Deck 8: Computing and Vulnerable Groups
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 8: Computing and Vulnerable Groups
1
People with limited legal ____ are vulnerable because they depend on the goodwill and attention of their guardians.
A) soliloquy
B) autonomy
C) liberty
D) free speech
A) soliloquy
B) autonomy
C) liberty
D) free speech
B
2
A ____ right is a right that one cannot obtain without the help of other people.
A) theoretical
B) predictive
C) moral
D) claim
A) theoretical
B) predictive
C) moral
D) claim
D
3
Attacking threats (to the law) can completely eliminate threats.
False
Attacking threats can decrease the number of threats, but never completely eliminate them.
Attacking threats can decrease the number of threats, but never completely eliminate them.
4
A ____ is anyone who has permission to see the locations of others using a family locator service.
A) locatee
B) locator
C) principal
D) point-of-contact
A) locatee
B) locator
C) principal
D) point-of-contact
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
The concept of ____ is the process of trying to calculate how much a particular decision will affect the overall amount of happiness in the world.
A) utilitarian calculus
B) consequentialist matrix
C) behavioral trigonometry
D) differential calculus
A) utilitarian calculus
B) consequentialist matrix
C) behavioral trigonometry
D) differential calculus
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
____ argues that the only inherent moral good is caring for another person.
A) Noddings
B) Rawls
C) Mill
D) Hobbes
A) Noddings
B) Rawls
C) Mill
D) Hobbes
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
In computer security, a threat ____ is an attempt (usually in the form of a document or diagram) to systematically identify the ways that technology might be vulnerable to a malicious attack.
A) simulation
B) analysis
C) construction
D) encapsulation
A) simulation
B) analysis
C) construction
D) encapsulation
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
"Sex" refers to the socially constructed roles, behaviors, activities, and attributes that a given society considers appropriate for men and women.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Many people live in institutions that take away some of their ____.
A) liberties
B) ignorance
C) theories
D) goodwill
A) liberties
B) ignorance
C) theories
D) goodwill
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
One of the main jobs of computer security researchers is to try to design strategies to mitigate the risks that are identified in a ____ analysis.
A) concern
B) baseline
C) threat
D) foundational
A) concern
B) baseline
C) threat
D) foundational
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Rawls argues that his difference principle is correct because it is "more fair" and because it would be accepted by altruistic people.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
According to Dennis Scimeca, by focusing on ____ during the design process, a company will naturally create products that do better in the marketplace because consumers - not only those with disabilities - will prefer them.
A) style
B) accessibility
C) degrees of tolerance
D) haptic feedback
A) style
B) accessibility
C) degrees of tolerance
D) haptic feedback
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
It is necessarily the case that the theory of Noddings directly supports the idea that vulnerable groups should be given special consideration.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
____ feedback is a user interface that helps to make cell phones vibrate.
A) Command
B) Virtual
C) Heuristic
D) Haptic
A) Command
B) Virtual
C) Heuristic
D) Haptic
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
The terms "vulnerable" and "least advantaged" are synonyms.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
An entity has ____ if it is free to make decisions without outside constraints or interference.
A) soliloquy
B) autonomy
C) liberty
D) free speech
A) soliloquy
B) autonomy
C) liberty
D) free speech
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
With voice chat software, speech is converted into data, which is then broken into smaller chunks called ____
A) chips
B) packets
C) nodes
D) commands
A) chips
B) packets
C) nodes
D) commands
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
____ typing software can tell which word you are trying to type based on the first few letters.
A) Intuitive
B) Theoretical
C) Predictive
D) Practical
A) Intuitive
B) Theoretical
C) Predictive
D) Practical
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
According to Rawls's ____ argument, if we didn't know whether or not we were a member of a vulnerable group, we would want to hedge our bets by making sure the society takes care of vulnerable people.
A) veil of ignorance
B) universal law of nature
C) good will rule
D) categorical imperative
A) veil of ignorance
B) universal law of nature
C) good will rule
D) categorical imperative
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
A threat analysis usually includes a description of the ____, or potential avenues of attack, that could allow the system to be exploited.
A) exploits
B) marks
C) command points
D) vulnerabilities
A) exploits
B) marks
C) command points
D) vulnerabilities
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Match each term with the correct statement below.
a.packet
f.e-waste
b.accessibility
g.autonomy
c.utilitarian calculus
h.claim right
d.vulnerability
i.liberty
e.threat analysis
children have little of this, as all significant decisions are being made by a parent or guardian
a.packet
f.e-waste
b.accessibility
g.autonomy
c.utilitarian calculus
h.claim right
d.vulnerability
i.liberty
e.threat analysis
children have little of this, as all significant decisions are being made by a parent or guardian
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Match each term with the correct statement below.
a.packet
f.e-waste
b.accessibility
g.autonomy
c.utilitarian calculus
h.claim right
d.vulnerability
i.liberty
e.threat analysis
a potential avenue of attack
a.packet
f.e-waste
b.accessibility
g.autonomy
c.utilitarian calculus
h.claim right
d.vulnerability
i.liberty
e.threat analysis
a potential avenue of attack
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Match each term with the correct statement below.
