CS 211 Midterm 1

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/140

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:04 PM on 3/27/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

141 Terms

1
New cards

Definition of privacy meaning "freedom from physical intrusion"

Accessibility Privacy

2
New cards

"I refuse to take part in cyberbullying or trolling, because I strive to be a kind and honorable person." What ethical theory is being employed in this argument?

Virtue/character-based ethics

3
New cards

Under which philosophical theory of ethics is intellectual property considered a natural right? (all property = natural right given to the laborer, including IP)

Labor Theory

4
New cards

The situation where technological development outpaces society's development of relevant norms

Policy Vacuums

5
New cards

Logical fallacy where you assume that things that are similar in some way must be similar in others. Ex: Doughnuts must taste like rubber because they're shaped like tires."

False Analogy

6
New cards

Intellectual property scheme that grants an inventor an exclusive legal monopoly

Patent

7
New cards

IP scheme that protects info that's sufficiently valuable/secret to afford an actual/potential economic advantage. Used by Coca-Cola to protect its soda formula

Trade Secret

8
New cards

"Stripping someone else of their privacy to protect myself is using that person as a means to an end. We have a moral duty to protect and respect the privacy of others." What kind of ethical reasoning is being employed in this argument?

Duty-Based Ethics

9
New cards

Organization founded by Lawrence Lessig that leverages existing copyright laws to give greater flexibility and choices to the creator

Creative Commons

10
New cards

Logical fallacy where you assume the conclusion in your arg. Ex: "Everyone can see ghosts, except for people who don't believe in them. That's because ghosts are invisible to people who don't believe in them."

Begging the Question

11
New cards

Confidential information about a person (e.g. their medical records)

NPI (Nonpublic personal Information)

12
New cards

Logical fallacy where you arbitrarily exclude examples that disprove a claim. Ex: "All doughnuts are chocolate-covered. Sure, Dunkin Donuts sells caramel-covered doughnuts, but those aren't real doughnuts."

No true scotsman

13
New cards

Legal theory saying that things held out in public != reasonably private & information voluntarily given to a third party != private

Third party doctrine

14
New cards

Ethical theory that believes that intrinsic good = will to do good, regardless of outcome & morality = grounded in agents' obligations to one another. "Distributing copyrighted works is a form of stealing. Stealing is wrong, because it violates moral responsibilities which I believe to be universal. We should not engage in cyberpiracy."

Duty-based/deontological ethics

15
New cards

Ethical theory that believes that intrinsic good = will to do good, regardless of outcome & morality = grounded in agents' obligations to one another. "Distributing copyrighted works is a form of stealing. Stealing is wrong, because it violates moral responsibilities which I believe to be universal. We should not engage in cyberpiracy." What ethical theory is being employed in this argument?

Duty-based/deontological ethics

16
New cards

Ethical theory where the primary goal = providing max happiness to moral agents. Outcome matters most. "Distributing copyrighted material robs the creator of wealth, which discourages artists from creating more works for the public to enjoy. Distributing copyrighted works is therefore unethical."

Consequence-based/Utilitarian Ethics

17
New cards

"If I get rich by taking advantage of the foolish, it's not immoral. When a lion preys upon the slowest gazelle, it's evolution. I should behave the same way." What kind of logical fallacy is this?

False Analogy

18
New cards

Two researchers discuss whether or not it is ethical to collect the names of subjects in a psychological study. What are they wrestling with? Def: whether info should be gathered

Norms of Appropriateness

19
New cards

What do we call public information about a person (e.g. their being in a public place?)

PPI (Public Personal Information)

20
New cards

"You say I should wear my seatbelt because it will protect me in an accident, but you didn't wear your seatbelt last week." What kind of logical fallacy is this?

Tu Quoque

21
New cards

Which philosophy is rooted in the idea that intellectual property should be protected because the creator is entitled to the benefits of their work?

Labor Theory

22
New cards

Which intellectual property scheme lasts for exactly 20 years?

Patents

23
New cards

"Illinois CS students should strive to protect sensitive user data." What can we say about this statement?

Normative

24
New cards

"Cyberbullying and trolling are unethical. While they might at first seem like a fun diversion, this dubious social utility is far outweighed by the emotional toll these actions take on their victims." What ethical theory is being employed in this argument?

Utilitarianism/Consequence-Based ethics

25
New cards

Two employees for a cell phone company discuss whether or not it is ethical to share user data with a marketing firm. What are they wrestling with?

