Deck 15: Tif 2: Information Technology Ethics
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Match between columns
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/37
Play
Full screen (f)
Deck 15: Tif 2: Information Technology Ethics
1
________ behavior is behavior that does not conform to a set of approved standards of social or professional behavior.
Unethical
2
Intellectual property (such as music, writing, and software) is protected through ________ law.
A) personal privacy
B) fair trade
C) copyright
D) censorship
A) personal privacy
B) fair trade
C) copyright
D) censorship
C
3
________ is the theory that holds that actions that generate greater happiness are judged to be better than actions that lead to unhappiness.
A) Virtue Ethics
B) Utilitarianism
C) Relativism
D) Deontology
A) Virtue Ethics
B) Utilitarianism
C) Relativism
D) Deontology
B
4
________ psychology works to discover the causes of happiness instead of addressing the treatment of mental dysfunctions.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
5
By using ________, a smartphone with a GPS chip can determine your exact position.
A) extrapolation
B) interpolation
C) geolocation
D) navigation
A) extrapolation
B) interpolation
C) geolocation
D) navigation
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
6
________ is an ethical system in which conforming to God's law is right, and breaking it is wrong.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
7
A ________ is person who reports a business that is engaged in an illegal activity or an unethical act to a regulatory agency.
A) cyberbully
B) hacker
C) spammer
D) whistle-blower
A) cyberbully
B) hacker
C) spammer
D) whistle-blower
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
8
A person who does not conform to the approved standards of social or professional behavior ________.
A) violates social norms
B) practices situational ethics
C) follows rule utilitarianism
D) commits unethical behavior
A) violates social norms
B) practices situational ethics
C) follows rule utilitarianism
D) commits unethical behavior
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
9
The proposed ________ Act seeks to prevent employers from demanding passwords to private sites from employees.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
10
________ is the theory that holds that there is no universal moral truth and that instead moral principles are dictated by cultural tastes and customs.
A) Divine Command Theory
B) Utilitarianism
C) Relativism
D) Deontology
A) Divine Command Theory
B) Utilitarianism
C) Relativism
D) Deontology
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
11
________ behavior is behavior where a person has no sense of right and wrong and has no interest in the moral consequences of their actions.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
12
________ is an ethical system in which individual happiness is not important, and the greater good should be considered.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
13
The study of the general nature of morals and of the specific moral choices individuals make is called ________.
A) mores
B) ethics
C) customs
D) taboos
A) mores
B) ethics
C) customs
D) taboos
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
14
Social media sites such as Facebook share information with others. The use of this information can raise questions regarding ________.
A) computer abuse
B) personal privacy
C) fair use
D) fair trade
A) computer abuse
B) personal privacy
C) fair use
D) fair trade
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
15
Enacted in 2002, the ________ Act requires companies to provide an anonymous method for employees and third parties to report complaints, including ethics violations.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
16
All of the following are types of cyberbullying EXCEPT ________.
A) spreading rumors or lies on social networking sites
B) inundating a victim with harassing instant messages or text messages
C) physically stalking an individual
D) infecting the victim's computer with malware to spy on the victim
A) spreading rumors or lies on social networking sites
B) inundating a victim with harassing instant messages or text messages
C) physically stalking an individual
D) infecting the victim's computer with malware to spy on the victim
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
17
________ is the theory that God is all-knowing and sets moral standards.
A) Divine Command Theory
B) Utilitarianism
C) Relativism
D) Virtue Ethics
A) Divine Command Theory
B) Utilitarianism
C) Relativism
D) Virtue Ethics
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
18
Social networking sites allow users to choose to share information publicly with friends or keep it private by using ________.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following countries has a high software piracy rate?
A) United States
B) Canada
C) Yemen
D) Sweden
A) United States
B) Canada
C) Yemen
D) Sweden
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
20
________ is the intentional refusal to obey certain laws and is often used as a form of protest.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
21
________ is the right to be left alone as one pleases.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
22
Harassing individuals through electronic means such as video or cell phones is called ________.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
23
Global positioning system (GPS) chips in a smartphone allow your exact position to be determined.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
24
Most states have enacted antibullying laws.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
25
In the United States, there are several federal laws prohibiting cyberbullying.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
26
A cyborg is an entity containing both biological and artificial components.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
27
Relativism holds that moral principles are dictated by cultural tastes and customs.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
28
Utilitarianism focuses on adherence to moral duties and rights.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
29
Facebook allows you to determine the extent to which your information can be shared.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
30
The United States has one of the highest rate of software piracy.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
31
Positive psychology addresses the treatment of mental dysfunctions.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
32
It is estimated that the global loss in 2011 due to software piracy is in the billions of dollars.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
33
You can use ________ services such as Foursquare, Gowalla, and Brightkite to specifically locate friends or allow friends to locate you.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
34
Cyberbullying is harassing, threatening, humiliating, embarrassing, or tormenting individuals by means of technology.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
35
Match between columns
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
36
Match between columns
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
37
Match between columns
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck