Privacy
Amendments & Crime
Intellectual Property
Security
The Divide
100

In what year did Apple label phones as smart?

What is 2007?

100

A legal concept that defines rights to certain kinds of intellectual property is known as what?

What is copyright?

100

In 1988, a computer program known as what clearly established the vulnerability of the Internet as a whole to malicious hacking?

What is the Internet Worm/Morris Worm?

100

What is referred to as irresponsible, destructive action performed by a criminal in the digital world?

What is hacking?

100

This term describes the practice of allowing people to work virtually because of advanced technology.

What is remote work?

200

Clocks, calculators, calendars, games, radio, watches, and books were replaced by this.

What is a smartphone?

200

What case was the first case about private, noncommercial copying of copyrighted work concerning videotape recording machines?

What is Sony v Universal City Studios (1984)?

200

What refers to a variety of proposals for restrictions on how telecommunications companies interact with their broadband customers and how they set charges for services?

What is net neutrality?

200

What do you call thieves that install recording devices to collect credit and debit card numbers and PINs?

What are skimmers?

200

This term refers to the gap between those who have access to digital technologies and those who do not.

What is the digital divide?

300

What is the process of searching and analyzing a large batch of data to identify patterns and extract useful information?

What is Data Mining?

300

This is the name given to those whose activities are destructive, unethical, and, usually, illegal.

What is a black hat hacker?

300

What are the three categories in the three-part framework for First Amendment protection?

What are print media, broadcast, and common carriers?

300

What is the term used for hacking to promote a political cause?

What is hacktivism?

300

When technology causes problems instead of fixing them, what do we call that?

What is technological backlash?

400

Intentional, institutional uses of personal information, unauthorized use or release by “insiders,” is a?

What is a threat to privacy?

400

Under what act is it illegal to access a device, which the federal government has jurisdiction of, without authorization, or to exceed one’s authorization, and read or copy information?

What is the Computer Fraud and Abuse Act (CFAA)?

400

How many years do patents last in the US?

What is 20 years?

400

Employers often prioritize this aspect when implementing technology in the workplace, aiming for increased productivity and efficiency.

What is cost-effectiveness?

400
This diseases forced many companies to offer remote work to its employees.

What is the Coronavirus?

500

Who is the best-known founder and advocate of the free software movement?

Who is Richard Stallman?

500

Which Amendment to the U.S. Constitution restricts the power of government, not individuals or private businesses?

What is the First Amendment?

500

What protects the intellectual property created by artists?

What is a Copyright?

500

What is a computer program that allows users to store and manage their passwords for local applications or online services?

What is a Password Manager?

500

This group is often affected by the digital divide due to factors such as socioeconomic status and geographic location.

What is rural communities or low-income individuals?