AP CSP Impacts of Computing Pt 3 (Legal/Ethical & Safety)

AP CSP Impacts of Computing Pt 3 (Legal/Ethical & Safety)

9th - 12th Grade

9 Qs

quiz-placeholder

Similar activities

MODULE 9 PRE-TEST

MODULE 9 PRE-TEST

10th Grade

10 Qs

AP CSP MCQ Review Questions Session 4 Quiz

AP CSP MCQ Review Questions Session 4 Quiz

10th Grade

11 Qs

AP CS P Safe Computing

AP CS P Safe Computing

9th - 12th Grade

6 Qs

Big Idea 1

Big Idea 1

9th - 12th Grade

9 Qs

BTEC DIT C1 LAA - What are User Interfaces?

BTEC DIT C1 LAA - What are User Interfaces?

10th Grade

11 Qs

Jakob Nielsen's 10 Usability Heuristics

Jakob Nielsen's 10 Usability Heuristics

10th Grade - University

10 Qs

CIW IBA Lesson 4 Vocabulary

CIW IBA Lesson 4 Vocabulary

8th Grade - Professional Development

11 Qs

Social Media

Social Media

12th Grade

10 Qs

AP CSP Impacts of Computing Pt 3 (Legal/Ethical & Safety)

AP CSP Impacts of Computing Pt 3 (Legal/Ethical & Safety)

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Herman Galioulline

Used 80+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following actions is most likely to raise legal or ethical concerns?

An analyst writes a program that scans through a database of open-access scientific journals and creates a document with links to articles written on a particular topic.

A computer scientist adds several features to an open-source software program that was designed by another individual.

A musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song.

A public interest group alerts people to a scam that involves charging them for a program that is available for free under a Creative Commons license.

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A researcher wants to publish the results of a study in an open access journal. Which of the following is a direct benefit of publishing the results in this type of publication?

The researcher can allow the results to be easily obtained by other researchers and members of the general public.

The researcher can better anticipate the effect of the results and ensure that they are used responsibly.

The researcher can ensure that any personal information contained in the journal is kept private and secure.

The researcher can prevent copies of the research from being accessed by academic rivals.

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A programmer created a piece of software and wants to publish it using a Creative Commons license. Which of the following is a direct benefit of publishing the software with this type of license?

The programmer can ensure that the algorithms used in the software are free from bias.

The programmer can ensure that the source code for the software is backed up for archival purposes.

The programmer can include code that was written by other people in the software without needing to obtain permission.

The programmer can specify the ways that other people are legally allowed to use and distribute the software.

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

StreamPal is an audio-streaming application for mobile devices that allows users to listen to streaming music and connect with other users who have similar taste in music. After downloading the application, each user creates a username, personal profile, and contact list of friends who also use the application.

The application uses the device’s GPS unit to track a user’s location. Each time a user listens to a song, the user can give it a rating from 0 to 5 stars. The user can access the following features for each song that the user has rated.

- A list of users on the contact list who have given the song the same rating, with links to those users’ profiles

- A map showing all other users in the area who have given the song the same rating, with links to those users’ profiles

A basic StreamPal account is free, but it displays advertisements that are based on data collected by the application. For example, if a user listens to a particular artist, the application may display an advertisement for concert tickets the next time the artist comes to the user’s city. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application.

Which of the following is most likely to be a data privacy concern for StreamPal users?

Users of the application are required to rate songs in order to enable all of the application’s features.

Users of the application may have the ability to determine information about the locations of users that are not on their contact list.

Users of the application may not be able to use the application if they are located in an area with a poor Internet connection.

Users of the application may not have similar music taste to any other users on their contact list.

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

StreamPal is an audio-streaming application for mobile devices that allows users to listen to streaming music and connect with other users who have similar taste in music. After downloading the application, each user creates a username, personal profile, and contact list of friends who also use the application.

The application uses the device’s GPS unit to track a user’s location. Each time a user listens to a song, the user can give it a rating from 0 to 5 stars. The user can access the following features for each song that the user has rated.

- A list of users on the contact list who have given the song the same rating, with links to those users’ profiles

- A map showing all other users in the area who have given the song the same rating, with links to those users’ profiles

A basic StreamPal account is free, but it displays advertisements that are based on data collected by the application. For example, if a user listens to a particular artist, the application may display an advertisement for concert tickets the next time the artist comes to the user’s city. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application.

Which of the following statements is most likely true about the differences between the basic version and the premium version of StreamPal?

Users of the basic version of StreamPal are more likely to give songs higher ratings than are users of the premium version of StreamPal.

Users of the basic version of StreamPal indirectly support StreamPal by allowing themselves to receive advertisements.

Users of the basic version of StreamPal spend more on monthly fees than do users of the premium version of StreamPal.

Users of the basic version of StreamPal use less data storage space on their devices than do users of the premium version of StreamPal.

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A user unintentionally installs keylogging software on a computer. Which of the following is an example of how the keylogging software can be used by an unauthorized individual to gain access to computing resources?

The software gives an unauthorized individual remote access to the computer, allowing the individual to search the computer for personal information.

The software installs a virus on the computer and prompts the user to make a payment to the unauthorized individual to remove the virus.

The software prompts the user to enter personal information to verify the user’s identity. This personal information is recorded and transmitted to an unauthorized individual.

The software records all user input on the computer. The recorded information is transmitted to an unauthorized individual, who analyzes it to determine the user’s login passwords.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

An individual receives an e-mail that appears to be from an insurance company. The message offers a low insurance rate, and prompts the recipient to click a link to learn more. Which of the following is most indicative that the e-mail is part of a phishing attempt?

After clicking the link, a browser cookie is downloaded to the recipient’s computer.

After clicking the link, a Web page opens that prompts the recipient for personal information.

After clicking the link, the recipient’s private network becomes publicly visible via a rogue access point.

After clicking the link, software is installed on the recipient’s computer that records every keystroke made on the computer.

8.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A city’s police department has installed cameras throughout city streets. The cameras capture and store license plate data from cars driven and parked throughout the city. The authorities use recorded license plate data to identify stolen cars and to enforce parking regulations.

Which of the following best describes a privacy risk that could occur if this method of data collection is misused?

The cameras may not be able to read license plates in poor weather conditions.

Local business owners could lose customers who are unwilling to park in the city.

Traffic personnel who work for the city could lose their jobs if their services are no longer needed.

The vehicle location data could be used to monitor the movements of city residents.

9.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following best exemplifies the use of multifactor authentication?

A computing device enables users to input information using multiple interfaces, including a keyboard, a mouse, and a touch pad.

A user employs a public key encryption method that uses one key to encrypt information and a different key to decrypt information.

A Web site requires a user to enter a password as well as a numeric code received via text message before the user can log in to an account.

Multiple users share an account to a Web-based software program, and each user has an individual username and password.