Exam 15: Making Decisions About Computers, Information, and Society

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The term ____ refers to someone who breaks into computer systems, launches Internet worms and viruses, or perpetrates other dubious computer-related vandalism.

(Multiple Choice)
4.8/5
(35)

Phone calls typically include less information than emails.

(True/False)
4.9/5
(41)

The most well-known consequentialists are the utilitarians.

(True/False)
4.9/5
(36)

The more you compress music data, the more sound quality you gain.

(True/False)
4.9/5
(42)

The new way of thinking about making and sharing music will deemphasize the need for large ____ companies.

(Multiple Choice)
4.8/5
(30)

What does PGP allow email users to return to?

(Multiple Choice)
4.7/5
(40)

Kant thought about what duties we humans have to each other. He came up with ____ that characterized these duties.

(Multiple Choice)
4.8/5
(35)

One of the challenges when using a utilitarian argument in a dialectic about hacking is that it is sometimes difficult to predict consequences with any accuracy.

(True/False)
4.8/5
(41)

Apple computer's music distribution system called the iTunes Music Store allows users to download songs for a relatively small fee.

(True/False)
5.0/5
(38)

The ____ is an outline that can help guide you in a productive dialectic.

(Multiple Choice)
4.8/5
(40)

The majority of music that Napster users shared was copyrighted.

(True/False)
4.9/5
(43)

The philosopher ____ was known to say "never treat a fellow human merely as a means to an end".

(Multiple Choice)
4.7/5
(27)

Good analogies have a strong ____ appeal, but we should look deeper when using analogies in ethical analysis.

(Multiple Choice)
4.8/5
(38)

____ efforts such as GNU, Linux, and Apache provide useful software for little or no money to many computer users.

(Multiple Choice)
4.9/5
(36)

Ideally, in a dialectic the ultimate goal is for both sides to "win" by moving closer to the truth from two different perspectives.

(True/False)
4.8/5
(40)

The MP3 protocol allows one level of compression.

(True/False)
4.8/5
(40)

The three methods of communication: face to face conversation, phone calls, and email, all differ in the amount of bandwidth.

(True/False)
4.8/5
(37)

Ethicists depend on what is called a(n) ____ to try to get better and better ethical decisions.

(Multiple Choice)
4.9/5
(36)

MP3 file copying has encouraged CD buying as a long term effect.

(True/False)
4.7/5
(33)

Banning dissemination on the Web is difficult, since the Web is global and most laws are limited to physical borders.

(True/False)
4.9/5
(40)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)