CS210FA23MTSG
pdf
keyboard_arrow_up
School
University of Massachusetts, Lowell *
*We aren’t endorsed by this school
Course
210
Subject
Computer Science
Date
Dec 6, 2023
Type
Pages
10
Uploaded by KidStarLark11
1
CS210/CS211 Midterm Study Guide
The midterm will take place in the CBTF. There will be 30-40 multiple choice or
short-answer questions and one short essay question (1-2 paragraphs). You will
have 50 minutes to complete them.
These questions are representative of the topics covered on the exam. Some of
them are multiple choice questions without the multiple-choice options. They
might seem a little strange. You are responsible for anticipating what the multiple-
choice options might be. Some of the practice questions also hint at ideas that
might be covered in the essay question. Some of the practice questions might even
appear verbatim on the exam.
1.
Which definition of privacy means “freedom from physical intrusion”?
2.
“I refuse to take part in cyberbullying or trolling, because I strive to be kind
and honorable person.” What ethical theory is being employed in this
argument?
3.
Under which philosophical theory of ethics is intellectual property
considered a
natural
right?
4.
What do we call the situation where technological development outpaces
society’s development of relevant norms?
5.
“Doughnuts must taste like rubber, because they’re shaped like tires.”
What logical fallacy is being made here?
6.
“Which of the following intellectual property schemes grants an inventor
an exclusive legal monopoly?
7.
The famous Coco-Cola company protects its soda formula under which of
the following intellectual property schemes?
8.
“Stripping someone else of their privacy to protect myself is using that
person as a means to an end. We have a moral duty to protect and respect
the privacy of others.” What kind of ethical reasoning is being employed in
this argument?
9.
Which of the following organizations, founded by Lawrence Lessig,
leverages existing copyright laws to give greater flexibility and choices to
the creator?
10.
“Everyone can see ghosts, except for people who don’t believe in them.
That’s because ghosts are invisible to people who don’t believe in them.”
What kind of logical fallacy is this?
11.
What do we call confidential information about a person (e.g. their medical
records?)
2
12.
“All doughnuts are chocolate-covered. Sure, Dunkin Donuts sells caramel-
covered doughnuts, but those aren’t
real
doughnuts.” What kind of logical
fallacy is this?
13.
The “third party doctrine” could apply to the contents of your refrigerator
if you...
14.
“Distributing copyrighted works is a form of stealing. Stealing is wrong,
because it violates moral responsibilities which I believe to be universal.
We should not engage in cyberpiracy.” What ethical theory is being
employed in this argument?
15.
“Distributing copyrighted material robs the creator of wealth, which
discourages artists from creating more works for the public to enjoy.
Distributing copyrighted works is therefore unethical.” What ethical
theory is being employed in this argument?
16.
“If I get rich by taking advantage of the foolish, it’s not immoral. When a
lion preys upon the slowest gazelle, it’s evolution. I should behave the same
way.” What kind of logical fallacy is this?
17.
Two researchers discuss whether or not it is ethical to collect the names of
subjects in a psychological study. What are they wrestling with?
18.
What do we call public information about a person (e.g. their being in a
public place?)
19.
“You say I should wear my seatbelt because it will protect me in an
accident, but you didn’t wear your seatbelt last week.” What kind of logical
fallacy is this?
20.
Which of the following philosophies is rooted in the idea that intellectual
property should be protected because the creator is entitled to the benefits
of their work.
21.
Which of the following intellectual property schemes lasts for exactly 20
years?
22.
“Illinois CS students should strive to protect sensitive user data.” What can
we say about this statement?
23.
“Cyberbullying and trolling are unethical. While they might at first seem
like a fun diversion, this dubious social utility is far outweighed by the
emotional toll these actions take on their victims.” What ethical theory is
being employed in this argument?
24.
Two employees for a cell phone company discuss whether or not it is
ethical o share user data with a marketing firm. What are they wrestling
with?
3
25.
Which of the following is not required of a moral system?
26.
”You only support Open Source because you’re cheap,” is an example of
what logical fallacy?
27.
You are in a classroom by yourself. A classmate enters the room. Which
kind of privacy have you
lost
?
28.
Which
of
the
following
is
part
of
the
deliberate
step
of
Tavani’s
“Comprehensive Strategy for Approaching Cyberethics Issues”?
