Final Exam Flashcards

1
Q

In the video “Digital Ethics and the Future of Humans In a connected world” by Gerd Leonhard, which of the following statements is most correct?
A. Technology has no ethics
B. Facebook has 100s of people creating the content for its feed
C. Stephen Hawking States Artificial intelligence is not our last and greatest invention
D. People work less because they are distracted by social media and mobile devices

A

a. technology has no ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In the video regarding the paper “ What is Computer Ethics” By James Moore, which statement below is the most accurate?
A. Computer Ethics is about right and wrong behavior as defined by local laws
B. Computer ethics is about computer security
C. Computer ethics is about the social impact of computer technology and the ethical use of such technology
D. Computer ethics is about right and wrong behavior as defined by a person’s religion.

A

C. Computer ethics is about the social impact of computer technology and the ethical use of such technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the video regarding the paper “What is computer ethics” by James Moore, which statement below is the most accurate?
A. Executives that work from home gain spontaneous interaction with colleagues because of handheld devices
B. Computer technology is rigid, fixed, and not malleable, which leads to abuse of the user
C. Computer technology has made money more accessible but has not redefined what money is
D. Computer technology has transformed our definition of tradition work as “work” is no longer something that happens at a specific time or specific place

A

D. Technology has transformed our definition of traditional work as “work” is no longer something that happens at a specific time or specific place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the video regarding the paper “Computer ethics: Basic concepts and historical overview” by Terrell Ward Bynum, which statement below is the most accurate?
A. The field of computer ethics is partially a response to the development of antiaircraft cannon capable of shooting down fast warplanes
B. Computer technology has made money more accessible but has not redefined what money is
C. Unlike the industrial revolution, computer technology is not transforming society
D. The field of computer ethics began after the first recorded network intrusion at the flagger dog track in the state of Florida (USA)

A

A. The field of computer ethics is partially a response to the development of antiaircraft cannon capable of shooting down fast warplanes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the video regarding the paper “Computer Ethics: Basic Concepts and Historical Overview” by Terrell Ward Bynum, which statement below is the most accurate?
A. Computer technology may cause “de-skilling” by replacing human skills with computer technology
B. According to us law, it is not possible for a person to own a patent on a computer algorithm and prevent others from using it.
C. In the long run, computer technology will eliminate more jobs than it creates
D. Although it is possible to own the source of code, object code (machine language), and algorithm associated with a computer program, it is not possible to own the “look and feel” of a program.

A

A. Computer technology may cause “de-skilling” by replacing human skill with computer technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In the video “Ethics in the Age of Technology” by Juan Enriquez, which of the following statements is the most correct?
A. Doctor J Marion Sims is regarded as one of the first doctors to suggest slavery is unethical and should be abolished
B. Defining who teaches us ethics is difficult because sometimes our traditional sources of guidance like holy books, parents, religious leaders, teachers, lawyers, doctors, and the government provide incorrect information
C. Baptist pastor Richard Furman is regarded as one of the first religious leaders to speak our about the abolishment of slavery.
D. Lawyer Thomas Cooper, in his “1826 pamphlets” is regarded as one of the first lawyers to suggest slavery is unethical

A

B. Defining who teaches us ethics is difficult because sometimes our traditional sources of guidance like holy books, parents, religious leaders, teachers, lawyers, doctors and the government provide incorrect information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In the video regarding the paper “Interaction Between Ethics and Technology” by Shakib and Layton, which statement below is the most correct?
A. Although there is universal agreement regarding what actions are right and wrong, engaging in correct action is still difficult.
B. An action is utilitarian if it benefits the least number of people.
C. Consumers are not affecting businesses because ethical and non-ethical businesses are supported in equal amounts.
D. Consumers are having an impact on businesses by supporting those businesses that they believe are morally sound, and thereby making it more difficult for an unethical business to survive.

A

D. Consumers are having an impact on businesses by supporting those businesses that they believe are morally sound, and thereby making it more difficult for an unethical business to survive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In the video regarding the paper “Interaction Between Ethics and Technology” by Shakib and Layton, which statement below is the most accurate?
A. There is no need for Computer Ethics education as an understanding of ethics is universal.
B. There is no need for Computer Ethics education as an understanding of ethics is universal.
C. Walter Maner argues that computer technology does not create novel, ethical issues.
D. There is no universal ethics

A

D. There is no universal ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In the video regarding the paper “Multimedia, Cyberspace, and Ethics” by Jefferies, which statement below is the most accurate?

