Ethics in Technology - Lessons 4 and 5
pdf
keyboard_arrow_up
School
Ashworth College *
*We aren’t endorsed by this school
Course
PY360
Subject
Philosophy
Date
Jan 9, 2024
Type
Pages
9
Uploaded by DeanSnowRat21
12/2/23, 11:00 AM
Quizzes - Ethics in Technology - Parent Organization
https://courses.portal2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame_auto.d2l?ou=25026&isprv=&qi=138041&cfql=1&dnb=0&fromQB=0&i…
1/9
Attempt Score
190
/
200
-
95 %
Overall Grade (Highest Attempt)
190
/
200
-
95 %
Question 1
5 / 5 points
Question 2
5 / 5 points
Question 3
5 / 5 points
Question 4
0 / 5 points
Question 5
5 / 5 points
In a survey of digital music collections conducted a few years ago, sampling Americans aged 19
to 29 years, it was found that __________ percent of the music files were downloaded for free.
30
18
22
33
In 2005 Sony BMG Music Entertainment made headlines by
purchasing the publishing rights to the Beatle's songs from Michael Jackson.
purchasing the iTunes Store from Apple.
announcing they would begin shipping CDs without digital rights management.
shipping CDs that secretly installed a rootkit on Windows computers.
Arjun decides he has two options in attempting to share his knowledge with Unrelated.com. He
can do his work in a clean room. Or, in his second option, he can use questions posed to his
development team that allow his associates to "re-discover" what Arjun already knows. Among
the four ethical theories used to analyze the Arjun case, which theory supported Arjun's second
option?
Kantian
Virtue Ethical
Act Utilitarian
Social Contract
In December ________ Google announced a plan to scan millions of books held by several of the
world's largest libraries.
2001
2003
2004
2005
12/2/23, 11:00 AM
Quizzes - Ethics in Technology - Parent Organization
https://courses.portal2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame_auto.d2l?ou=25026&isprv=&qi=138041&cfql=1&dnb=0&fromQB=0&i…
2/9
Question 6
5 / 5 points
Question 7
5 / 5 points
Question 8
5 / 5 points
Question 9
5 / 5 points
Question 10
5 / 5 points
The decision by the U.S. Court of Appeals, Ninth Circuit in RIAA v. Diamond Multimedia Systems
Inc. established the concept of:
fair use.
licensing fees for videotapes.
space shifting.
time shifting.
Which philosopher argued in The Second Treatise of Government that people have a natural
right to property?
Jeremy Bentham
Immanuel Kant
John Locke
John Stuart Mill
Which of the following is a key advantage of a trade secret?
They never expire.
They cannot be revealed through reverse engineering.
A trade secret establishes a brand name.
A trade secret will be protected for not less than 100 years.
After the RIAA sued Napster:
The Supreme Court ruled in favor of Napster.
Congress passed the Digital Millennium Copyright Act that legalized file sharing.
Congress made peer-to-peer networks illegal.
Napster went off-line.
Currently, the lifetime of a patent is ________ years.
10
20
40
60
Google Books is:
12/2/23, 11:00 AM
Quizzes - Ethics in Technology - Parent Organization
https://courses.portal2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame_auto.d2l?ou=25026&isprv=&qi=138041&cfql=1&dnb=0&fromQB=0&i…
3/9
Question 11
5 / 5 points
Question 12
5 / 5 points
Question 13
5 / 5 points
Question 14
5 / 5 points
Question 15
5 / 5 points
an effort to scan millions of books and make all their words searchable.
an effort to gain copyrights on millions of books in the public domain.
a book reader designed to compete with the Kindle.
an online store competing with Amazon.com.
FairPlay was the name of ___________digital rights management / DRM system.
Apple's
Google's
Twitter's
Facebook's
Patent-holding companies that file lawsuits to enforce their intellectual property rights are often
called
patent blackmailers.
patent gangsters.
patent profiteers.
patent trolls.
The court's ruling in Apple Computer v. Franklin Computer Corp. established that:
computer hardware can be patented.
computer software can be copyrighted.
object programs can be copyrighted.
the "look and feel" of a computer program can be patented.
