Ethics & Privacy
Freedom of Speech & Intellectual Property
Crime & Security
Evaluating & Controlling Technology
Risks, Failures & Work
100

"The sale of consumer information to marketers or other businesses" is an example of this kind of use of personal information.

Secondary use

100

This amendment guarantees protection of offensive and/or controversial speech and ideas

The First Amendment

100

This term refers to intentional, unauthorized access to computer systems.

Hacking

100

What is the term that describes people who oppose technological progress?

Luddite

100

This term refers to the act of working from home via the internet, email, and other means of digital communications.

Telecommuting

200

This kind of policy is one in which a user must take action to withdraw consent (for an organization to use their information in a particular way).

Opt-out policy

200

The protection of websites and social media companies is called?

Safe Harbor

200

This term refers to an individual who, in the early days of computing, wrote clever or elegant programs.

Hacker

200

What is the term that refers to the fact that some groups of people regularly use the various forms of modern information technology, while others do not and cannot?

Digital Divide

200

This term refers to the phenomenon where a company pays other companies to build parts for its products or provide services instead of performing those tasks itself.

Outsourcing

300

In Tampa, Florida, police used technology to scan the faces of nearly 100,000 individuals who entered this event without their knowledge or consent.

2001 Super Bowl

300

Freedom of speech is protection from?

Government censorship 

300

This term refers to software that attaches itself to other software, often times compromising one's computer.

Virus

300

What is the term that refers to the point at which artificial intelligence or some combined human-machine intelligence advances so far that we cannot comprehend what lies on the other side?

Technological Singularity

300

Individuals such as Independent Contractors are described as this type of worker.

Gig worker

400

The _______ of the US Constitution "sets limits on the government’s rights to search our homes and businesses and to seize documents and other personal effects", but does not automatically apply to new technologies.

Fourth Amendment

400

Name one guideline when setting up a website with sensitive information.

Consider potential risks.

Consider unintended readers or users.

Consider ways to prevent access by unintended users.

Remember that it can be difficult to withdraw material once released.

400

These 3 types of hackers possess the ability to hack in ways that are destructive, beneficial, or a little of both.

Black Hat, White Hat, and Gray Hat

400

What does Google and Apple perform to remove illegal or malicious software that the company discovers in an app after users have downloaded it?

Remote Deletion

400

Modern communications, power, medical, financial, retail, and transportation systems depend heavily on this type of system.

Computer system

500

This 1967 Supreme Court case restricted wiretapping by law enforcement by ruling that “the Fourth Amendment does apply to conversations and that it applies in public places..”.

Katz v. United States

500

Name the three categories of modern communications technology.

Print Media (newspapers, books, magazines, and pamphlets)

Broadcast (television and radio)

Common Carriers (telephone, telegraph, and the postal system)

500

In 2014, hackers gained access to personal information, including 40 million credit card numbers and 70 million names, mailing addresses and phone numbers of members of this retail store chain.

Target

500

What nonprofit organization developed a computer specially designed for elementary school children in developing countries?

One Laptop per Child (OLPC)

500

This airline switched to a new reservation system a month before Thanksgiving. Its website and check-in kiosks did not work properly for weeks.

Virgin America