29.
If we argue that privacy is a “means to an end,” we are arguing it has what
kind of value?
30.
You and your friend Luke are standing in line at the Einstein’s Bagels. All
of a sudden, the Joker appears in the atrium and demands two hostages
(out of the 300 people in the building) – otherwise, he says he will blow up
the building. Luke pushes the two people in front of him towards the Joker.
The Joker leaves the building with the two unfortunate hostages. Luke’s
actions were moral under the premises of which ethical theory?
31.
Which definition of privacy protects freedom of conscience?
32.
Kant’s “Categorical Imperative” concerns treating people as ends in
themselves and not means to ends that they do not share. Always,
sometimes or never?
33.
What do we call data that must be protected because it is intimate or
confidential?
34.
Which of the following is
not
on the Creative Commons “Menu”?
35.
What do we call the situation that arises when a technology creates
nonobvious ethical concerns?
36.
What do we call an argument whose premises lead us to believe that the
conclusion is likely true?
37.
Software can be copyrighted. Always, sometimes, or never?
38.
Which definition of privacy is concerned with the way personal data is
gathered?
39.
“Illinois CS students should use their expertise to make the world a better
place.” What can we say about this statement?
40.
What do we call data used to uniquely identify a person (e.g. their SSN or
fingerprint?)
41.
Which of the following is an example of a moral agent?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
42.
The practices of merging and matching personal information potentially
violate which of the following?
43.
“The Earth’s surface is flat. The top level is obviously smooth and level.
Furthermore, we can see that it is not round.” What kind of logical fallacy
is this?
44.
“Staying up late makes you sleepy. You look sleepy, so you must have
stayed up late.” What kind of logical fallacy is this?
45.
Which of the following intellectual property schemes could be used to
protect a novel?
46.
When a fixed copy of a work is purchased, what grants the buyer the
freedom to give the fixed copy to a friend without the author’s permission?
47.
As you are typing your PIN into an ATM, someone behind you watches you
enter the numbers. Which kind of privacy have they
violated
?
48.
When does a sound argument contain one or more false premises?
49.
“You think this house is worth a million dollars. The appraiser thinks it’s
worth three million dollars. The true value is probably around two million
dollars.” What kind of logical fallacy is this?
50.
Which of the following is an example of cybercrime (as opposed to cyber-
related crime)?
51.
In which of the following practices is implicit personal data discovered?
52.
According to U.S. patent law, which of the following is one of the three
criteria that an invention must satisfy for a patent application to be
approved?
53.
Which of the following intellectual property schemes typically involves
employees signing NDAs?
54.
According to U.S. patent law, which of the following is
not
one of the three
criteria that an invention must satisfy for a patent application to be
approved?
55.
Which of the following laws criminalizes accessing a “protected computer”
“without authorization”?
56.
“Cyberbullying and trolling are unethical. While they might at first seem
like a fun diversion, the abusers are using humans as a means to an end.
Ultimately, humiliating people for entertainment violates our moral
obligation to protect them from harm.” What ethical theory is being
employed in this argument?
5
57.
Under which philosophical theory of ethics is intellectual property
considered an
artificial
right?
58.
Software can be patented. True or False?
59.
Which of the following laws protects private student information in the US?
60.
What do we call the philosophical stance that there are multiple plausible
answers to ethical dilemmas, as long as rational criteria are satisfied, but
some answers are more right than others?
61.
Your friend says, “We should respect this inventor’s patents, because that
incentivizes him to invent even more useful products to benefit society.”
What philosophy of intellectual property is she using?
62.
When we question whether personal information should be transferred
from its original context, what are we talking about?
63.
Which of the following is the U.S. law that created the concept of a
“takedown notice”?
64.
Which of these terms means “having privacy”?
65.
Which of the following would least likely be considered “fair use”?
66.
Which of the following organizations primarily promotes open source as a
development
process,
while
allowing
for
proprietary
software
and
commercial use?
67.
What is the definition of a logical argument?
68.
Which of these philosophers is associated with deontological ethics?
69.
“Three of my friends lost 10 pounds eating coffee beans, and there’s no
other way to explain their weight loss. These beans are magical.” What kind
of logical fallacy is this?
70.
Which of the following is
not
part of the
identify
step of Tavani’s
“Comprehensive Strategy for Approaching Cyberethics Issues”?
71.
Which of these philosophers is associated with virtue-based ethics?
72.
“Though a sentient machine might seem like something out of science
fiction, I would strive to be just and tolerant in my interactions with one.
Perhaps a sufficiently advanced AI could pursue eudaemonia.” What kind
of ethical reasoning is being employed in this argument?
73.
What do we call the situation where technological development causes
confusion between previously distinct ideas?
6
74.
Which of the following laws includes both criminal and civil punishments
for “exceeding authorization”?
75.
Which definition of privacy protects against unwarranted search and
seizure?
76.
You and your friend Luke are standing in line at the Einstein’s Bagels kiosk.
All of a sudden, the Joker appears in the atrium and demands two hostages
(out of the 300 people in the building) – otherwise, he says he will blow up
the building. You and Luke volunteer as the hostages, and leave the
building with the Joker. Your actions were moral under the premises of
which ethical theory?
77.
“Regardless of how intelligent a computer is, people should ultimately use
it as they would any other machine: to promote human happiness.” What
kind of ethical reasoning is being employed in this argument?
78.
The name of the famous shoe brand “Nike” is protected by which of the
following intellectual property schemes?
79.
What do we call the descriptive proposition that cultures have different
beliefs about what is moral and immoral?
80.
Which of the following is the U.S. law that provides the “safe harbor”
provision for ISPs?
81.
When we say a person is a “utilitarian”, to what ethical theory do they
subscribe?
82.
Which of the following philosophies is rooted in the idea that intellectual
property should be respected as an extension of the creator’s identity?
83.
Your friend says, “Pirating music is wrong, because you are stealing from
hard working artists. They have a right to benefit from their efforts.” What
philosophy of intellectual property is she using?
84.
“Cheating is wrong, so no one is going to try and cheat on this test” is an
example of what logical fallacy?
85.
If we argue that privacy is “an end in and of itself”, we are arguing it has
what kind of value?
86.
Which of the following intellectual property schemes has a “fair use”
exemption?
87.
“Illinois CS students have created software that makes people safer and
happier.” What can we say about this statement?
88.
Which of these terms means “having a
right
to privacy”?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
7
89.
“When I weigh the social utility of preserving individual privacy against the
safety risks, maintaining privacy leads to greater overall happiness.
Preserving privacy is therefore morally right.” What kind of ethical
reasoning is being employed in this argument?
90.
Which amendment to the U.S. constitution protects against unwarranted
search and seizure?
91.
People or organizations who own and enforce patents for the sole purpose
of collecting licensing fees without actually manufacturing products or
supplying services are sometimes called...
92.
”We all torrent music, so it can’t be unethical!” is an example of what logical
fallacy?
93.
Which definition of privacy means “freedom from interference in one’s
choices”?
94.
Under which philosophical theory of ethics is intellectual property
considered a
moral
right?
95.
When we say a person is a “deontologist”, to what ethical theory do they
subscribe?
96.
Which of the following is an administrative subpoena that includes a gag
order?
97.
“The Earth is clearly flat, because there is no evidence that the Earth is
round.” What kind of logical fallacy is this?
98.
Which of these philosophers is associated with utilitarianism?
99.
In which of the following practices is data not necessarily exchanged?
100.
Which of the following is true of a warrant but not true of a subpoena?
101.
“You say I should wear my seatbelt because it will protect me in an
accident, but you’re only telling me to wear my seatbelt because you’re a
control freak.” What kind of logical fallacy is this?
102.
What do we call an argument whose premises have no bearing on the truth
of their conclusion?
103.
Which of the following is an example of cybercrime (
not
cyber-related
crime)?
104.
What do we call the philosophical stance that we cannot morally evaluate
the ethical behavior of a person from another culture?
8
105.
What do we call an argument with all true premises whose conclusion must
logically follow from the premises?
106.
Which of the following intellectual property schemes has been abused
lately by “rent seeking” behavior?
107.
“I aspire to be an honest, just, and disciplined person. If I cannot afford to
pay for copyrighted material, I will cultivate these virtues by refusing to
pirate it.” What ethical theory is being employed in this argument?
108.
