Ethics in Technology - Lessons 4 and 5

pdf

School

Ashworth College *

*We aren’t endorsed by this school

Course

PY360

Subject

Philosophy

Date

Jan 9, 2024

Type

pdf

Pages

9

Uploaded by DeanSnowRat21

Report
12/2/23, 11:00 AM Quizzes - Ethics in Technology - Parent Organization https://courses.portal2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame_auto.d2l?ou=25026&isprv=&qi=138041&cfql=1&dnb=0&fromQB=0&i… 1/9 Attempt Score 190 / 200 - 95 % Overall Grade (Highest Attempt) 190 / 200 - 95 % Question 1 5 / 5 points Question 2 5 / 5 points Question 3 5 / 5 points Question 4 0 / 5 points Question 5 5 / 5 points In a survey of digital music collections conducted a few years ago, sampling Americans aged 19 to 29 years, it was found that __________ percent of the music files were downloaded for free. 30 18 22 33 In 2005 Sony BMG Music Entertainment made headlines by purchasing the publishing rights to the Beatle's songs from Michael Jackson. purchasing the iTunes Store from Apple. announcing they would begin shipping CDs without digital rights management. shipping CDs that secretly installed a rootkit on Windows computers. Arjun decides he has two options in attempting to share his knowledge with Unrelated.com. He can do his work in a clean room. Or, in his second option, he can use questions posed to his development team that allow his associates to "re-discover" what Arjun already knows. Among the four ethical theories used to analyze the Arjun case, which theory supported Arjun's second option? Kantian Virtue Ethical Act Utilitarian Social Contract In December ________ Google announced a plan to scan millions of books held by several of the world's largest libraries. 2001 2003 2004 2005
12/2/23, 11:00 AM Quizzes - Ethics in Technology - Parent Organization https://courses.portal2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame_auto.d2l?ou=25026&isprv=&qi=138041&cfql=1&dnb=0&fromQB=0&i… 2/9 Question 6 5 / 5 points Question 7 5 / 5 points Question 8 5 / 5 points Question 9 5 / 5 points Question 10 5 / 5 points The decision by the U.S. Court of Appeals, Ninth Circuit in RIAA v. Diamond Multimedia Systems Inc. established the concept of: fair use. licensing fees for videotapes. space shifting. time shifting. Which philosopher argued in The Second Treatise of Government that people have a natural right to property? Jeremy Bentham Immanuel Kant John Locke John Stuart Mill Which of the following is a key advantage of a trade secret? They never expire. They cannot be revealed through reverse engineering. A trade secret establishes a brand name. A trade secret will be protected for not less than 100 years. After the RIAA sued Napster: The Supreme Court ruled in favor of Napster. Congress passed the Digital Millennium Copyright Act that legalized file sharing. Congress made peer-to-peer networks illegal. Napster went off-line. Currently, the lifetime of a patent is ________ years. 10 20 40 60 Google Books is:
12/2/23, 11:00 AM Quizzes - Ethics in Technology - Parent Organization https://courses.portal2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame_auto.d2l?ou=25026&isprv=&qi=138041&cfql=1&dnb=0&fromQB=0&i… 3/9 Question 11 5 / 5 points Question 12 5 / 5 points Question 13 5 / 5 points Question 14 5 / 5 points Question 15 5 / 5 points an effort to scan millions of books and make all their words searchable. an effort to gain copyrights on millions of books in the public domain. a book reader designed to compete with the Kindle. an online store competing with Amazon.com. FairPlay was the name of ___________digital rights management / DRM system. Apple's Google's Twitter's Facebook's Patent-holding companies that file lawsuits to enforce their intellectual property rights are often called patent blackmailers. patent gangsters. patent profiteers. patent trolls. The court's ruling in Apple Computer v. Franklin Computer Corp. established that: computer hardware can be patented. computer software can be copyrighted. object programs can be copyrighted. the "look and feel" of a computer program can be patented. Which of the following rights is not a right of a copyright holder? The right to reproduce the copyrighted work. The right to distribute the work to the public. The right to perform the work in public. The right to prevent others from producing competitive works. On the Internet, the term _________ refers to a transient network that allows file sharing among networked computers.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
12/2/23, 11:00 AM Quizzes - Ethics in Technology - Parent Organization https://courses.portal2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame_auto.d2l?ou=25026&isprv=&qi=138041&cfql=1&dnb=0&fromQB=0&i… 4/9 Question 16 5 / 5 points Question 17 5 / 5 points Question 18 5 / 5 points Question 19 5 / 5 points Question 20 5 / 5 points cloud services peer-to-peer file-hosting routing services Suppose you buy a Microsoft game at the bookstore. Under current U.S. law, all of the following are illegal, EXCEPT: copying it onto a CD to give or sell to someone else. preloading it onto the hard disk of a computer being sold. distributing it over the Internet. downloading the game onto your computer's hard drive. All of the following statements about Apple's digital rights management system (DRM) are true, EXCEPT: the system prevented songs from being played on more than five computers. the system prevented songs from being copied onto CDs more than seven times. music purchased from the iTunes Store could not be played on non-Apple MP3 players. Amazon was prevented from using the Fair-Play system in their online music store. The value of intellectual property is recognized in all of the following, EXCEPT: the Constitution of the United States. through legislation passed by the U.S. Congress. through court decisions. the concept of artistic license. Since the first Copyright Act was passed in 1790, Congress has repeatedly increased the number of years of copyright protection and covered more and more kinds of intellectual property. This phenomenon is referred to as: coverage inflation. mission creep. copyright creep. copyright inflation.