Which of the following rights is not a right of a copyright holder?
The right to reproduce the copyrighted work.
The right to distribute the work to the public.
The right to perform the work in public.
The right to prevent others from producing competitive works.
On the Internet, the term _________ refers to a transient network that allows file sharing among
networked computers.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
12/2/23, 11:00 AM
Quizzes - Ethics in Technology - Parent Organization
https://courses.portal2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame_auto.d2l?ou=25026&isprv=&qi=138041&cfql=1&dnb=0&fromQB=0&i…
4/9
Question 16
5 / 5 points
Question 17
5 / 5 points
Question 18
5 / 5 points
Question 19
5 / 5 points
Question 20
5 / 5 points
cloud services
peer-to-peer
file-hosting
routing services
Suppose you buy a Microsoft game at the bookstore. Under current U.S. law, all of the following
are illegal, EXCEPT:
copying it onto a CD to give or sell to someone else.
preloading it onto the hard disk of a computer being sold.
distributing it over the Internet.
downloading the game onto your computer's hard drive.
All of the following statements about Apple's digital rights management system (DRM) are true,
EXCEPT:
the system prevented songs from being played on more than five computers.
the system prevented songs from being copied onto CDs more than seven times.
music purchased from the iTunes Store could not be played on non-Apple MP3 players.
Amazon was prevented from using the Fair-Play system in their online music store.
The value of intellectual property is recognized in all of the following, EXCEPT:
the Constitution of the United States.
through legislation passed by the U.S. Congress.
through court decisions.
the concept of artistic license.
Since the first Copyright Act was passed in 1790, Congress has repeatedly increased the number
of years of copyright protection and covered more and more kinds of intellectual property. This
phenomenon is referred to as:
coverage inflation.
mission creep.
copyright creep.
copyright inflation.
12/2/23, 11:00 AM
Quizzes - Ethics in Technology - Parent Organization
https://courses.portal2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame_auto.d2l?ou=25026&isprv=&qi=138041&cfql=1&dnb=0&fromQB=0&i…
5/9
Question 21
5 / 5 points
Question 22
5 / 5 points
Question 23
5 / 5 points
Question 24
5 / 5 points
Question 25
5 / 5 points
The so-called "smartphone patent wars" ended when:
Samsung agreed to stop copying Apple's design features.
Apple bought all of the patents owned by Samsung and Nokia.
the smartphone makers agreed to stop patenting new inventions.
the smartphone makers agreed to cross-license each other's patents.
Where can we draw the line between what is private and what is public and known to all?
According to our text, that question mainly concerns people who are:
insiders seeking access to information.
members of secret groups who have too much privacy.
outsiders seeking access to information.
either insiders or outsiders seeking access to information.
What benefit does a company gain by allowing people to login to its app using Facebook Login?
It gains access to information from the consumers' Facebook profiles.
It is paid a royalty from Facebook.
It suffers less credit card fraud.
It is more likely to be acquired by Facebook.
Social Intelligence Corporation offers employers background checks that are mainly aimed at
revealing a prospective employee's:
virtues and vices.
negative activities.
personality profile.
socially positive activities.
___________________suggested that we do not have to define privacy rights because every
"privacy right" violation is a violation of another right as well.
Judith Jarvis Thomson
Thomas Hobbes
Johannes Kapler
John D.Sutter
12/2/23, 11:00 AM
Quizzes - Ethics in Technology - Parent Organization
https://courses.portal2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame_auto.d2l?ou=25026&isprv=&qi=138041&cfql=1&dnb=0&fromQB=0&i…
6/9
Question 26
5 / 5 points
Question 27
5 / 5 points
Question 28
0 / 5 points
Question 29
5 / 5 points
A cellphone company can use ____________ to determine where signal coverage is weak in order
to do whatever is needed to resolve that deficiency.
signal scanners
RFID information
enhanced 911 services
loyalty disclosures
In the context of monitoring online activities of website visitors, TiVo records disclose that
__________ percent of primetime ads are skipped.
26
36
46
66
Manufacturers are replacing bar codes with _____________because they give more information
about the product and are easier to scan.