Norms of Distribution

26
New cards

What are the requirements of a moral system?

1. Public - everyone knows the rules

2. Informal - not enforced by the law

3. Rational - based on principles of logic and reason understood by all MORAL AGENTS

4. Impartial - moral rules are designed to apply equitably to all participants

27
New cards

Logical fallacy where you attack a person instead of their arg. Ex: "You only support Open Source because you're cheap."

Ad Hominem

28
New cards

You are in a classroom by yourself. A classmate enters the room. Which kind of privacy have you lost?

Accessibility/Physical privacy (access to your person)

29
New cards

What are the steps of Tavani's "Comprehensive Strategy for Approaching Cyberethics Issues"?

1. Identify the practice or feature

-Disclose morally opaque features

-Assess sociological implications

-Search for existing policies or ethical codes

2. Analyze the ethical issue

-Identify any policy vacuums

-Clear up conceptual muddles

3. Deliberate on the ethical issue

-Apply one or more ethical theories

-Justify the position using logical argumentation

30
New cards

If we argue that privacy is a "means to an end," we are arguing it has what kind of value?

Instrumental Value

31
New cards

You and your friend Luke are standing in line at the Einstein's Bagels. All of a sudden, the Joker appears in the atrium and demands two hostages (out of the 300 people in the building) - otherwise, he says he will blow up the building. Luke pushes the two people in front of him towards the Joker. The Joker leaves the building with the two unfortunate hostages. Luke's actions were moral under the premises of which ethical theory?

Utilitarianism

32
New cards

Which definition of privacy protects freedom of conscience (personal choices, free from interference in personal affairs)?

Decisional Privacy

33
New cards

Concerns always treating people as ends in themselves and not means to ends that they do not share

Kant's "Categorical Imperative"

34
New cards

What do we call data that must be protected because it is intimate or confidential?

Nonpublic Personal Information(NPI)

35
New cards

What are the elements on the Creative Commons "Menu"?

Attribution: Can use if given credit

Noncommercial: Use only for noncommercial purposes

Derivative works: Use only verbatim copies of the work, NOT derivative works based on it

Share alike: Use/distribute derivative works only under a license identical to the license that governs your work

36
New cards

What do we call the situation that arises when a technology creates non-obvious ethical concerns?

Conceptual Muddle

37
New cards

What do we call an argument whose premises lead us to believe that the conclusion is likely true?

Inductive Argument

38
New cards

Software can be copyrighted. Always, sometimes, or never?

Sometimes

39
New cards

Which definition of privacy is concerned with the way personal data is gathered?

Informational Privacy

40
New cards

"Illinois CS students should use their expertise to make the world a better place." What can we say about this statement? (The way people should be (values))

Normative statement

41
New cards

What do we call data used to uniquely identify a person (e.g. their SSN or fingerprint?)

Personal Identifying Information (PII)

42
New cards

What is a moral agent?

An individual who upholds moral standards, can discern right from wrong, and can be held accountable for their own actions.

43
New cards

The practices of merging and matching personal information potentially violate which of the following? (Norms depend on context)

Contextual Integrity

44
New cards

"The Earth's surface is flat. The top level is obviously smooth and level. Furthermore, we can see that it is not round." What kind of logical fallacy is this?

Begging the Question/Circular Reasoning

45
New cards

"Staying up late makes you sleepy. You look sleepy, so you must have stayed up late." What kind of logical fallacy is this? (Reversing the direction of an implication)

Assuming the Consequent

46
New cards

Which intellectual property scheme could be used to protect a novel?

Copyright

47
New cards

When a fixed copy of a work is purchased, what grants the buyer the freedom to give the fixed copy to a friend without the author's permission?

First Sale Doctrine

48
New cards

As you are typing your PIN into an ATM, someone behind you watches you enter the numbers. Which kind of privacy have they violated?

Descriptive (physical) privacy

49
New cards

When does a sound argument contain one or more false premises? Always, sometimes, or never?

Never

50
New cards

"You think this house is worth a million dollars. The appraiser thinks it's worth three million dollars. The true value is probably around two million dollars." What kind of logical fallacy is this?

Argument to Moderation

51
New cards

What is the difference between cybercrime and cyber-related (cyber-assisted) crime?

cybercrime: piracy, hacking into digital accounts (completely online)

cyber-related (cyber-assisted) crime: ID theft, doxing, harassment

52
New cards

In which practice is implicit personal data discovered?

