Module 1
Module 2
Module 3
Module 4
Module5
100

The goal is to increase happiness and to satisfy a person's needs and values.

What is Utilitarianism

100

the U.S. Supreme Court determined that the government needs a court order to intrude where a reasonable person has a reasonable expectation of privacy.

What is Katz v. United States (1967)

100

The first and most sweeping censorship law for the Internet.

What is the Communications Decency Act (CDA) of 1996?

100

This office evaluates each patent application and decides whether to grant a patent.

What is the U.S. Patent and Trademark Office

100

Hacking to promote a political cause?

What is hacktivism

200

Emphasize duty and absolute rules to be followed whether they lead to good or ill consequences in particular cases.

What is Deontological theories?

200

telecommunications equipment must be designed to allow the interception of telephone calls (with a court order)

What is The Communications Assistance for Law Enforcement Act

200

Federal legislation that targets commercial spam and covers labeling of advertising messages, opt-out provisions, and methods of generating email lists.

What is CAN-SPAM Act.?

200

An idea, an ethic, advocated and supported by a large loose-knit group of computer programmers who allow and encourage people to copy, use, and modify their software.

What is free software?

200

Websites that are specifically designed to be attractive to hackers

What are honey pots

300

Every man would act according to his own interests, no one is safe from physical harm, and there is no ability to ensure the satisfaction of one's needs. However, man is rational and will give up some independence to enforce a social contract.

What is Thomas Hobbes "state of nature"

300

The Privacy Act of 1974 established rules to regulate:

What is Federal government databases only

300

Sending a sexually suggestive or explicit text or photos, usually by smartphone or social media

What is sexting?

300

A legal concept that defines rights to certain kinds of intellectual property that protects works such as books, articles, plays, songs (both music and lyrics), works of art, movies, software, and videos.

What is a copyright?

300

Biological characteristics that are unique to an individual?

What are biometrics

400

Impose an obligation on some people to provide certain things for others.

What is Claim rights or positive rights . . .?

400

was the first major case of digital technology surveillance and involved police attaching a GPS tracking device to a person's vehicle without a search warrant.

What is U.S. v. Jones (2012)

400

In the context of electronic communications, originally referred to unsolicited bulk email, text messages, tweets, and phone calls

What is spam?

400

A copyright work becomes _____after the lifetime of its creator plus 70 years.

What is public domain?

400

Sending millions of emails fishing for information to use to impersonate someone and steal money or goods?

What is phishing

500

a file that a Web site stores on a visitor's computer

What is a cookie

500

the U.S. Supreme Court ruled that when the government uses a device that's not in use by the general public to "see" things it could not without intrusion, that is a "search" and requires a warrant.

What is Kyllo v. United States (2001)

500

In 2016, this organization released tens of thousands of emails hacked from the Democratic National Committee and an email of Hillary Clinton campaign chair John Podesta.

What is WikiLeaks?

500

A collection of techniques that control access to and use of intellectual property in digital formats.

What is Digital Rights Management?

500

Verbal defamation of a person?

What is slander

M
e
n
u