Computer Ethics Flashcards

1
Q

List the 6 factors that determine how you decide ethical issues.

A

Consequences, Society’s opinion, Likelihood of effect, Time to consequences, Relatedness, and Reach of result.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is intellectual property?

A

Intangible creative work that is embodied in physical form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is copyright?

A

The legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a trade secret?

A

Novel ideas not in public domain. Employees must sign nondisclosure agreement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a patent?

A

Grants exclusive monopoly for 20 years, idea must be disclosed publicly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Fair Use Doctrine?

A

Says that you may use copyrighted material in certain situation - for example limits, for teaching of new work or within certain limits, purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Who owns e-mail at work?

A

The employer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are employers doing to monitor their employees’ use of the internet?

A

Monitor e-mail and personal use of internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When you send an e-mail, how many computers does it go to?

A

At least 4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why do companies monitor employees’ use of the internet?

A

Legal Liability (68%), Security Concerns (60%), Productivity measurement (46%), Legal Compliance (50%), and Performance Review (45%).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a cookie?

A

A small record deposited on your hard drive by a Web site Containing information about you and your Web activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is adware?

A

Software to generate ads that installs itself on your computer when you download some other program from the Web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Trojan - Horse software?

A

Software you don’t want hidden in software you do want.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is spyware?

A

Software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer’s CPU and storage for some task you know nothing about.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Web log?

A

A line of information for every visitor to a Web site and is usually stored on Web server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is clickstream?

A

Records information about you during a Web surfing session such what Web sites you visited, how long you were there, what ads you looked at, and what you bought.

17
Q

What types of government agencies have sensitive information about individuals?

A

NCI, FBI, NSA, IRS, Census Bureau, Student Loan Services, FICA, Social Security, Welface Records.

18
Q

What is a computer virus?

A

Software the is written with malicious intent to cause annoyance or damage.

19
Q

What is a worm?

A

A type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other internet traffic.

20
Q

What are some security precautions that you cant take to protect your computer?

A

Backup, Anti-Virus Software, and firewall.

21
Q

What is biometrics?

A

The use of physical characteristics - such as your fingerprint, the blood vessels in the retina of your eye, the sound of your voice, or perhaps even your breath - to provide identification.

22
Q

What is the definition of computer crime?

A

The commission of illegal acts through the use of a computer or against a computer system.

23
Q

List 6 types of computer crime?

A

Spamming, Hacking, Jamming, Worms/Viruses, Sniffing, and Spoofing.