“A sentient artificial intelligence would be a moral agent. Because of this, it
would have intrinsic moral worth. We would therefore have the same
moral obligations to a self-aware AI that we have to any other person.”
What kind of ethical reasoning is being employed in this argument?
109.
Which of the following intellectual property schemes could be used to
protect a chemical formula for hundreds of years?
110.
The “third party doctrine” could apply to your email password if you did
which of the following things?
111.
When we say a person is a “Aristotelian”, to what ethical theory do they
subscribe?
112.
Your friend says, “It’s wrong to paint over this artist’s painting, because it
could diminish their reputation.” What philosophy of intellectual property
is she using?
113.
Which of the following organizations, founded by Richard Stallman, rejects
all notions of proprietary software?
114.
“Illinois CS students have a flawless history of protecting sensitive user
data.” What kind of statement is this?
115.
What do we call the philosophical stance that there is one and only one
correct answer to every ethical dilemma?
116.
Which
of
the
following
is
part
of
the
analyze
step
of
Tavani’s
“Comprehensive Strategy for Approaching Cyberethics Issues”?
117.
“My friend told me he saw a ghost, and he wouldn’t lie, because that’s
unethical.” What kind of logical fallacy is this?
118.
What do we call the philosophical stance that morality is a private
individual choice? Based on Gert’s definition of morality, this is an
oxymoron.
119.
If a person hacked into a government computer and to steal government
secrets, which of these laws would most likely be used to prosecute them?
9
120.
Like any mathematical formula, an algorithm can be patented without a
practical application. Always, sometimes, or never?
121.
Which of the following intellectual property schemes can be used to
protect databases that “exhibit authorship”?
122.
When does a sound argument contains all true premises?
123.
If a person hacked a video game to circumvent copyright restrictions,
which of these laws would most likely be used to prosecute them?
124.
“Round things are like balls. They roll and bounce. The Earth doesn’t
bounce or roll, so it must be flat.” What kind of logical fallacy is this?
125.
“Everyone who eats magic coffee beans will lose weight. Yes, Bill gained
weight when he ate them, but he wears leather shoes so he doesn’t count.”
What kind of logical fallacy is this?
126.
Kant’s Categorical Imperative permits sacrificing one person against their
will as long as it serves a greater good. Always, sometimes or never?
127.
The practice of dataveillance potentially violates which of the following?
128.
“We both agree that slavery is wrong and people should be free. Why are
you asking me to pay you for your work? Shouldn’t you be free?” What kind
of logical fallacy is this?
129.
What do we call data describing other data (e.g. data describing where and
when a photograph was taken?)
130.
When we question whether personal information should be gathered or
divulged within a given context, what are we talking about?
131.
A so-called “national security letter” is an example of which of the
following?
132.
Which of the following is the U.S. law that first
criminalized the
circumvention of DRM?
133.
What do we call it when we focus on what
is
the case rather than what
ought to be
the case?
134.
“I shouldn’t have to wear a seatbelt. I’m survived tours in Iraq and
Afghanistan.” What kind of logical fallacy is this?
135.
“Either my magic coffee beans can cure diseases, or all the people who
bought them are mindless fools. They can’t all be fools, so they must cure
disease!” What kind of logical fallacy is this?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
10
136.
Which definition of privacy means “control over the flow of one’s personal
information”?
137.
Which of the following scenarios would most likely be considered “fair
use”?
138.
Which of the following philosophies is rooted in the idea that intellectual
property should be protected only because it benefits society?
139.
Who deliberately sabotaged the Nazi census in France to prevent the
tracking of Jewish people?
140.
“No one should pay attention to Paul’s argument. He is a liar and a thief.”
What kind of logical fallacy is this?
Related Documents
Recommended textbooks for you

Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,

Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Operations Research : Applications and Algorithms
Computer Science
ISBN:9780534380588
Author:Wayne L. Winston
Publisher:Brooks Cole

Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781305627482
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Operations Research : Applications and AlgorithmsComputer ScienceISBN:9780534380588Author:Wayne L. WinstonPublisher:Brooks ColeDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781305627482Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning

Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,

Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Operations Research : Applications and Algorithms
Computer Science
ISBN:9780534380588
Author:Wayne L. Winston
Publisher:Brooks Cole

Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781305627482
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning