CMP 235 QUIZ 2 CHAPTER 3

A modern office setting with a computer showing a quiz interface, surrounded by books on internet ethics and security, with a thoughtful individual contemplating the questions.

Internet Ethics and Security Quiz

Test your knowledge on the critical issues surrounding internet ethics, security threats, and privacy. This quiz covers important topics such as censorship, identity theft, ethical theories, and internet regulations.

  • 18 multiple choice questions
  • Gauge your understanding of internet practices
  • Learn about ethical considerations in digital communication
18 Questions4 MinutesCreated by ThinkingTree42
The attempt to suppress or regulate public access to material considered offensive or harmful is called censorship.
True
False
Identity theft can be achieved using phishing, IP spoofing and dumpster diving
True
False
Internet addiction is a false belief
True
False
Web filters are not 100% hence their use is unethical using second formulation as innocent websites are used as means to an end
True
False
A friend of yours used the email addresses of her colleagues at work to advertise for a local charity fundraising. The email was sent during work hours. Using the first formulation of Kantianism is the act unethical since the company owners are used as means to an end
True
False
Unsolicited, bulk, commercial email is commonly called worms
True
False
A friend of yours used the email addresses of her colleagues at work to advertise for a local charity fundraising, the email had a clear subject and content and was sent during work hours 'without' the consent of the company owners. Using the first formulation of Kantianism, this act is ethical
True
False
A friend of yours used the email addresses of her colleagues at work to advertise for a local charity fundraising, the email had a clear subject and content and was sent during work hours 'WITH' the consent of the company owners. Using the second formulation of Kantianism, this act is ethical
True
False
Sting operations in chat rooms are controversial as they use a moral method and the consequences are good however the intentions are immoral
True
False
According to the Child Internet Protection Act, all k-12 schools and libraries must filter pages containing obscenity or adult content
True
False
Trying to create a list of valid email addresses by sending email to randomly generated addresses and seeing which ones are delivered is called a phishing attack.
True
False
An institution shall intervene in the conduct of an individual only when the intervention is needed to prevent harm to others. This is called the Principle of Harm.
True
False
In IP spoofing, the source and destination IP address are spoofed by the attacker.
True
False
Web filtering tools aren’t always accurate, they might block web pages that shouldn't have been blocked.
True
False
The three forms of direct censorship are government monopoly, prepublication review, and licensing and registration.
True
False
It is not technically possible for hackers to install malicious software on remote computers to use them to send out spam emails.
True
False
The US supreme court ruled that the child internet protection act was constitutional.
True
False
A friend of yours used the email addresses of her colleagues at work to advertise for a local charity fundraising, the email had a clear subject and content and was sent during work hours 'without' the consent of the company owners. Using Rule utilitarianism, this act is unethical.
True
False
{"name":"CMP 235 QUIZ 2 CHAPTER 3", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on the critical issues surrounding internet ethics, security threats, and privacy. This quiz covers important topics such as censorship, identity theft, ethical theories, and internet regulations.18 multiple choice questionsGauge your understanding of internet practicesLearn about ethical considerations in digital communication","img":"https:/images/course3.png"}
Powered by: Quiz Maker