A. Computer technology enhances our privacy.
B. The new generation that is born into a culture that uses the Internet (unlike the older generation that has not always had the Internet) is aware of the privacy they are giving up by using this public domain.
C. It is not easy to regulate the internet because it is a global network without any boundaries
D. Cameras used to support surveillance in public locations are not considered to violate a person’s privacy because no one expects privacy in a public space.

A

C. It is not easy to regulate the internet because it is a global network without any boundaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the video regarding the paper “Multimedia, Cyberspace, and Ethics” by Jefferies, which statement below is the most accurate?
A. The Internet is a major contribution to cultural diversity.
B. Bill Gates stated he felt a personal responsibility to build an Internet that is ethical.
C. Bill Gates stated he felt a personal responsibility to build an Internet that is ethical.
D. Deep fake technology creates an ethical issue by allowing a victim’s appearance to be faked in a video, appearing to be doing whatever the deep fake developer wants

A

D. Deep fake technology creates an ethical issue by allowing a victim’s appearance to be faked in a video, appearing to be doing whatever the deep fake developer wants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In the video “The Social Dilemma of Driverless Cars” by Iyad Rahwan, what was the suggestion provided by a blogger?

A. Cars should be made out of soft spongy material (the “Nurf car”) to help reduce deaths in the case of accidents.
B. Cars should be equipped with a “people catcher” (like a “cow catcher” on the front of trains) that push people gently out of the way when the driver loses control of the car.
C. All drivers should wear helmets and other safety gear to help them survive what would normally be a deadly crash.
D. The driver of the car should push an eject button just before the impact to avoid being killed in a car accident

A

D. The driver of the car should push an eject button just before the impact to avoid being killed in a car accident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In the video regarding the paper “The Ethics of Driverless Cars” by Neil McBride, what is meant by an “iron cage”?

A. The “iron cage” is another name for a driverless car in that it is made of iron, but has no one in it

B. The “iron cage” is the place people should be to keep them safe from driverless cars.

C. The “iron cage” is a modification to the car that makes it safe.

D. The iron cage is technology that has constrained us

A

D. The iron cage is technology that has constrained us

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In the video regarding the paper “The Ethics of Driverless Cars” by Neil McBride, what is suggested in the conclusion?

A. Driverless cars are essential for allowing the human spirit to be free.

B. We need to perfect the technology regarding driverless cars so less people are injured.

C. Driverless cars allow the passenger to have more free time to pursue other activities.

D. We need a car that provides more information to the user so the user can be a better driver

A

D. We need a car that provides more information to the user so the user can be a better driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In the video regarding the paper “Automated Detect and Avoid” by Erik Theunissen and others, which of the following statements is the most correct?

A. Algorithm developers and programmers are forgiven for accidents because everyone knows computer code is imperfect.

B. When a human acts without deliberation, they are ethically responsible to the same degree as a programmer making premeditated decisions for a robot car.

C. We should code human behavior because human situations are simple and easy to program.

D. An ethical issue arises because writing code involves a degree of premeditation regarding how a robot car will act

A

D. An ethical issue arises because writing code involves a degree of premeditation regarding how a robot car will act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In the video regarding the paper “Automated Detect and Avoid” by Erik Theunissen and others, which of the following statements is the most correct?

A. Current data does not support the claim that self-driving cars have resulted in a reduction in the number of accidents

B. When it comes to programming automated detect and avoid algorithms, human values and judgments do not become part of the code.

C. Current data supports the claim that self-driving cars have resulted in a reduction in the number of accidents.

D. When it comes to programming automated detect and avoid algorithms, it is best to replace all human judgment with algorithms as algorithms can be perfected to respond correctly in all situations.

A

A. Current data does not support the claim that self diving cars have resulted in a reduction in the number of accidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

According to Juan Enriquez in his book “Right Wrong: How Technology Transforms our Ethics”, ethics does not change over time.

true
false

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

According to Juan Enriquez in his book “Right Wrong: How Technology Transforms our Ethics” (see the PowerPoint slides provided with the course material), ethics changes our technology.

TRUE
FALSE

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

According to Juan Enriquez in his book “Right Wrong: How Technology Transforms our Ethics” (see the PowerPoint slides provided with the course material), it pays to be humble about the past, as we too will be judged by the future.

TRUE
FALSE

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

According to the video regarding “Computer Technology is Like the Gift of Fire,” computer technology is like fire in that if it is not managed appropriately, it can get out of control and hurt many people.

