Filters
Question type

Study Flashcards

The ethical principle called ________ asks you to put yourself in the place of others, and think of yourself as the object of the decision.

Correct Answer

verifed

verified

What legal mechanism protects the owners of intellectual property from having their work copied by others?


A) patent protection
B) intellectual property law
C) copyright law
D) Fair Use Doctrine

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

In the United States, the claim to privacy is protected primarily by each of the following except


A) Constitutional guarantees of freedom of speech and association.
B) Privacy Act of 1974.
C) Fourth Amendment protections against unreasonable search and seizure.
D) COPPA.

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is


A) acceptable, because the grocer suffers the least harm.
B) acceptable, because the higher value is the survival of the family.
C) wrong, because the man would not want the grocer to steal from him.
D) wrong, because if everyone were to do this, the concept of personal property is defeated.

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

All of the following are current key technology trends raising ethical issues except


A) data storage improvements.
B) data analysis advancements.
C) increase in multimedia quality.
D) increase in use of mobile devices.

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Re-designing and automating business processes can be seen as a double-edged sword because


A) increases in efficiency may be accompanied by job losses.
B) increases in efficiency may be accompanied by poor data quality.
C) support for middle-management decision making may be offset by poor data quality.
D) reliance on technology results in the loss of hands-on knowledge.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Spyware is software that comes hidden in downloaded applications and can track your online movements.

A) True
B) False

Correct Answer

verifed

verified

Most Internet businesses do very little to protect the privacy of their customers.

A) True
B) False

Correct Answer

verifed

verified

The most common type of computer-related RSI is CTS.

A) True
B) False

Correct Answer

verifed

verified

________ refers to the existence of laws that permit individuals to recover damages done to them by other actors, systems, or organizations.

Correct Answer

verifed

verified

Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm.

A) True
B) False

Correct Answer

verifed

verified

List and describe the five moral dimensions that are involved in political, social, and ethical issues. Which do you think will be the most difficult for society to deal with? Support your opinion.

Correct Answer

verifed

verified

The five moral dimensions are:
1. Inform...

View Answer

________ are not held liable for the messages they transmit.


A) Regulated common carriers
B) Private individuals
C) Organizations and businesses
D) Elected officials

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

European privacy protection is ________ than in the United States.


A) less far-reaching
B) less liable to laws
C) much less stringent
D) much more strict

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

One of the capabilities of Internet communication is the ability of the individual to appear essentially anonymous by using made-up user names. Is anonymity the same thing as privacy, and should it be a right? What ethical issues are raised by increased anonymity?

Correct Answer

verifed

verified

Student answers will vary, but should in...

View Answer

A(n) ________ grants the owner an exclusive monopoly on the ideas behind an invention for 20 years.

Correct Answer

verifed

verified

The Online Privacy Alliance


A) encourages self-regulation to develop a set of privacy guidelines for its members.
B) protects user privacy during interactions with Web sites.
C) has established technical guidelines for ensuring privacy.
D) is a government agency regulating the use of customer information.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

How does the use of electronic voting machines act as a "double-edged sword?" What moral dimensions are raised by this use of information technology?

Correct Answer

verifed

verified

Electronic voting machines can be seen a...

View Answer

The ethical "no free lunch" rule states that


A) if an action cannot be taken repeatedly, then it is not right to be taken at any time.
B) one should take the action that produces the least harm or incurs the least cost.
C) one can put values in rank order and understand the consequences of various courses of action.
D) everything is owned by someone else, and that the creator wants compensation for this work.

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Advances in data storage have made routine violation of individual privacy more difficult.

A) True
B) False

Correct Answer

verifed

verified

Showing 41 - 60 of 90

Related Exams

Show Answer