Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Ethics

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
show John Locke hols that when people remove something from Nature through their own labor, they have mixed their labor with it, and therefore they have a property right in that object.  
🗑
What paradoxes arise when we attempt to extend a natural right to property into the realm of intellectual property?   show
🗑
show Fair use refers to those circumstances under which it is legal to reproduce a copyrighted work without permission  
🗑
When describing a software license, what does the phrase "open source" mean?   show
🗑
show OS:software released under that license can be used as part of programs distributed under other licenses CL:Once a program is distributed under a certain liscense, the other modifications to the program have to be listed under that exact same liscense.  
🗑
What right is guaranteed by the Third Amendment to the U.S. Constitution?   show
🗑
What right is guaranteed by the Fourth Amendment to the U.S. Constitution?   show
🗑
what are the three most controversial provisions of the USA PATRIOT Act?   show
🗑
What is the purpose of the Freedom of Information Act?   show
🗑
show Privacy groups objected to installation of advanced imaging technology scanners at airport security checkpoints because the scanners revealed features in great detail. TSA respondedwith new software indicates the location of threatening items gen outline  
🗑
show Samuel Warren and Louis Brandeis  
🗑
show Judith Jarvis Thomson  
🗑
A _______contains information about an incident or action reported to a government agency for the purpose of informing the public   show
🗑
show determine the location  
🗑
Manufacturers are replacing bar codes with ______tags because they give more information about the product and are easier to scan.   show
🗑
show cookie  
🗑
show data mining  
🗑
When information collected for one purpose is put to another purpose, that is called a ______ of the data.   show
🗑
thanks to the _______/ credit reports, you can get a credit card from a bank or store with which you have never done business.   show
🗑
The Third Amendment to the U.S. Constitution has to do with a) freedom of speech and religion. b) search warrants. c) the right to bear arms. d) quartering of soldiers in private homes. e) self-incrimination   show
🗑
Who wrote an influential paper in the 1890s urging that privacy rights be enacted into law?   show
🗑
show d) Judith Jarvis Thomson  
🗑
show prudential right.  
🗑
A public record contains information about an incident or action reported to a government agency for the purpose of   show
🗑
show e) All of the above  
🗑
show a wireless transmitter.  
🗑
show a) a vehicle owner to initiate a conversation with an OnStar b) the vehicle to automatically send a message to an OnStar representative after an accident. c) an OnStar representative to disable the gas pedal of the vehicle without the driver's permission.  
🗑
Flash cookies are controversial, in part, because   show
🗑
The process of searching through many records in one or more databases looking for patterns or relationships is called   show
🗑
When information is put to another purpose, that is called a   show
🗑
A policy that requires the consumer to explicitly give permission before an organization can share information with another organization is called   show
🗑
A policy that does not requires the consumer to explicitly give permission before an organization can share information with another organization is called   show
🗑
Which philosopher argued in The Second Treatise of Government that people have a natural right to property?   show
🗑
Intellectual property is a unique product of the human intellect that   show
🗑
show all of the above  
🗑
The proper noun "Kleenex" is protected   show
🗑
Which of the following rights is not a right of a copyright holder?   show
🗑
show all of the above  
🗑
show fair use  
🗑
show all of the above  
🗑
show time shifting  
🗑
show spaceshifting  
🗑
The decision by the U.S. Court of Appeals, Ninth Circuit in Kelly v. Arriba Soft Corporation established that the display of thumbnail images by a search engine   show
🗑
Google Books is b) an effort to gain copyrights on millions of books in the public domain. c) a book reader designed to compete with the Kindle. d) an online store competing with Amazon.com.   show
🗑
show shipping CDs that secretly installed a rootkit on Windows computers.  
