CPI - 1.03 Ethics And Security In Computer Programming Question Preview (ID: 40824)


CPI - 1.03 Ethics And Security In Computer Programming. TEACHERS: click here for quick copy question ID numbers.

Which law requires that a government authority have a subpoena, summons, or search warrant to access an individual’s financial records?
a) Fair Use Act of 2007
b) Right to Financial Privacy Acts of 1978
c) Electronic Freedom of Information Act of 1996
d) Fair Credit Reporting Act of 1970

Using a program to record transactions, phone calls and other personal information is what type of ethical consideration?
a) Netiquette
b) Online Profiling
c) Phishing
d) Privacy

Which describes a program designed to reproduce itself by copying itself into other programs without the user’s knowledge?
a) A bug
b) A reproduction
c) A virus
d) An infection

Which act gives individuals the right to see information maintained about them?
a) Electronic Communications Privacy Act of 1986
b) Federal Information Security Management Act of 2002
c) Consumer Credit Reporting Reform Act of 1996
d) Privacy Act of 1974

The information posted on the Social Security Administration website for public view and access is in compliance with which legislation?
a) Electronic Communications Privacy Act of 1986
b) Electronic Freedom of Information Act of 1996
c) Privacy Act of 1974
d) Safety and Freedom through Encryption Act of 1999

Which act requires commercial websites that collect personal information from children under the age of 13 to obtain parental consent?
a) Electronic Communications Privacy Act of 1986
b) Children’s Online Privacy Protection Act of 1988 (COPPA)
c) Right to Financial Privacy Act of 1978
d) Consumer Credit Reporting Reform Act of 1996

Which is a netiquette guideline?
a) Never change your password.
b) Access the account of another user.
c) Do not attempt to access the account of another user without authorization.
d) Share your password.

Which act requires federal agencies to develop, document, and implement an agency-wide program to provide information security?
a) Electronic Communications Privacy Act of 1986
b) Federal Information Security Management Act of 2002
c) Identity Theft Penalty Enhancement Act of 2004
d) Privacy Act of 1974

Jamie is careful to use non-offensive language and to be considerate of the feelings of others when she sends email messages. What does this behavior exemplify?
a) Information age
b) Netiquette
c) Online Profiling
d) Privacy

Which act gives law enforcement the ability to monitor individual’s email and web activity?
a) Provide Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act of 2001
b) Right to Financial Privacy Act of 1978
c) Consumer Credit Reporting Reform Act of 1996
d) Privacy Act of 1974

Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 40824 in the upper right hand corner or click here.

TEACHERS / EDUCATORS
Log In
| Sign Up / Register