Assessment Statistics III/third final question survey
Name: III/third final question survey
Number of Attempts: 59
Instructions: Use notes, books, Internet, discussion -- class answers in terms of percent choosing each choice correct will be provided to the class.

Question 1 text   Question 1   Multiple Choice  
  I can purchase the movie Gattaca via iTunes or Amazon video on demand for $9.99. I can watch it for free via I can also download it using a Bittorrent client from: (this site has not been verified in terms of availability or quality, but the site indicates Gattaca is available).

Which of the following claims is NOT true about watching Gattaca?
Question 1 answers
Answers Percent Answered
Watching via is possible in part because advertisements are shown before and during the movie, these ads can't be skipped. 1.695%
If I pay for the movie and watch it in iTunes than I can also download the movie using bittorrent as a backup without violating copyright law. 76.271%
If I download the movie using Bittorrent and show it to you in my office where you don't know how I obtained the movie we watch then you have not violated copyright law. 18.644%
I can back up the version I download from iTunes as part of my daily backup plan even if I store all my backed-up data on Amazon's S3 data-storage servers. 3.39%
Unanswered 0%

Question 2 text   Question 2   Multiple Choice  
  Which of the following is NOT true regarding p2p networks on college campuses.
Question 2 answers
Answers Percent Answered
The Higher Education Reauthorization Act, passed recently, requires colleges to offer alternatives to illegal downloading "to the extent practible". 15.254%
Universities and colleges average spending more than $200,000/year each to detect and deal with p2p traffic according to a report published in the last two years. 18.644%
Several colleges do deep packet inspection on network traffic to look for illegal filesharing via p2p networks in addition to shaping traffic by slowing down p2p packets. 15.254%
Duke views illegal p2p file-sharing as a violation of the community standard and students who are served with notices from the RIAA are also subject to judicial punishment via Duke's undergraduate judicial board. 45.763%
Unanswered 5.085%

Question 3 text   Question 3   Multiple Choice  
  In class we saw an iPhone application called Shazam that can identify songs being played in a room and 'listened to' by the iPhone. We also discussed a company named 'Audible Magic' that offers software and hardware solutions to help identify illegal p2p traffic using deep packet inspection and comparing traffic against a database of copyrighted audio/songs.

Which of the following is LEAST likely to be true regarding these applications?
Question 3 answers
Answers Percent Answered
They both compare bits/data with a database of stored, copyrighted works -- they transmit the bits/data and then receive feedback indicating what (if any) copyrighted work is identified by the bits/data. 5.085%
The technique of identifying a work by a small digital fingerprint is shared by both applications, but the computer code doing the identification is different in each application. 16.949%
If one million more songs/tracks are added to the databases used by these applications each year, the time it takes to identify a song will increase significantly -- to the point that they'll likely have to be rewritten in the next few years. 59.322%
If one of the companies holds a patent on the technique of identifying a song or audio work using a digital fingerprint it's possible that the other company has licensed the patent to be able to offer its service. 13.559%
Unanswered 5.085%

Question 4 text   Question 4   Multiple Choice  
  Which of the following is NOT true regarding the files known as 'cookies' which browsers save on a computer?
Question 4 answers
Answers Percent Answered
Some of the data stored in a cookie identifies when the cookie expires -- i.e., when the browser will remove the cookie if the user doesn't remove it before the expiration time. 5.085%
Visiting some sites causes so-called 'third party' cookies to be saved, these are cookies that come from a site other than the one being visited. 3.39%
Very few sites cause more than one or two cookies to be saved when the site is visited. Most sites only save one cookie that can be used to see when the user was last at the site. 89.831%
Browsers on public computers, e.g., those in Perkins, Bostock, or the Durham public libraries should be set to remove stored cookies when the user logs off to assist with privacy concerns. 1.695%
Unanswered 0%

