Sunteți pe pagina 1din 4

Matching Questions

Chapter 1
utilitarian

"Inventing Right and Wrong" would reflect this theory of ethics

deontological

"Discovering Right and Wrong" would reflect this theory of ethics

positive right

claim right

negative right

liberty

Chapter 2
FISA

the Act which establishes oversight rules for the NSA

FTC

the federal commission that regulates trade

FCC

the federal commission that regulates communications

computer matching

combining and comparing information from different databases using a single


identifier

targeted marketing

advertising based on demographics, purchasing history, or other specific aspects


of people

COPPA

a law passed to protect children's privacy online

data mining

combing through large amounts of data for patterns and information

computer profiling

analyzing data to determine characteristics of people most likely to engage in a


certain behavior

RFID

tags that use radio frequencies to communicate with devices

CALEA

the law that requires communications companies to design equipment so that it is


capable of being tapped

GPS

uses satellite signals and triangulation to determine location

encryption

a technology that transforms data into a form that is meaningless to anyone who
might intercept it

ECPA

a law which prohibits interception of email and reading of (some) stored


email without a court order

Chapter 3
CDA

the first federal legislative attempt in the United States to censor Internet
content (ruled unconstitutional)

CAN-SPAM Act

a law which requires commercial mass e-mail messages to contain opt-out


provisions and accurate subject lines

spam

unsolicited mass email

CIPA

a law which requires schools and libraries to install filtering software if


they wish to receive federal funds (ruled constitutional)

COPA

a law which made it illegal for commercial Web sites to make available to
minors material "harmful to minors" as judged by community standards
(ruled unconstitutional)

net neutrality

would prevent telecommunications companies from giving preferential


treatment to specific content providers or types of content

Chapter 4
"look and feel"

refers to the way a software program appears to the end-user as opposed


to the computer code in which the program is written

DMCA

a law which prohibits making, distributing, or using tools (devices,


software, or services) to circumvent technological copyright protection
systems

open source
software
DRM

programs in which the code is available to programmers

reverse engineering

studying an existing program in order to determine how it was created

a collection of technologies (hardware and software) that control use of


intellectual property in digital formats

Chapter 5
denial-of-service
(DOS)

an attack in which hackers overload a target site with requests for


information.

hactivism

hacking to promote a political cause

honey pots

Web sites that are specifically designed to be attractive to hackers

phishing

sending millions of emails fishing for information to use to impersonate


someone and steal money or goods

pharming

biometrics

planting false Internet addresses in the tables on a Domain Name Server


(DNS) so that when someone types a URL, they are re-directed to a bogus
site
biological characteristics that are unique to an individual

libel

written defamation

slander

verbal defamation

CFAA

a law which covers unauthorized access to computers over which the


federal government has jurisdiction, such as government computers,
financial systems, medical systems, and activities that involve computers
in more than one state

Chapter 6
telecommuting
offshoring

working for an employer at a computer-equipped space in the employee's


home
moving part of a businesss operation to another country

Chapter 7
digital divide

refers to the fact that some people have access to computers and
information technology while others do not

technological
singularity

point at which artificial intelligence advances so far that we cannot


comprehend what lies on the other side

Chapter 8
Therac-25

a computerized machine that gave lethal radiation overdoses to some


cancer patients

HROs

operate in difficult environments where failures can have extreme consequences

TCAS

detects a potential in-air collision of two planes and directs the pilots to avoid
each other

Chapter 9
stakeholders

individuals and organizations who would be affected in some way by an


ethical dilemma

ACM

professional organization for the computing industry

S-ar putea să vă placă și