Mining

53
New cards

According to U.S. patent law, what are the three criteria that an invention must satisfy for a patent application to be approved?

Usefulness, Novelty, Non-Obviousness

54
New cards

Which intellectual property scheme typically involves employees signing NDAs?

Trade Secret

55
New cards

Which law criminalizes accessing a "protected computer" "without authorization"?

Computer Fraud and Abuse Act (CFAA)

56
New cards

"Cyberbullying and trolling are unethical. While they might at first seem like a fun diversion, the abusers are using humans as a means to an end. Ultimately, humiliating people for entertainment violates our moral obligation to protect them from harm." What ethical theory is being employed in this argument?

Deontological (Duty-Based)

57
New cards

Under which philosophical theory of ethics is intellectual property considered an artificial right?

Utilitarian theory

58
New cards

Software can be patented. True or False?

True (Patent protections have been granted to software)

59
New cards

Which law protects private student information in the US?

FERPA

60
New cards

What do we call the philosophical stance that there are multiple plausible answers to ethical dilemmas, as long as rational criteria are satisfied, but some answers are more right than others?

Ethical Objectivism

61
New cards

Your friend says, "We should respect this inventor's patents, because that incentivizes him to invent even more useful products to benefit society." What philosophy of intellectual property is she using?

Utilitarian

62
New cards

When we question whether personal information should be transferred from its original context, what are we talking about?

Norms of Distribution

63
New cards

What is the U.S. law that created the concept of a "takedown notice"?

DMCA Safe Harbor

64
New cards

Which term means "having privacy"?

Descriptive privacy

65
New cards

Which of the following would least likely be considered "fair use"?

Duplicating an entire movie/song on YouTube

66
New cards

Which organization primarily promotes open source as a development process, while allowing for proprietary software and commercial use?

Open Source Initiative (OSI)

67
New cards

What is the definition of a logical argument?

A series of claims (premises) aimed at establishing the truth of one central claim (the conclusion)

68
New cards

Which philosopher is associated with deontological ethics?

Kant

69
New cards

"Three of my friends lost 10 pounds eating coffee beans, and there's no other way to explain their weight loss. These beans are magical." What kind of logical fallacy is this? (Arguing that a claim = true bc we can't prove the claim = false)

Argumentation from Ignorance

70
New cards

What are the parts of the identify step of Tavani's "Comprehensive Strategy for Approaching Cyberethics Issues"?

Disclose morally opaque features

Assess sociological implications

Search for existing policies or ethical codes

71
New cards

Which philosophers are associated with virtue-based ethics?

Aristotle, Elizabeth Anscombe

72
New cards

"Though a sentient machine might seem like something out of science fiction, I would strive to be just and tolerant in my interactions with one. Perhaps a sufficiently advanced AI could pursue eudaimonia." What kind of ethical reasoning is being employed in this argument?

Virtue Ethics

73
New cards

What do we call the situation where technological development causes confusion between previously distinct ideas?

Conceptual Muddle

74
New cards

Which law includes both criminal and civil punishments for "exceeding authorization"?

Computer Fraud and Abuse Act (CFAA)

75
New cards

Which definition of privacy protects against unwarranted search and seizure?

Accessibility Privacy

76
New cards

You and your friend Luke are standing in line at the Einstein's Bagels kiosk. All of a sudden, the Joker appears in the atrium and demands two hostages (out of the 300 people in the building) - otherwise, he says he will blow up the building. You and Luke volunteer as the hostages, and leave the building with the Joker. Your actions were moral under the premises of which ethical theory?

Virtue-based (because you are being selfless for sacrificing yourself)

77
New cards

"Regardless of how intelligent a computer is, people should ultimately use it as they would any other machine: to promote human happiness." What kind of ethical reasoning is being employed in this argument?

Utilitarian

78
New cards

The name of the famous shoe brand "Nike" is protected by which of the following intellectual property schemes?

Trademark

79
New cards

What do we call the descriptive proposition that cultures have different beliefs about what is moral and immoral?

Cultural Relativism

80
New cards

Which is the U.S. law that provides the "safe harbor" provision for ISPs?

DMCA Safe Harbor

81
New cards

When we say a person is a "utilitarian", to what ethical theory do they subscribe?

Consequence-Based

82
New cards

Which philosophy is rooted in the idea that intellectual property should be respected as an extension of the creator's identity?

Personality Theory

83
New cards

Your friend says, "Pirating music is wrong, because you are stealing from hard working artists. They have a right to benefit from their efforts." What philosophy of intellectual property is she using?

Labor Theory

84
New cards

"Cheating is wrong, so no one is going to try and cheat on this test" is an example of what logical fallacy? (Inferring "is" from "ought")

Moralistic Fallacy

85
New cards

If we argue that privacy is "an end in and of itself", we are arguing it has what kind of value?

Intrinsic value (value for its own sake)

86
New cards

Which intellectual property scheme has a "fair use" exemption?

Copyright

87
New cards

"Illinois CS students have created software that makes people safer and happier." What can we say about this statement? (Def: the way people are (facts))

Descriptive statement

88
New cards

Which term means "having a right to privacy"?'

Normative privacy

89
New cards

"When I weigh the social utility of preserving individual privacy against the safety risks, maintaining privacy leads to greater overall happiness. Preserving privacy is therefore morally right." What kind of ethical reasoning is being employed in this argument?

Consequence-based

90
New cards

Which amendment to the U.S. constitution protects against unwarranted search and seizure?

Fourth Amendment

91
New cards

People or organizations who own and enforce patents for the sole purpose of collecting licensing fees without actually manufacturing products or supplying services are sometimes called...

Patent trolls

92
New cards

"We all torrent music, so it can't be unethical!" is an example of what logical fallacy? (Inferring "ought" from "is")

Naturalistic fallacy

93
New cards

Which definition of privacy means "freedom from interference in one's choices"?

Decisional privacy

94
New cards

Under which philosophical theory of ethics is intellectual property considered a moral right?

Personality theory

95
New cards

When we say a person is a "deontologist", to what ethical theory do they subscribe?

Duty-based ethics / Deontology

96
New cards

What is an administrative subpoena that includes a gag order?

National Security Letters

97
New cards

"The Earth is clearly flat, because there is no evidence that the Earth is round." What kind of logical fallacy is this? (Arguing that a claim = true bc we can't prove the claim = false)

Argument from Ignorance

98
New cards

Which philosopher is associated with utilitarianism?

Jeremy Bentham

99
New cards

In which practice is data not necessarily exchanged?

Data Mining

100
New cards

What's the difference between a warrant and a subpoena?

A warrant must have a probable cause

Explore top notes

note
AP Gov: Chapter 1 Vocab
Updated 1299d ago
0.0(0)
note
Unit 7: Evolution (Biology)
Updated 710d ago
0.0(0)
note
Mitosis
Updated 751d ago
0.0(0)
note
diplomacy
Updated 1251d ago
0.0(0)
note
Le Chatelier's Principle
Updated 1158d ago
0.0(0)
note
AP Gov: Chapter 1 Vocab
Updated 1299d ago
0.0(0)
note
Unit 7: Evolution (Biology)
Updated 710d ago
0.0(0)
note
Mitosis
Updated 751d ago
0.0(0)
note
diplomacy
Updated 1251d ago
0.0(0)
note
Le Chatelier's Principle
Updated 1158d ago
0.0(0)

Explore top flashcards

flashcards
Kite Runners Vocab
35
Updated 68d ago
0.0(0)
flashcards
Midterm
238
Updated 389d ago
0.0(0)
flashcards
Describing People SPN2 PreAP
91
Updated 221d ago
0.0(0)
flashcards
Cellular Respiration Review
22
Updated 1215d ago
0.0(0)
flashcards
apush 3.1-3.4
52
Updated 578d ago
0.0(0)
flashcards
Chapter 9 Med Term
25
Updated 1217d ago
0.0(0)
flashcards
Posterior Muscles
47
Updated 1244d ago
0.0(0)
flashcards
SALUD Y BIENESTAR vocabulario
33
Updated 913d ago
0.0(0)
flashcards
Kite Runners Vocab
35
Updated 68d ago
0.0(0)
flashcards
Midterm
238
Updated 389d ago
0.0(0)
flashcards
Describing People SPN2 PreAP
91
Updated 221d ago
0.0(0)
flashcards
Cellular Respiration Review
22
Updated 1215d ago
0.0(0)
flashcards
apush 3.1-3.4
52
Updated 578d ago
0.0(0)
flashcards
Chapter 9 Med Term
25
Updated 1217d ago
0.0(0)
flashcards
Posterior Muscles
47
Updated 1244d ago
0.0(0)
flashcards
SALUD Y BIENESTAR vocabulario
33
Updated 913d ago
0.0(0)