TRUE OR FALSE

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In the video regarding “Woman Injured by a Garage Door,” which direction is the garage door closing?
A. The garage door closes from left and right at the same time.
b. The garage door closes from right to left.
C. The garage door closes from the top down.
D. The garage door closes from left to right

A

D. The garage door closes from left to right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In the video regarding the paper “Ethics and Safety of Computer Systems,” which of the following statements is the most correct?
A. The main issue is regarding the proper use of critical systems by the non-computer scientist.
B. Proving computer systems are correct is easy and therefore we should always prove them correct before allowing the public to use them.
C. Because the ‘Computer Medical Assistant’ is error-free, medical personnel are unethical if they do not follow the suggestions provided by this service.
D. The main issue is regarding the responsibility for computer failures in critical systems

A

D. the main issue is regarding the responsibility for computer failures in critical systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In the video regarding the paper “Ethics and Safety of Computer Systems,” which of the following statements is the most correct?

A. People use technology that is “unjustifiably risky” because they have sufficient knowledge of how risky technology is.

B. A point was made that it is easy for people to not use technology.

C. A point has been made that maybe computer scientists should take an oath to do no harm

D. Computer professionals do not ignore important human issues when designing and implementing computer technology.

A

C. A point has been made that maybe computer scientists should take an oath to do no harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In the video regarding the paper “When Formal Systems Kill,” what is a “formal system”?

A. A formal system uses a grammar for encoding logic and states such that a given conclusion follows from a given premise
B. A formal system is computer code that cannot be proven correct
C. A formal system is one that is proven correct through testing.
D.A formal system requires less time, less money, and less complexity to verify it is correct.

A

A formal system uses a grammar for encoding logic and states such that a given conclusion follows from a given premise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In the video regarding the paper “When Formal Systems Kill,” which of the following statements is the most correct?
a. Modeling complex systems is challenging and prevents us from using a formal method to prove they are correct
B. Modeling complex systems is easy and therefore every system can be proven correct or incorrect.
C. Computational fluid dynamics (CFD) is not a good analogy for a formal method because CFD involves testing in a wind tunnel.
d. Computational fluid dynamics (CFD) is not a good analogy for a formal method because CFD involves mechanical engineering.

A

a. Modeling complex systems is challenging and prevents us from using a formal method to prove they are correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

In the video “Voice Recognition Software in ‘Hello Barbie’ Doll Concerns Parents Privacy Groups,” what ‘old information’ did the doll suggest about the person playing with the doll?
A. The doll suggested the person might be a “teacher.”
B. The doll suggested the person might be “single mother.”
C. The doll suggested the person might be a “young girl.”
D. The doll suggested the person might be a dancing politician

A

The doll suggested the person might be a dancing politician

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

In the video regarding the paper “Can and Should Hello Barbie Keep a Secret” by Meg Jones and Kevin Meurer, who maintains the recorded conversations of the child?

A. A 3rd party vendor
b. The person that purchased the doll
c. mattel
d. the parents of the child

A

a 3rd party vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

In the video regarding the paper “Can and Should Hello Barbie Keep a Secret” by Meg Jones and Kevin Meurer”, what is suggested in the conclusion?

A. Hello Barbie has been demonstrated to help children get better grades in school.
B. The tendency to share a child’s personal data among big data collectors has the potential to negatively impact a child’s ability to trust others
C. When programming algorithms, human values and judgments should not become part of the code.
D. Purchasers of “Hello Barbie” fully understand the risks when they buy this product and are therefore responsible for the abuse of children.

A

B. The tendency to share a child’s personal data among big data collectors has the potential to negatively impact a child’s ability to trust others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

In the video regarding the paper “Privacy and Ethical Concerns in Internet Security” by Rebecca and James Rutherfoord, what is meant by an ‘extrinsic loss of freedom’?
a. An extrinsic loss of freedom occurs when a person voluntarily gives someone permission to collect data about themself.

b. An extrinsic loss of freedom is when a person chooses to have solitude.

c. an extrinsic loss of freedom is when a persons behavior is controlled by another person

d. An extrinsic loss of freedom is when a person changes their behavior because they think they are being watched.

A

c. an extrinsic loss of freedom is when a persons behavior is controlled by another person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

In the video regarding the paper “Privacy and Ethical Concerns in Internet Security” by Rebecca and James Rutherfoord, which of the following statements is the most correct?

A. When it comes to privacy issues regarding ones data, there is no concern regarding the accuracy of the data that is made public.
B. The best way to ensure privacy in a world of changing technology is to write laws that all countries follow.
C. When it comes to privacy issues regarding ones data, there is no concern regarding stolen identity.

D. There are many ways to define privacy including solitude, maintaining control over personal data, and the right to not be monitored

A

There are many ways to define privacy including solitude, maintaining control over personal data, and the right to not be monitored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Regarding the paper (and maybe found in the associated video) “Ethics and Safety of Computer Systems” by Michael C. McFarland, which of the following statements is the most correct?

A. Normative ethics asks what kind of person does the right thing.
B. Normative ethics asks what social structures are needed to support values such as justice and respect for human life and dignity.
C. Normative ethics seeks to develop and justify rules for right conduct

D. Normative ethics recognizes that values and choices are expressed in individual actions, and are emobodied effectively in social structure.

A

C. Normative ethics seeks to develop and justify rules for right conduct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Regarding the paper (and maybe found in the associated video) “Ethics and Safety of Computer Systems” by Michael C. McFarland, which of the following statements is the most correct?

A. Ethics of virtue recognizes that values and choices are expressed in individual actions, and are emobodied effectively in social structure.

B. Ethics of virtue asks what kind of person does the right things

C. Ethics of virtue seeks to develop and justify rules for right conduct.

D. Ethics of virtue asks what social structures are needed to support values such as justice and respect for human life and dignity.

A

B. Ethics of virtue asks what kind of person does the right things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Regarding the paper (and maybe found in the associated video) “Ethics and Safety of Computer Systems” by Michael C. McFarland, which of the following statements is the most correct?

A. Social ethics asks what kind of person does the right thing.

B. Social ethics asks what social structures are needed to support values such as justice and respect for human life and dignity

C. Social ethics seeks to foster and promote knowledge.
D. Social ethics seeks to develop and justify rules for right conduct.

A

B. Social ethics asks what social structures are needed to support values such as justice and respect for human life and dignity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Regarding the paper “When Formal Systems Kill” by Darren Abramson and others, what are the challenges to formal methods? Select all that apply.

How to mathematically model formal systems and their environments

How to mechanically check the correctness of mathematical proofs

computer code cannot be proven correct

how to automate mathematical proofs

A

How to mathematically model formal systems and their environments

How to mechanically check the correctness of mathematical proofs

how to automate mathematical proofs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Regarding the paper (and maybe found in the associated video) “When Formal Systems Kill” by Darren Abramson and others, one of the points being made is both proof and testing are needed to support good software code.

TRUE OR FALSE

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

In the paper (and maybe found in the associated video) “Can and Should Hello Barbie Keep a Secret” by Meg Jones and Kevin Meurer”, parents are given the perception of complete control over the stored conversations, yet their child’s data has the potential to be shared with numerous third parties

true or false

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

In the paper (and maybe found in the associated video) “Can and Should Hello Barbie Keep a Secret” by Meg Jones and Kevin Meurer”, in order for Hello Barbie to retain the trust of parents, ToyTalk could make a clearer commitment to withholding individual data from third parties or offer an opt-in system for parental monitoring

TRUE OR FALSE

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

In the paper (and maybe found in the associated video) “Privacy and Ethical Concerns in Internet Security” by Rebecca and James Rutherfoord, virtual connections make it feel like people are near us.

TRUE OR FALSE

A

true

38
Q

In the paper (and maybe found in the associated video) “Privacy and Ethical Concerns in Internet Security” by Rebecca and James Rutherfoord, an intrinsic loss of freedom comes about when people behave in a different manner when they are being monitored, watched or spied upon.”

TRUE OR FALSE

A

true

39
Q

In the paper (and maybe found in the associated video) “Privacy and Ethical Concerns in Internet Security” by Rebecca and James Rutherfoord, what does Durlak include in his list of basic rights regarding privacy? Select all that apply.

INTIMACY
SOLITUDE
IRON CAGE
RESERVE

A

INTIMACY
SOLITUDE
RESERVE

40
Q

In the video “What FACEBOOK and GOOGLE are Hiding from the World - the Filter Bubble,” according to the speaker, what did Mark Zuckerberg say might be “more relevant to your interests right now than people dying in Africa”?

A. Information about one’s favorite musical artist.

B. A squirrel dying in your front yard

c. The happiness and status of one’s own friends.

D. The happiness and status of one’s own family.

A

b. a squirrel dying in your front yard

41
Q

n the video “What FACEBOOK and GOOGLE are Hiding from the World - the Filter Bubble,” which of the following statements is the most correct?

a. google is filtering search content based on a users profile and returning to a user results that are tailored to them

b. Google buys Facebook data to customize the research results provided to Google users.

C. Google is filtering news content based on what Google want’s the user to see and therefore hiding the truth.

D. Facebook buys Google search results to customize Facebook news items for the Facebook user

A

a. google is filtering search content based on a users profile and returning to a user results that are tailored to them

42
Q

In the video regarding “Cyberethics - Morality and Law in Cyberspace - Chapter 4 - Intellectual Property in Cyberspace,” which of the following statements is the most correct?

a. A dance and a video of a dance can both be copyrighted.

B. A video of a dance cannot be copyrighted.

C. A copyright gives an author exclusive rights to their works.

D. A dance can be copyrighted

A

c. a copy right gives an author exclusive rights to their works

43
Q

in the video regarding “Cyberethics - Morality and Law in Cyberspace - Chapter 4 - Intellectual Property in Cyberspace,” what was the issue regarding Expedia and Priceline?

A. Expedia sued Priceline for selling discount travel services to the public.

B. Expedia sued Priceline for infringing on its pricing algorithm for air travel.

C. Priceline sued Expedia for copying the method of allowing the customer to name the price for a hotel room

D.
Priceline sued Expedia for infringing on its logo which includes an aircraft in a blue circle.

A

C. Priceline sued Expedia for copying the method of allowing the customer to name the price for a hotel room

44
Q

In the video regarding “Intellectual Property and the Process of Invention: Why Software is Different” by Robert Plotkin, why is software special?

a. Software is special because it can be protected by both patent and a copyright

b. Software is special because it can be patented, but not copyrighted.

c. Software is special because all software is in the public domain and cannot by copyrighted.

d. Software is special because it can be copyrighted, but not patented.

A

a. software is special because it can be protected by both patent and a copyright

45
Q

Intellectual property consists of original musical compositions, poems, novels, inventions, and product formulas.

TRUE OR FALSE

A

true

46
Q

The U.S. Constitution confers upon congress the power to promote the progress of science and the useful arts, by securing for limited time to authors and inventors the exclusive rights to their respective writings and discoveries.

TRUE OR FALSE

A

true

47
Q

A dance such as the tango can be copyrighted
true or false

A

false

48
Q

The first sale provision allows the first purchaser of a copyrighted work to sell or lend that copy to someone else without the copyright holder’s permission.

true or false

A

true

49
Q

A trademark is a word, phrase, or symbol that identifies a product or service.

true or false

A

true

50
Q

—- occurs when a trademark is used by someone else in connection with the sale of its good or services

A

infringement

51
Q

— occurs when the trademark is associated with dissimilar products - for example, using the disney trademark name to sell suits for men

A

blurring

52
Q

Through financial incentives intellectual property rights induce creators to develop works they would not otherwise produce without this protection, and this contributes to the general good of society.

true or false

A

true

53
Q

In the video regarding “How Data Brokers Sold my Identity,” what happened when Massachusetts Governor William Weld approved the release of 135,000 medical records of state employees with the names and social security numbers redacted?

A. The union representing the state employees sued the Governor for violating privacy laws.

B. The Governor demonstrated that without a name or Social Security Number, medical records cannot be associated with a person.

C. Professor Sweeney sent the governer his medical records as a demonstration that the governor could be identified by cross-referencing his medical records with public voter registration data.

D. A health-care provider recognized the Governor’s medical records and sent them to the Governor.

A

C. Professor Sweeney sent the governer his medical records as a demonstration that the governor could be identified by cross-referencing his medical records with public voter registration data.

54
Q

In the video regarding the paper “Choosing Passwords: Security and Human Factors” by Edward Gehringer, what does the author suggest?

A. The author suggests passwords should be in different formats, for different devices.

B. The author suggests users should change their passwords frequently.

C. The author suggests users should have one password and not many

D. The author suggests users should use a “password wallet” to store all of their passwords.

A

C. The author suggests users should have one password and not many

55
Q

In the video regarding the paper “Choosing Passwords: Security and Human Factors” by Edward Gehringer, what does the author suggest?

A. The author suggests computer systems should restrict password formats to make programming more convenient.

B. The author suggests more complex rules are needed to control the generation of secure passwords.

C. The author suggests passwords should be of an unlimited length

D. The author suggests Microsoft Passport is the best solution for maintaining secure passwords.

A

C. The author suggests passwords should be of an unlimited length

56
Q

In the video regarding “The Ethics of Collecting Data” with Marie Wallace, what does the speaker suggest?

A. The speaker suggests we can put an end to big data collection and we should.

B. The speaker suggests social media can raise your concern about your own body issues and then exposed you to diet products to generate sales

C.
The speaker suggests users should be paid for giving up personal data.

D. The speaker suggests users should not give up personal data to support product marketing.

A

B. The speaker suggests social media can raise your concern about your own body issues and then exposed you to diet products to generate sales

57
Q

In the video regarding “The Ethics of Collecting Data” with Marie Wallace, what does the speaker suggest?

A. The speaker suggests transparency can exist in personal data collection by businesses and customers voluntarily give up their data

B.
The speaker suggests we should enact laws immediately to stop personal data collection because it will be considerably worse for the next generations.

C. The speaker suggests there is no way to embrace personal privacy while also supporting personal data collection by businesses.

D. The speaker suggests ‘big data’ collection cannot be done in a transparent way such that customers voluntarily give up their data.

A

A. The speaker suggests transparency can exist in personal data collection by businesses and customers voluntarily give up their data

58
Q

In an environment where a user has numerous accounts with different passwords, a lockout is a powerful incentive to write down a list of those passwords rather than guess at them when trying to log in.

TRUE OR FALSE

A

true

59
Q

According to “Choosing Passwords: Security and Human Factors” by Edward Gehringer, password wallets are a good option for password security.

TRUE OR FALSE

A

false

60
Q

According to “Choosing Passwords: Security and Human Factors” by Edward Gehringer, which of the following does he suggest are the role of the computer scientist? Select all that apply.

Make password management easier for the user

Modify the lifetime limits

Reduce lockouts

Allow a user to have much longer passwords, of a universal format

A

Make password management easier for the user

Modify the lifetime limits

Reduce lockouts

Allow a user to have much longer passwords, of a universal format

61
Q

Maintaining password security involves striking a delicate balance between having enough rules to maintain good security and not having so many that users will take evasive action that compromises security.
TRUE OR FALSE

A

true

62
Q

In the video regarding “Hacker Tactics Tools - Become a Hacker - Hacking Made Easy,” what does a “Wifi Pineapple’ allow the user to do?
a. Geolocate each user connected to the same network.

b.Encrypt a user’s message to protect it from hacking.
c. Conduct penetration testing on a network.

d. hack everyone on the same network

A

d. hack everyone on the same network

63
Q

In the video regarding the paper “Bias in Computer Systems” by Friedman and Nissenbaum, what is the bias found in some airline ticketing systems?

A.Some airline ticketing systems always recommend a higher priced ticket for every customer.

B. Some airline ticketing systems advertise inexpensive �ights, but then change more than advertised.
C. Some airline ticketing systems charge customers more if their IP address geolocates them to a
wealthy part of the world.

D. Some airline ticketing systems do not suggest using multiple air carriers for a multi flights trip even if doing so would be less expensive for the customer

A

D. Some airline ticketing systems do not suggest using multiple air carriers for a multi flights trip even if doing so would be less expensive for the customer

64
Q

Which of the following research topics have the potential to expose real people to harm? Select all that apply.
spam
botnet
viruses
credit card fraud

A

spam
botnet
viruses
credit card fraud

65
Q

One abuse that can take place during research is ‘secret data collection’ in which the participant is unaware of the data that is being collected about them of their computer device(s).

true or false

A

true

66
Q

Computer-based binary arithmetic is precise and does not present any ethical challenges.

A

false

67
Q

Even though arbitration approaches such as fixed, priority, and round-robin are “fair,” they can still have
their own bias.

true or false

A

true

68
Q

The term bias refers to a computer system that systematically and unfairly discriminates against certain
individuals or groups of individuals in favor of others.

true or false

A

true

69
Q

once bias is in a computer system, it is easy to remove

true or false

A

false

70
Q

the size of a screen display might be a source of bias as it influences what can be seen of the first page

true or false

A

true

71
Q

Regarding the video about the paper on “Research Ethics in Human-Computer Interaction,” which of the following statements is the most accurate?

A. Researchers do not need to concerned about cultural differences among the participants.

B. Researchers do not need to be open about the data that is collected during the research.

C. It is not necessary to accommodate a research subject’s basic need to be free to move during the
research.

D.researchers need to be careful regarding how recording technology might make the subject feel uncomfortable

A

D.researchers need to be careful regarding how recording technology might make the subject feel uncomfortable

72
Q

Regarding the video about the paper on “Research Ethics in Human-Computer Interaction,” which of the
following statements is the most accurate?