a.packet
f.e-waste
b.accessibility
g.autonomy
c.utilitarian calculus
h.claim right
d.vulnerability
i.liberty
e.threat analysis
requires an accounting for all the affected parties
a.packet
f.e-waste
b.accessibility
g.autonomy
c.utilitarian calculus
h.claim right
d.vulnerability
i.liberty
e.threat analysis
requires an accounting for all the affected parties
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Match each term with the correct statement below.
a.packet
f.e-waste
b.accessibility
g.autonomy
c.utilitarian calculus
h.claim right
d.vulnerability
i.liberty
e.threat analysis
a unit of speech data
a.packet
f.e-waste
b.accessibility
g.autonomy
c.utilitarian calculus
h.claim right
d.vulnerability
i.liberty
e.threat analysis
a unit of speech data
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
A data ____ is an explanation of how the pieces of data relate to each other.
A) glossary
B) model
C) rating
D) matrix
A) glossary
B) model
C) rating
D) matrix
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
When cell phones, computers, TVs, and batteries are discarded, these devices are referred to as ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Match each term with the correct statement below.
a.packet
f.e-waste
b.accessibility
g.autonomy
c.utilitarian calculus
h.claim right
d.vulnerability
i.liberty
e.threat analysis
the right to an education is one example
a.packet
f.e-waste
b.accessibility
g.autonomy
c.utilitarian calculus
h.claim right
d.vulnerability
i.liberty
e.threat analysis
the right to an education is one example
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Match each term with the correct statement below.
a.packet
f.e-waste
b.accessibility
g.autonomy
c.utilitarian calculus
h.claim right
d.vulnerability
i.liberty
e.threat analysis
should address the question "Who might want to abuse this system?"
a.packet
f.e-waste
b.accessibility
g.autonomy
c.utilitarian calculus
h.claim right
d.vulnerability
i.liberty
e.threat analysis
should address the question "Who might want to abuse this system?"
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Computer programs that make a job easier (such as tax preparation programs) are sometimes seen as ____________________ that job.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
A ____ interface on an online form allows the user to select only one choice at a time.
A) drop-down menu
B) checkbox
C) radio button
D) text box
A) drop-down menu
B) checkbox
C) radio button
D) text box
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
A(n) ____ is a right that you have as long as you are left alone.
A) claim right
B) skill
C) liberty
D) entitlement
A) claim right
B) skill
C) liberty
D) entitlement
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Match each term with the correct statement below.
a.packet
f.e-waste
b.accessibility
g.autonomy
c.utilitarian calculus
h.claim right
d.vulnerability
i.liberty
e.threat analysis
freedom of religion is one example
a.packet
f.e-waste
b.accessibility
g.autonomy
c.utilitarian calculus
h.claim right
d.vulnerability
i.liberty
e.threat analysis
freedom of religion is one example
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Match each term with the correct statement below.
a.packet
f.e-waste
b.accessibility
g.autonomy
c.utilitarian calculus
h.claim right
d.vulnerability
i.liberty
e.threat analysis
the amount generated per year is estimated to be in the dozens of millions of tons
a.packet
f.e-waste
b.accessibility
g.autonomy
c.utilitarian calculus
h.claim right
d.vulnerability
i.liberty
e.threat analysis
the amount generated per year is estimated to be in the dozens of millions of tons
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
A(n) ____________________ is anyone whose cellular phone is being tracked by a family locator service.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Match each term with the correct statement below.
a.packet
f.e-waste
b.accessibility
g.autonomy
c.utilitarian calculus
h.claim right
d.vulnerability
i.liberty
e.threat analysis
technologies that promote this includes subtitles and text alternative for images
a.packet
f.e-waste
b.accessibility
g.autonomy
c.utilitarian calculus
h.claim right
d.vulnerability
i.liberty
e.threat analysis
technologies that promote this includes subtitles and text alternative for images
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
The first job of a threat analysis is to identify any ____________________, which are potential attackers, along with their motivations for attacking.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
In the early 19th century, skilled textile makers attacked and destroyed factories that used new mechanized looms; these protesters were called ____.
A) Luddites
B) Progressives
C) Automatons
D) Conservatives
A) Luddites
B) Progressives
C) Automatons
D) Conservatives
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
A data ____ is a description of the type of data to be collected.
A) glossary
B) model
C) rating
D) matrix
A) glossary
B) model
C) rating
D) matrix
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
When doing the utilitarian ____________________, you need to account for all of the affected parties.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
____ are the modern-day opponents of computer automation.
A) Neo-Luddites
B) Consequentialists
C) Epistolarians
D) Progressives
A) Neo-Luddites
B) Consequentialists
C) Epistolarians
D) Progressives
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What do family locator services allow?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Why is it important to remember to account for all affected parties when doing a utilitarian calculus?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
How can you listen in on a conversation with voice chat?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Provide an example of when it is ethically justifiable for society to take away an individual's liberties.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Why is it especially important to ask the question, "Have I included all the vulnerable groups in my calculation?" when using a utilitarian analysis?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What is the purpose of high contrast displays?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
For whom is predictive typing useful?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
To what does the term accessibility refer?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
What is the definition of the digital divide?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What are the two questions that a threat analysis should address?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck