Communications 106: Communication in the Digital Age  /  Business Courses

Test Prep Plan - Take a practice test

Take this practice test to check your existing knowledge of the course material. We'll review your answers and create a Test Prep Plan for you based on your results.
How Test Prep Plans work
1
Answer 50 questions
Test your existing knowledge.
2
View your test results
Based on your results, we'll create a customized Test Prep Plan just for you!
3
Study smarter
Study more effectively: skip concepts you already know and focus on what you still need to learn.

Digital Media Regulation Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. The host of a popular daytime radio show ignores his guest's use of profanity during their lively on-air conversation. This violates the FCC's _____.

Question 2 2. Which of the following is the BEST explanation for the largely unrestricted violence and adult content found on the Internet?

Question 3 3. Your favorite presidential candidate is appearing on a television talk show. You learn that your least favorite candidate will be on the same show the next day. The television station is likely honoring the _____.

Question 4 4. Which of the following is NOT a program used by employers to monitor employees' computer usage?

Question 5 5. A small computer program gets stored on a user's hard drive. The program then collects the user's habits and transmits that information to a third party, all without the user's consent. From this description, the small program is _____.

Page 2

Question 6 6. Which of the following BEST describes the monitoring of people with technology, often without their knowledge?

Question 7 7. Which is true about closed source software?

Question 8 8. Which of the following is an example of an intellectual property?

Question 9 9. Which term refers to software that is distributed for free with accessible source code that can be modified and improved by anyone?

Question 10 10. Which of these is the potential punishment for violating the NET Act?

Page 3

Question 11 11. Offenders of the NET Act might get in trouble for all of the following EXCEPT which?

Question 12 12. What precipitated the No Electronic Theft Act?

Question 13 13. With which of the following will you give your Social Security number to?

Question 14 14. Who should you call if you suspect someone has submitted a false change-of-address form with the post office in your name?

Question 15 15. What can you do to protect yourself when you go on vacation?

Page 4

Question 16 16. When an online retailer collects and stores personal data on customers in exchange for giving the customers discounts through a loyalty program, the customers are surrendering their _____.

Question 17 17. If you are a victim of identity theft, which of the following is not an action you should take?

Question 18 18. Jonas spends his time intentionally breaching security to break into personal or e-commerce retailers computers for malicious purposes. Jonas is _____.

Question 19 19. What agency or agencies currently regulate consumer data on social media?

Question 20 20. Which of the following actions is usually unlawful for an employer to do?

Page 5

Question 21 21. Both federal and state laws often require an organization to:

Question 22 22. If a news organization wants to do a story on the allocation of federal grant money, which of the following would be most helpful?

Question 23 23. Which of the following refers to the right to determine when, and to what extent, information about oneself can be communicated to others?

Question 24 24. Copyright law gives authors the exclusive rights to their work, including the right to make copies for the author's lifetime plus how many years after death?

Question 25 25. Who administers the NET Act?

Page 6

Question 26 26. What is identity theft?

Question 27 27. Which of the following is not considered a form of fraud?

Question 28 28. Violations of laws governing social media can be treated as:

Question 29 29. Marge is running for public office. Her opponent suggests (falsely) on the evening news that Marge used state money to fund her personal vacation. Her opponent's accusation is an example of _____.

Question 30 30. _____ is a small data file stored on a computer hard drive by a website when the user visits the site.

Digital Media Regulation Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Support