Click on the correct response for each question below.
|
1 | | At the time your textbook was printed, about ____________ of American households had regular access to the Internet.
|
| | A) | 25%
|
| | B) | 72%
|
| | C) | 75%
|
| | D) | 90%
|
|
|
2 | | If the Regional Bell Operating Companies had delivered on the promises they made in the early 1990s, ____________ households would already be connected to the Internet via high-speed, fiber optic lines, instead of only about ____________ at the turn of the century.
|
| | A) | 100 million, 10 million
|
| | B) | 44 million, 500 thousand
|
| | C) | 14 million, 1 million
|
| | D) | 1 million, 500 thousand
|
|
|
3 | | Under federal law, crackers caught stealing classified data can get up to ____________ in prison.
|
| | A) | 1 year.
|
| | B) | 5 years.
|
| | C) | 10 years.
|
| | D) | 15 years.
|
|
|
4 | | Which of the following statements are true?
|
| | A) | The goal of NetDay is to achieve a seamless integration of technology resources into every day and every moment of classroom instruction in America’s schools.
|
| | B) | Whites are more likely to have access to the Internet at home than Blacks or Hispanics have from any location.
|
| | C) | The moratorium imposed by the Internet Tax Freedom Act will expire in 2005.
|
| | D) | Both A and B.
|
|
|
5 | | The ____________ is a nonprofit civil liberties organization working in the public interest to protect privacy and to promote responsibility in new media.
|
| | A) | NCSA
|
| | B) | EPIC
|
| | C) | CDT
|
| | D) | IETF
|
|
|
6 | | The ____________ is a public interest research center that was established to focus public attention on civil liberties issues and protect privacy, the First Amendment, and constitutional values.
|
| | A) | NCSA
|
| | B) | EPIC
|
| | C) | CDT
|
| | D) | IETF
|
|
|
7 | | A service on the Internet called ____________ performs sleuthing activities.
|
| | A) | Stalkers Group
|
| | B) | Stalker Page
|
| | C) | Discreet Data Research
|
| | D) | IPI Research
|
|
|
8 | | CyberAngels is an organization established to help Internet users
|
| | A) | Who are being stalked on the Internet.
|
| | B) | Who have questions about online security, safety, and privacy.
|
| | C) | Who are looking for personal information on another person.
|
| | D) | Both A and B.
|
|
|
9 | | Which of the following are security measures that can be taken to protect networks against unauthorized access?
|
| | A) | Passwords
|
| | B) | Firewalls
|
| | C) | Filters
|
| | D) | All of the above
|
|
|
10 | | Which of the following statements are false?
|
| | A) | Your mother’s maiden name is a good password to use because it is something you will not forget and other people will not guess.
|
| | B) | It is a common misconception that a Copyright notice at the end of your Web page legally protects your copyright.
|
| | C) | A company’s private internal network is known as an intranet.
|
| | D) | Both A and B.
|
|
|
11 | | Which of the following statements are true?
|
| | A) | A company’s private internal network is known as an intranet.
|
| | B) | China routinely blocks Web sites deemed politically sensitive or harmful such as Western media outlets and human rights groups.
|
| | C) | Fair Use is a section of the U.S. Copyright Law that allows the use of copyrighted works in reporting news, conducting research, and teaching.
|
| | D) | All of the above.
|
|