🗑
After the RIAA sued Napster,   show
🗑
show d) All of the above are illegal  
🗑
The Digital Millennium Copyright Act is controversial, in part, because   show
🗑
Apple's digital rights management system FairPlay prevented   show
🗑
Compared with other peer-to-peer networks, BitTorrent takes advantage of the fact that broadband Internet connections   show
🗑
The court's ruling in Apple Computer v. Franklin Computer Corp. established that   show
🗑
The Linux operating system is an example of   show
🗑
show JOhn Locke  
🗑
The U.S. Congress addresses the tension between society's desire for inventions to be in the public domain and the inventor's expectation of profit by giving inventors exclusive rights to their discoveries _______   show
🗑
Merchandise 7X, the formula for Coca-Cola syrup, is a famous example of a type of intellectual property known as a ______   show
🗑
show trademark  
🗑
show Kodak  
🗑
show kinko's  
🗑
show increased significantly.  
🗑
Under some circumstances it is legal to reproduce a copyrighted work without permission. These circumstances are called_____   show
🗑
show legal  
🗑
In RIAA v. Diamond Multimedia Systems, Inc., the U.S. Court of Appeals ruled that space shifting is _____   show
🗑
show thumbnail images of photo  
🗑
In December 2004 _______ announced a plan to scan millions of books held by several of the world's largest libraries   show
🗑
show secretly installed a rootkit  
🗑
FairPlay was the name of Apple's ______system   show
🗑
A _______network allows computers running the same networking program to connect with each other and access files stored on each other's hard drives.   show
🗑
show allowing different pieces of a file to be downloaded simultaneously from different computers.  
🗑
in September 2003 the RIAA sued 261 individuals for _________   show
🗑
show object programs  
🗑
show clean room  
🗑
Thanks to the work of Stanford law professor Lawrence Lessig and his collaborators, you can use a ________license to retain the copyright while allowing some uses of your intellectual property under certain circumstances   show
🗑
show information filtering  
🗑
show private employers  
🗑
The Children's Online Privacy Protection Act   show
🗑
show all of the above  
🗑
The Census Bureau has not always kept confidential the information it has collected. According to the textbook, this became apparent   show
🗑
The FBI's National Crime Information Center database   show
🗑
show will give state and local police officers access to information provided by five federal law enforcement agencies.  
🗑
show the FBI continued wiretapping people secretly.  
🗑
show Intercept all international telegrams entering or leaving the United States  
🗑
show Federal Communications Act  
🗑
After the terrorist attacks of September 11, 2001, which U.S. governmental agency collected telephone call records of tens of millions of Americans without a court order?   show
🗑
show There must be a way for a person to collect damages for financial losses caused by incorrect information about that person stored in a data record-keeping system.  
🗑
show is designed to promote the accuracy of credit reports.  
🗑
show gives consumers the right to request a free copy of their credit report every year.  
🗑
show all of the above  
🗑
show all of the above  
🗑
The Video Privacy Protection Act   show
🗑
The Health Insurance Portability and Accountability Act   show
🗑
The Children's Online Privacy Protection Act requires online services to obtain parental consent before collecting any information from children ___ years old and younger.   show
🗑
The FBI maintains a collection of databases supporting the activities of federal, state, and local law-enforcement agencies in the United States, the U.S. Virgin Islands, These databases are given the name National Crime Information Center (____   show
🗑
show government  
🗑
show inadmissible in court  
🗑
show Operation Shamrock  
🗑
show USA PATRIOT ACT  
🗑
show bankruptcies and criminal convictions  
🗑
The Fair and Accurate Credit Transactions Act requires the three major credit bureaus to provide customers a free copy of their credit report every ___ months   show
🗑
show 18  
🗑
The ______ prohibits video service providers from disclosing records without the written consent of the customer.   show
🗑
The Health Insurance Portability and Accountability Act limits how doctors, hospitals, and insurance companies can use _____ collected from patients.   show
🗑
show The Freedom of Information Act  
🗑
show Do Not Call Registry  
🗑
show are played at the same volume as the programs they are interrupting.  
🗑
A mature profession insists that its members complete an initial professional education. The process by which the profession assures that this formal course work meets its standards is called ______   show
🗑
show certification  
🗑
show legal  
🗑
The Software Engineering Code of Ethics and Professional Practice was developed by the two largest organizations supporting the computing field: the____ Machinery (ACM).   show
🗑
What is the stance of the ACM regarding the licensing of software engineers?   show
🗑
In The Nicomachean Ethics, Aristotle writes that happiness results from _____   show
🗑
show you have acquired that virtue.  