Question 5 text   Question 5   Multiple Choice  
  Which of the following is NOT true regarding the Domain Name System (DNS)?
Question 5 answers
Answers Percent Answered
There are alternatives to using the DNS services whose protocols are IETF-generated and which is operated by ICANN, e.g., using OpenDNS. 15.254%
In 2008 flaws were found in one of the common, open source implementations of DNS. However, companies that use the flawed implementation, like Yahoo, refused to patch their software and the flawed systems are still in widespread use. 45.763%
In 2008 a judge ordered that the DNS entries for be removed to deter access to materials on the website. However, using the wikileak IP address worked even when the DNS entries were removed. 1.695%
Content delivery networks like Akamai use their own DNS rather than the ICANN-sponsored DNS. 27.119%
Unanswered 10.169%

Question 6 text   Question 6   Multiple Choice  
  Which of the following is NOT true about routers?
Question 6 answers
Answers Percent Answered
IP routers help IP packets find a path to their destination on the Internet. Each packet knows where it started and where it's going -- the routers help it get to where it's going. 3.39%
Wireless routers help share a wired connection with many wireless connections so that laptops, iPhones, and other devices can have Internet access without running a cable to the device. 1.695%
Although some router technologies are protected by patents the courts have ruled that because the Internet was started as a federally-funded project all router patents must be licensed without fees until the year 2020. 76.271%
Routers that facilitate BGP (border gateway protocol) traffic typically talk to other BGP routers. 10.169%
Unanswered 8.475%

Question 7 text   Question 7   Multiple Choice  
  Suppose Duke gives every undergraduate an emergency cell-phone, but half the phones can only receive calls and not make them while the other half can call two student numbers that are hard-wired into the phones when they're distributed to students. No student's number is stored in more than one phone, and every student's number is stored in some phone.

Suppose a student Sam is called at noon, that Sam can also make calls on their phone, that Sam hears a message that takes one minute to hear, that Sam immediately calls the two numbers and repeats the message, and that everyone that gets called immediately picks up, listens, and immediately calls two numbers if they can (remember, half the students can't make any calls.)

Which of the following is NOT true regarding this scenario.
Question 7 answers
Answers Percent Answered
It's possible that fewer than 10 people ever hear the message because of the order in which calls are made, e.g., some people that can't make calls could be called early. 10.169%
It's possible that everyone will have heard the message before 1:00 pm if the phone tree described works perfectly, e.g., the people that can't make calls are called 'last'. 10.169%
If everyone who gets a message also updates their wall on Facebook when they get the message and have made their two calls then the message will spread more slowly because of the time taken to update the wall. 49.153%
It's possible that the refusal of only one person who can make calls to make the calls (everyone else called who can make calls does so) will cause more than 90% of the students at Duke to not get the message. 18.644%
Unanswered 11.864%

Question 8 text   Question 8   Multiple Choice  
  Which of the following is NOT true about the Akamai overlay network?
Question 8 answers
Answers Percent Answered
Akamai's technology is covered by the patent system so there are no other Content Distribution Networks. 47.458%
Akamai's technology helps ensure that content is distributed more quickly on the Internet. 3.39%
Akamai's technology was developed primarily by computer scientists rather than business entrepreneurs. 32.203%
Akamai's technology is based in part on storing replicated copies of content throughout the world. 5.085%
Unanswered 11.864%

Question 9 text   Question 9   Multiple Choice  
  Which of the following is NOT a court case related to digital copyright issues?
Question 9 answers
Answers Percent Answered
Perfect10 v Amazon and Google for storing thumbnail images of porn stars. 20.339%
MGM v Grokster for violation of copyright over p2p networks. 0%
Capital Records v Thomas for sharing audio files over a p2p network. 10.169%
Duke v Elliott Wolf for distribution of copyrighted materials over a campus network. 67.797%
Unanswered 1.695%

Question 10 text   Question 10   Multiple Choice  
  Which of the following is NOT a case of Internet censorship?
Question 10 answers
Answers Percent Answered
Turkey asks YouTube to remove videos that are insulting to Ataturk. 1.695%
China stores some Skype messages on servers in China when the messages are tagged as being in violation of Chinese law/policy. 13.559%
Groups in France ask that sites selling Nazi memorabilia in the US via Yahoo! be inaccessible in France. 1.695%
Students in Compsci 82 request that their pictures not be part of the pick-a-student program displaying student photos in class. 83.051%
Unanswered 0%