Question: Software that can be installed with a Web browser to block access to certain Web sites that contain inappropriate or offensive material is known as which of the following?
Answer Options:
Answer: Internet filter
Question: Which country has the largest online population in the world and also perhaps the most rigorous Internet censorship?
Answer Options:
Answer: China
Question: Possession of child pornography is a federal offense punishable by up to how many years in prison?
Answer Options:
Answer: ten
Question: Which of the following statements is true of Children’s Internet Protection Act (CIPA)?
Answer Options:
Answer: CIPA requires federally financed schools to use some form of technological protection to block computer access to obscene material.
Question: The Supreme Court has held that obscene speech and which of the following are not protected by the First Amendment and may be forbidden by the government?
Answer Options:
Answer: defamation
Question: Which of the following statements best describes the reason why social networking companies cannot be sued for defamation for user postings that appear on their sites?
Answer Options:
Answer: Section 230 of the Communications Decency Act (CDA) is not considered unconstitutional.
Question: Each violation of the provisions of the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act can result in a fine of up to $250 for each unsolicited email, and fines can be tripled in certain cases.
Answer Options:
Answer: False
Question: Smart devices will increasingly need __________. (select all that apply)
Answer Options:
Answer: higher bandwidth
Question: Bits are used for computer data because they __________.
Answer Options:
Answer: are easy to represent physically
Question: Main memory is also known as __________.
Answer Options:
Answer: random access memory
Question: Which of the following is an example of SaaS?
Answer Options:
Answer: iCloud
Question: Which of the following refers to the three tiers in the three-tier architecture?
Answer Options:
Answer: user, server, and database
Question: Identify the closed-source DBMS product(s) among the following. (Select all that apply)
Answer Options:
Answer: DB2 Oracle Database
Question: The characteristics of an entity are referred to as _______.
Answer Options:
Answer: attributes
Question: Which of the following is a NoSQL (i.e., not-relational) DBMS? (select all that apply)
Answer Options:
Answer: Dynamo Cassandra
Question: A data integrity problem will occur only if __________.
Answer Options:
Answer: data are duplicated in a database
Question: An employee database includes a column named “Employee Number” to assign unique numbers to each employee. This column is referred to as a(n) __________.
Answer Options:
Answer: primary key
Question: In an E-R diagram, which symbol is used to indicate that at least one entity of that type is required?
Answer Options:
Answer: vertical bar