A. There is a concern that robots might injure a person if robots engage in activities such as caring for the elderly

B. Conducting secret research on a human subject is ethical as long as the human subject is informed
of the research after it is completed.

c. Research subjects should not be allowed to withdraw from research once they have volunteered to
be a research subject.

d. It is not a violation of a research subject’s privacy if they are not aware of their data being collected
during the research process

A

A. There is a concern that robots might injure a person if robots engage in activities such as caring for the elderly

73
Q

Regarding the video about “Ethics in Security Research. Which Lines Should Not be Crossed?,” which of
the following statements is the most correct?

A. The biggest threat from spam is that it is a nuisance.

B. About 50% of the spam sent worldwide advertise medicine/pharmaceautical products which are to a large percent counterfeited and a major health threat

C. It is actually cheaper to engage in ethical research rather than unethical research, so switching to ethical research should be easy.

d. Developing anti-malware is unethical because it is not ethical to be unethical to the unethical.

A

B. About 50% of the spam sent worldwide advertise medicine/pharmaceautical products which are to a large percent counterfeited and a major health threat

74
Q

Regarding the video about “Ethics in Security Research. Which Lines Should Not be Crossed?,” which of
the following statements is the most correct?

A. Because spam is never harmful, observing spam in the wild and not warning the recipient is one of
the few acceptable security research activities.

B. Developing anti-malware that eliminates some existing malware but also harms a small group of
people is an acceptable trade-off.

C. Developing maLware to study user infection numbers and malware dissemination strategies is a bad idea

D. Developing malware and allowing it to operate in the wild is ethical because it is the only way we can learn about malware.

A

C. Developing maLware to study user infection numbers and malware dissemination strategies is a bad idea

75
Q

Regarding the video “The Ethical Problem with Facebook’s Emotional Experiment,” which of the following statements is the most correct?

a. Facebook demonstrated they could make a user sad by displaying a fake news story regarding the
death of someone the user had identified as a “friend” in their Facebook profile.

b. Facebook demonstrated they could manipulate a person into buying weight loss products by
altering their Facebook pro�le picture by making the user appear to be fatter.

c. Facebook demonstrated they could manipulate a person into buying candy buy making the person feel lonely by blocking all content from their friends for a 16 day period.

D. Facebook demonstrated they could manipulate peoples emotions by showing mostly negative or mostly positive posts in peoples facebook data feed

A

D. Facebook demonstrated they could manipulate peoples emotions by showing mostly negative or mostly positive posts in peoples facebook data feed

76
Q

In the video regarding the paper “Embedding Ethics in Computer Architecture” by Alan Clements, what is the result of an error in binary arithmetic?
A. An airplane was routed to the wrong location and ran out of fuel.

B. Several people were killed in a missle attack

c. a nuclear reactor had a meltdown

d. medical equipment gave the wrong amount of radiation

A

B. Several people were killed in a missle attack

77
Q

In the video regarding the paper “Embedding Ethics in Computer Architecture” by Alan Clements, which of the following statements is the most correct?

a. overclocking a cpu can be unethical in certain situations

b. Algorithms that support the sharing of a computer resource (e.g. ‘priority,’ ‘round-robin,’ etc.) are never fair, and therefore are always unethical.

c. In order to be ethical and fair, a computer should be overclocked to increase throughput to
accommodate everyone.

d. Operating a computer outside of it recommended limits is encouraged to increase throughput.

A

a. overclocking a cpu can be unethical in certain situations

78
Q

It is not unethical to use default passwords to enter a computer network that one is not authorized to enter.

true or false

A

false

79
Q

What are the main elements of a ‘Just War Theory?’
War as a last resort
Do more good than harm.
Avoid harming non-combatants
To the victor goes the spoils (goods taken by force)

A

War as a last resort
Do more good than harm.
Avoid harming non-combatants

80
Q

There should be more public outcry regarding the unethical mapping of the Internet with the Carna botnet

true or false

A

true

81
Q

Griefing is bulling; it is abusive; it evokes real emotion; it is genuinely hurtful.

true or false

A

true

82
Q

An investigation done by Coyne (as cited in Ethic in Massively Multiplayer Online Role-Playing Games) finds that online griefing has a similar impact as traditional bullying.