🗑
show whistleblower.  
🗑
Responsibility assigned because of a person's assigned duties is called ___responsibility.   show
🗑
show any of its members  
🗑
show software engineer  
🗑
Which of the following is not one of the characteristics of a mature profession? a) code of ethics b) licensing c) mandatory drug testing d) mandatory professional development e) professional education   show
🗑
show b) licensing.  
🗑
show d) does not work directly with individual clients.  
🗑
The Software Engineering Code of Ethics and Professional Practice was developed by   show
🗑
The Principles and Clauses in the Software Engineering Code of Ethics and Professional Practice   show
🗑
show d) repetition of the appropriate acts.  
🗑
show a) have developed the virtue.  
🗑
show b) the action is consistent with their character.  
🗑
show a) make an unauthorized discloser about a harmful situation or fraud.  
🗑
show c) the weather in Florida was unusually cold.  
🗑
show has more moral accountability than any of its members.  
🗑
A program with a benign capability that conceals another, sinister purpose is called a   show
🗑
A ________ is a piece of self-replicating code embedded within another program called the host.   show
🗑
show bot.  
🗑
Anonymous is   show
🗑
show worm  
🗑
show When a person or organization pervents another person or organization from expressing their opinion.  
🗑
show Gov.monopolization=gov. owns all the media outlets.Pre-publication review=gov. must approve info before it is disseminated. Licencing and registration=news org must get liscense from the gov. before operating. It is used for media with limited bandwidth,  
🗑
show Broadcasting is constantly on and you can't choose what gets broadcasted so the TV could be on and children could be watching. So it has to be more censored. Newspapers readers have a choice to read or not.  
🗑
What is self-censorship? (provide ex)   show
🗑
show Congress (meaning the government) shall make no law (policy)  
🗑
State Mill's Principle of Harm and explain what question the principle is designed to help answer?   show
🗑
show Protects Political speech; the balance is the freedom of speech and security.  
🗑
show It required blockers on all computers in public places (libraries) that want government funding. (you can get the filter removed,but you have to be an adult)  
🗑
what is the difference between privacy and anonymity?   show
🗑
Define Privacy and include its 3 main components   show
🗑
how is violating someone's privacy "an affront to that person's dignity" and autonomy?   show
🗑
show any unique product of the human intellect that has commercal value  
🗑
Summarize Hegel's theory of why indivduals have a right to own property   show
🗑
What is the maximum penalty for violating the Computer Fraud and Abuse Act?   show
🗑
show a computer to computer attack that undermine the confidentiality, integrity or availability of a computer or information resident on it.  
🗑
what did the Stuxnet worm do?   show
🗑
show a criminal act that requires the use of a computer, which is the target or tool of the crime.  
🗑
Is cyberstalking considered cybercrime?   show
🗑
show Software Piracy=duplicating, w/o authorization, proprietary software or distributing 2.Computer Sabotage=interfering with the function of computer resources through malware. 3.ElectronicBreak-ins= intentionally entering forbidden property w/o permission.  
🗑
show is a vocation that: requires a high level of education has significant societal impact  
🗑
show Similar: It has a significant social impact (ex: creating, fixing and maintaining technology) It also has a code of ethics (altough not required to follow), has pro journals Diff: Does not require higher ed, does not need liscense or certification  
🗑
Why did the ACM pass a resolution opposed to the licensing of software engineers?   show
🗑
What is whistle-blowing?   show
🗑
What are the Harms and benefits of whistle-blowing?   show
🗑
show The purpose to to provide guidelines to these upcoming professionals for moral and ethical questions. It also is intended to help with the accountability of these professionals.  
🗑
show 1.who is affected by work 2.make sure you treat others with respect 3.consider if public is well informed 4.analyze how least empowered will be affected 5.consider whether acts would be worthy of ideal professional.  
🗑
List 9 "alternative" fundamental principles that form the basis of the Software Engineering Code of Ethics   show
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: lax5