Lesson 1
More Lesson 1
Lesson 2
More Lesson 2
Lesson 3
100

A software license agreement is also called an end user license agreement or _____.

EULA

100

A _______ policy explains how user data is collected and used.

privacy

100

Federal legislation applies to the entire ______, while state legislation applies to a specific state.

country

100

The Digital Millennium Copyright Act is also known as the ______.

DMCA

100

Ethics refers to the ______ principles that guide right and wrong behavior.

moral

200

A software license gives users _________ to use the software.

permission

200

_______ software is also known as closed-source software.

Propietary

200

The Computer Fraud and Abuse Act (CFAA) was enacted in the year ______.

1986

200

Copyright infringement can result in fines ranging from $750 to ______ per work.

$30,000

200

Business ethics focuses on what is right and wrong in ______ practices.

business

300

Breaking a software license agreement can result in ______ or penalties.

fines

300

Copying or distributing proprietary software without permission is a violation of __________.

copyright

300

The CFAA includes ______ sections of criminal activities related to computers.

7

300

______ is the illegal copying or installation of software.

shoplifting

300

Something can be legal but still considered ______.

unethical

400

The section that explains how many copies can be installed is called the ______ of agreement

terms

400

________ software allows users to access and modify the source code.

Open Source

400

The Wiretap Act protects private ______, including digital and oral forms.

communication

400

Net neutrality means that internet service providers should not ______ or block content.

throttle

400

Unethical behavior can damage a company’s ______ and reputation.

profits

500

An acceptable use policy focuses on how users ____ the software.

use

500

_______ software is free to use but does not allow modification or access to source code.

Freeware

500

“Interception” means accessing communication in ______ time.

real

500

The General Data Protection Regulation is commonly referred to as the ______.

GDPR

500

The Computer Ethics Institute created ______ commandments for ethical computer use.

10