A

true

83
Q

According to the paper regarding “Ethic in Massively Multiplayer Online Role-Playing Games,” what are the primary means by which playing games help guide moral development? Select all that apply.
Defining good and bad behavior.
Learning a system of rules.
Practice following rules.
Developing poor social skills

A

Defining good and bad behavior.
Learning a system of rules.
Practice following rules.

84
Q

Regarding the video about the paper “An Analysis of a Just Cyber Warfare,” which of the following
statements in the most accurate?

a. floridi states information has a right to exist and therefore cyber warfare that destroys information is unethical

b. Cyber Warfare makes the Just War Theory invalid.

c. A principle of Just Cyber Warfare is that a Cyber War should be waged to promote the well-being
of the infosphere.

d. When addressing Cyber Warfare, the Just War Theory cannot be applied and should be rejected
altogether.

A

a. floridi states information has a right to exist and therefore cyber warfare that destroys information is unethical

85
Q

Regarding the video about the paper “An Analysis of a Just Cyber Warfare,” which of the following
statements in the most accurate?

A. The just war theory is inadequate for evaluating the ethicalness of cyber warfare

B. The Just War Theory states cyber warfare is unethical.

C. Floridi states ‘information does not have a right to exist,’ and therefore cyber warfare is not
unethical.

D. Floridi states ‘information does not have a right to exist,’ and this is the foundation of a Just Cyber
Warfare Theory

A

A. The just war theory is inadequate for evaluating the ethicalness of cyber warfare

86
Q

Regarding the video about “Cyber War,” which of the following statements is the most accurate?

A. Logic bombs have been placed in the power grid of the us

b. Cyber-attacks do not cause destruction in physical space, so cyber war is considered ethical.

c. The Federal Bureau of Investigation in the United States engages in Cyber War against hackers in
other countries.

d. The speaker stated experienced hackers are recruited at the Def Con Hacking Conference in Las
Vegas, NV almost every year.

A

A. Logic bombs have been placed in the power grid of the us

87
Q

Regarding the video about the paper “An Ethical Examination of the Internet Census 2012 Dataset - A Menlo Report Case Study,” which of the following statements is the most accurate?

A. the author suggests there should be more public outcry regarding the unethical behavior exhibited in the creation of the internet census 2012 dataset

B. Because there was such an outcry about the unethical behavior in the creation of the Internet
Census 2012 Dataset, other researchers are discouraged from similar activity.

c. The German Penal Code considers a person’s “good intent” when deciding if a law has been broken.

d. There is nothing unethical about using default passwords to enter a network that is intended to be
locked.

A

A. the author suggests there should be more public outcry regarding the unethical behavior exhibited in the creation of the internet census 2012 dataset

88
Q

Regarding the video about the paper “An Ethical Examination of the Internet Census 2012 Dataset - A Menlo Report Case Study,” which of the following statements is the most accurate?

A. a central point is that commercial products that are accessible from the internet should not be sold wiht a default password

B.Participants that answered questions found in the Internet Census are unethical for not providing honest answers.

c. Students at Menlo College were involved in a very large cheating scandal.
d. Students and Menlo University developed password-cracking software that allowed them to enter devices connected to the Internet

A

A. a central point is that commercial products that are accessible from the internet should not be sold with a default password

89
Q

Regarding the video about the paper “Ethic in Massively Multiplayer Online Role-Playing Games,” which
of the following statements is the most accurate?

A. The abuse in virtual reality games is real

B. The abuse in virtual reality games is not real.

C. There is no chance for any real monetary damage.

D. Games do not help individuals learn good and bad behavior.

A

A. The abuse in virtual reality games is real

90
Q

Regarding the video about the paper “Ethic in Massively Multiplayer Online Role-Playing Games,” which
of the following statements is the most accurate?

A. Behaving unethically in a virtual world might lead to unethical behavior in the real world

B. It is not possible to steal items from another person.

C. Ninja looting is the process of killing a character a second time as soon as that character
regenerates.

D. Griefing and bullying are not abusive because it is occurring in virtual reality

A

A. Behaving unethically in a virtual world might lead to unethical behavior in the real world

91
Q

Regarding the video about “Elves Ethics - The Digital World,” which of the following statements is the
most accurate?

a. The true identity of the gay girl in damascus is actually a male american student studying abroad

b. There is a strict code of ethics that all participants follow.

c. The Orcs slaughter the Elves with stolen weapons.

d. The Elves defeat the Orcs with magic.

A

a. The true identity of the gay girl in damascus is actually a male american student studying abroad