a government ban on all computer at-home work.

Chapter 7
______ Simplifications and assumptions are always made when designing a computer model.
______ Providing new technology to poor countries is a matter of having enough money to buy
equipment. (F)

Chapter 8
______ Some computer errors are actually system failures, in that it was the human/computer
interface which caused the resulting problem. (T)
______ The cause of failure in a computer program is often due to more than one factor. (T)
______ Legacy systems are typically reliable, but inflexible. (T)
______ U.S. and European pilots are now trained to follow Traffic Collision Avoidance System
(TCAS) instructions even if they conflict with instructions from an air traffic controller. (T)
______ Redundancy and self-checking are often present in safety-critical systems. (T)
______ A feature of high reliability organizations is loose structure. (T)

Chapter 9
______ Software designers should include users in the design stages. (T)
______ Professional ethics requires professionals maintain their skills. (T)