Chips
RFIDs/RFID tags
Scanners
Apps
Henry is a small-business owner, married, with two children. Which of the following social roles
is most likely to be at the top of Henry's privacy ladder?
children
wife
fishing buddy
rabbi
A ________________ is a file containing information about your visits to a Web site that is placed
on your computer's hard drive by a Web server
Cookie
Spam
Worm
bot
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
12/2/23, 11:00 AM
Quizzes - Ethics in Technology - Parent Organization
https://courses.portal2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame_auto.d2l?ou=25026&isprv=&qi=138041&cfql=1&dnb=0&fromQB=0&i…
7/9
Question 30
5 / 5 points
Question 31
5 / 5 points
Question 32
5 / 5 points
Question 33
5 / 5 points
Question 34
5 / 5 points
In 1890 Harvard-trained lawyers __________ and Louis Brandeis wrote a highly influential article
in the Harvard Law Review stating that people in modern society have a right to privacy and that
this right ought to be respected.
John Napier
Judith Jarvis Thomson
Samuel Warren
Morton Levine
Scott McNealy, former CEO of Sun Microsystems rattled people's chains when he declared:
"Privacy is for hermits. Get over it."
"You have zero privacy anyway. Get over it."
"You have all the privacy you need. Don't worry about it."
"You have privacy in the shower. That's just the way it is."
Cambridge Analytica collected personal information in order to
provide credit reports to banks and other lenders.
provide microtargeting services to companies.
provide microtargeting services to conservative political candidates.
provide income estimates to the Internal Revenue Service
What was the reason given by the Electronic Privacy Information Center (EPIC) for filing a
complaint with the Federal Trade Commission about Facebook Tag Suggestions?
It is immoral to give computers the power to perform facial recognition.
Facebook released the Tag Suggestions feature before it was 99% accurate in associating names with
faces.
Facebook did not get the permission of its users before gathering facial data from photos tagged by humans.
Facebook sold its facial recognition technology to the US government for use in rounding up illegal
immigrants.
Flash cookies are controversial, in part, because they:
12/2/23, 11:00 AM
Quizzes - Ethics in Technology - Parent Organization
https://courses.portal2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame_auto.d2l?ou=25026&isprv=&qi=138041&cfql=1&dnb=0&fromQB=0&i…
8/9
Question 35
5 / 5 points
Question 36
5 / 5 points
Question 37
5 / 5 points
Question 38
5 / 5 points
Question 39
5 / 5 points
are commonly used by identify thieves to steal credit card numbers.
consume huge amounts of hard disk space.
allow online retailers such as Amazon.com to track online shopping on other Web sites.
are not controlled by the privacy controls of most Web browsers.
The controversy began when a programmer in Singapore discovered that _________ was
uploading his address book from his iPhone without his permission.
Twitter
Foursquare
Path
Instagram
All of the following are examples of public records, EXCEPT:
a birth certificate.
a marriage license.
a lottery ticket received as a gift.
a record of a criminal conviction.
From Nancy's point of view, in order to restrict access, privacy is a zone of:
discretion.
inaccessibility.
nondisclosure.
invisibility.
Who wrote that every violation of a "privacy right" is also a violation of another right?
Stanley Benn
Judith Jarvis Thomson
Louis Brandeis
Morton Levine
Ms. Q's pet beagle has a tiny implanted chip in one of her ears. After she reports her dog as
missing, she is ever so relieved when the local police arrive at her door carrying her beagle.
Where does Ms. Q live?
12/2/23, 11:00 AM
Quizzes - Ethics in Technology - Parent Organization
https://courses.portal2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame_auto.d2l?ou=25026&isprv=&qi=138041&cfql=1&dnb=0&fromQB=0&i…
9/9
Question 40
5 / 5 points
Done
New Zealand
California
Denmark
Taiwan
In the Facebook social network, a label that identifies a person in a photo is called a/an:
com.
tag.
ident.
clip.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help