. _____ permits you to use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews. {Ans: The Fair Use Doctrine}Backdoor {Ans: Programming routine built into a system by its designer or programmer • Enables the designer or programmer to bypass security and sneak back into the system later to access programs or files}In the context of information privacy, junk e-mail is also known as _____ {Ans: spam}Define these terms {Ans: Cybersquatting}Albert applied for a consumer durables loan at Horizon Bank and had to provide his personal information in the loan application form. John, the banker in charge, used Albert's information to sell him a credit card issued by Horizon Bank. In this scenario, John's action is considered _____ {Ans: legal but unethical}Spyware {Ans: Software that secretly gathers information about users while they browse the Web}