12/2/23, 11:00 AM Quizzes - Ethics in Technology - Parent Organization https://courses.portal2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame_auto.d2l?ou=25026&isprv=&qi=138041&cfql=1&dnb=0&fromQB=0&i… 5/9 Question 21 5 / 5 points Question 22 5 / 5 points Question 23 5 / 5 points Question 24 5 / 5 points Question 25 5 / 5 points The so-called "smartphone patent wars" ended when: Samsung agreed to stop copying Apple's design features. Apple bought all of the patents owned by Samsung and Nokia. the smartphone makers agreed to stop patenting new inventions. the smartphone makers agreed to cross-license each other's patents. Where can we draw the line between what is private and what is public and known to all? According to our text, that question mainly concerns people who are: insiders seeking access to information. members of secret groups who have too much privacy. outsiders seeking access to information. either insiders or outsiders seeking access to information. What benefit does a company gain by allowing people to login to its app using Facebook Login? It gains access to information from the consumers' Facebook profiles. It is paid a royalty from Facebook. It suffers less credit card fraud. It is more likely to be acquired by Facebook. Social Intelligence Corporation offers employers background checks that are mainly aimed at revealing a prospective employee's: virtues and vices. negative activities. personality profile. socially positive activities. ___________________suggested that we do not have to define privacy rights because every "privacy right" violation is a violation of another right as well. Judith Jarvis Thomson Thomas Hobbes Johannes Kapler John D.Sutter
12/2/23, 11:00 AM Quizzes - Ethics in Technology - Parent Organization https://courses.portal2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame_auto.d2l?ou=25026&isprv=&qi=138041&cfql=1&dnb=0&fromQB=0&i… 6/9 Question 26 5 / 5 points Question 27 5 / 5 points Question 28 0 / 5 points Question 29 5 / 5 points A cellphone company can use ____________ to determine where signal coverage is weak in order to do whatever is needed to resolve that deficiency. signal scanners RFID information enhanced 911 services loyalty disclosures In the context of monitoring online activities of website visitors, TiVo records disclose that __________ percent of primetime ads are skipped. 26 36 46 66 Manufacturers are replacing bar codes with _____________because they give more information about the product and are easier to scan. Chips RFIDs/RFID tags Scanners Apps Henry is a small-business owner, married, with two children. Which of the following social roles is most likely to be at the top of Henry's privacy ladder? children wife fishing buddy rabbi A ________________ is a file containing information about your visits to a Web site that is placed on your computer's hard drive by a Web server Cookie Spam Worm bot
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
12/2/23, 11:00 AM Quizzes - Ethics in Technology - Parent Organization https://courses.portal2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame_auto.d2l?ou=25026&isprv=&qi=138041&cfql=1&dnb=0&fromQB=0&i… 7/9 Question 30 5 / 5 points Question 31 5 / 5 points Question 32 5 / 5 points Question 33 5 / 5 points Question 34 5 / 5 points In 1890 Harvard-trained lawyers __________ and Louis Brandeis wrote a highly influential article in the Harvard Law Review stating that people in modern society have a right to privacy and that this right ought to be respected. John Napier Judith Jarvis Thomson Samuel Warren Morton Levine Scott McNealy, former CEO of Sun Microsystems rattled people's chains when he declared: "Privacy is for hermits. Get over it." "You have zero privacy anyway. Get over it." "You have all the privacy you need. Don't worry about it." "You have privacy in the shower. That's just the way it is." Cambridge Analytica collected personal information in order to provide credit reports to banks and other lenders. provide microtargeting services to companies. provide microtargeting services to conservative political candidates. provide income estimates to the Internal Revenue Service What was the reason given by the Electronic Privacy Information Center (EPIC) for filing a complaint with the Federal Trade Commission about Facebook Tag Suggestions? It is immoral to give computers the power to perform facial recognition. Facebook released the Tag Suggestions feature before it was 99% accurate in associating names with faces. Facebook did not get the permission of its users before gathering facial data from photos tagged by humans. Facebook sold its facial recognition technology to the US government for use in rounding up illegal immigrants. Flash cookies are controversial, in part, because they:
12/2/23, 11:00 AM Quizzes - Ethics in Technology - Parent Organization https://courses.portal2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame_auto.d2l?ou=25026&isprv=&qi=138041&cfql=1&dnb=0&fromQB=0&i… 8/9 Question 35 5 / 5 points Question 36 5 / 5 points Question 37 5 / 5 points Question 38 5 / 5 points Question 39 5 / 5 points are commonly used by identify thieves to steal credit card numbers. consume huge amounts of hard disk space. allow online retailers such as Amazon.com to track online shopping on other Web sites. are not controlled by the privacy controls of most Web browsers. The controversy began when a programmer in Singapore discovered that _________ was uploading his address book from his iPhone without his permission. Twitter Foursquare Path Instagram All of the following are examples of public records, EXCEPT: a birth certificate. a marriage license. a lottery ticket received as a gift. a record of a criminal conviction. From Nancy's point of view, in order to restrict access, privacy is a zone of: discretion. inaccessibility. nondisclosure. invisibility. Who wrote that every violation of a "privacy right" is also a violation of another right? Stanley Benn Judith Jarvis Thomson Louis Brandeis Morton Levine Ms. Q's pet beagle has a tiny implanted chip in one of her ears. After she reports her dog as missing, she is ever so relieved when the local police arrive at her door carrying her beagle. Where does Ms. Q live?
12/2/23, 11:00 AM Quizzes - Ethics in Technology - Parent Organization https://courses.portal2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame_auto.d2l?ou=25026&isprv=&qi=138041&cfql=1&dnb=0&fromQB=0&i… 9/9 Question 40 5 / 5 points Done New Zealand California Denmark Taiwan In the Facebook social network, a label that identifies a person in a photo is called a/an: com. tag. ident. clip.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help