CSCI 3200: Ethics in Computer Science - Quizzes 1-6 Open-Ended Questions ONLY

0.0(0)
studied byStudied by 7 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/58

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

59 Terms

1
New cards

The _____ theory that is considered for modern ethical frameworks is derived from the Greek word meaning goal or end.

teleological

2
New cards

A _____ implies a requirement that the holder of this right be provided with whatever one needs to pursue one's legitimate interests.

positive right

3
New cards

The need to consider the interests and perspectives of the affected parties in assessing alternative action plans, the other's moral and legal rights, and our duty to treat the other as an end and not as a means, all stand in opposition to the dangerous and myopic philosophy of _____, which is blind to the rights and aspirations of others.

ethical egoism

4
New cards

The ethical theory proposed by _____ has three major characteristics: it is ontocentric, ecological, and patient-oriented.

Floridi

5
New cards

The ethical theory developed by _____ has three major characteristics: ontocentric ethics, ecological macroethics, and information ethics.

Floridi

6
New cards

The ethical theory of _____ is commonly used in biomedical ethics to constitute prima facie duties, and has become popularized through the work of Beauchamp and Childress.

principlism

7
New cards

The First Principle of Morality states: keep one's choices open to _____, the fulfillment of all persons and communities.

integral human fulfillment (IHF)

8
New cards

One principal of practical reason is the norm forbidding the taking of _____.

innocent life

9
New cards

_____ works by breaking up a message into fixed-sized units.

Package switching

10
New cards

_____ establishes a unique numeric address for each system connected to the internet.

IP

11
New cards

The heart of the internet's original design is a network architectural standard that was first called the _____ principle, where intelligence is located at the ends but not in the network itself.

end-to-end

12
New cards

The last three letters of a web address indicate a(n) _____ identification, such as .edu stands for education.

top-level

13
New cards

Because search algorithms are proprietary technology, the opacity of the search process threatens the ideal of equal and fair access to _____ information.

objective

14
New cards

Because Google used a(n) ___ search technology that provided better results and was free of spam, it quickly became the favorite search tool.

PageRank

15
New cards

Google's dominance has concerned regulators that Google will _____ internet search and use that as a lever to gain control over other online industries.

monopolize

16
New cards

The fundamental question regarding search engine technology is whether users are getting _____ results when they initiate a search.

unbiased

17
New cards

Because users such as NASA rely on this tool for communications, _____ is primed to become the "epicenter of the Web."

Twitter

18
New cards

Facebook and Twitter are examples of ___.

Social Networks

19
New cards

A challenge facing university administrators is their hesitation to ___ on social apps, even when offensive content is posted.

censor content

20
New cards

Because the internet was designed as a(n) _____ global technology, it is difficult for governments to enforce laws or restrictions.

borderless

21
New cards

_____ handles ordinary and routine technical matters such as the determination of technical standards and the management of domain names and IP addresses.

governance

22
New cards

Due to strong _____ programs, it is more difficult for the state to conduct surveillance on confidential electronic communications.

encryption

23
New cards

Companies such as Facebook and Google rely largely on lucrative _____ of their users.

personal information

24
New cards

Mobile devices have opened a new controversy about access to adult sites. ____ is a company that censors apps, and they will not allow for availability any apps that have pornographic content.

Apple

25
New cards

Freedom and free expression are fundamental human rights, but these and other rights can only be reasonably exercised in a context of mutual respect and common acceptance of certain moral norms, which are often referred to as the ____.

public morality

26
New cards

Some philosophers argue that playing vivid video games cultivates insensitivity to human suffering and a lack of ____.

empathy

27
New cards

Unlike obscenity and libel, ____ is not illegal under U.S. federal law and is fully protected by the First Amendment.

hate speech

28
New cards

____ has helped many bottom-up movements like Black Lives Matter and the Tea Party to mobilize their members.

Twitter

29
New cards

By encrypting a message and routing that message through a series of remailers, a user can ensure that his or her message will remain _____.

anonymous and confidential

30
New cards

_____ is defined as the "coordinated production of information by an authority with the intent of competing with or distracting from information the authority would rather not access."

Flooding

31
New cards

_____ censorship is a type of incomplete censorship used in China to avoid more obvious repression that would likely ignite popular backlash.

Porous

32
New cards

Copyright laws allow for _____ where copyrighted literary works can be quoted and a small segment of a video work can be displayed for limited purposes such as classroom instruction.

fair use

33
New cards

To be eligible for a(n) _____ the invention must be a process, machine, or composition of matter that is unknown or unused by others before being awarded.

patent

34
New cards

The Copyright Term Extension Act extends the term for copyright protection another _____ years.

20

35
New cards

An issue that had not been fully addressed in prior acts, but was singled out in the Digital Millennium Copyright Act, is the _____ liability, the liability of third parties for copyright infringement of others.

intermediary

36
New cards

To state the _____ theory more simply, we should provide enough intellectual property protection to serve as an inducement for future innovation.

utilitarian

37
New cards

_____ is software such as Adobe's Acrobat Reader that is distributed with the source code at no charge.

Freeware

38
New cards

A(n) _____ license allows a user to redistribute the open source code with modifications or enhancements, but only under the same open source license under which that user received that code.

copyleft

39
New cards

Because MP3 files are unsecured, they can be distributed easily through the internet and lead to the potential for _____, the illegal copying and distributing of music.

piracy

40
New cards

When someone registers a domain name like googlesucks.com, the practice is referred to as _____.

cyber griping

41
New cards

Because many of the new business patents were for online business methods, they became known as _____.

Cyberpatents

42
New cards

A prominent technology that gives content providers enhanced control over their material is known as _____, where content providers distribute work in cyberspace in an encrypted form accessible only by users with this type of hardware or software.

trusted systems

43
New cards

Individuals need _____ over their personal data to ensure restricted access to it.

Control

44
New cards

A(n) _____ is placed across a network of related sites so that users' movements can be tracked not just within a certain site but within any site that is part of this network.

Third-party cookie

45
New cards

_____ are small data files that are written and stored on the user's hard disk drive by a website to track the user when the user visits that site.

Cookies

46
New cards

The _____ approach for protecting consumer privacy is when individuals explicitly approve secondary uses of their personal data.

Opt-in

47
New cards

This type of controversial tracking system, a(n) _____, is placed across a network of related sites so that the movements of users can be tracked not just on the initial site but on all related sites of that network.

third-party cookie

48
New cards

_____ is when an email is sent to a user that looks authentic but takes them to a link where they are asked to enter sensitive personal information.

Phishing

49
New cards

A(n) _____ is a self-replicating program usually hidden away in another host program or file that can disrupt a computer.

Virus

50
New cards

_____ travel automatically from one computer to another across network connections.

Worms

51
New cards

The two types of malware that form ransomware are the _____ designed to spread from one computer to another and the _____ that is delivered by it. Note: Separate the two answers with a semicolon (;).

worm; encrypting software

52
New cards

_____ involves the unauthorized duplication of proprietary software and the distribution or making available of those copies over the network.

Software piracy

53
New cards

Embedded in iTunes is a Digital Rights Management tool called ____ that limits the distribution of iTunes music.

fairplay

54
New cards

A(n) _____ combines hacking and political activism.

hacktivist

55
New cards

____ break into computer systems to steal data or plant worms.

Hackers

56
New cards

_____ filtering has emerged as a tool to stop DoS attacks because of the ability to filter incoming and outgoing packets.

Router-based

57
New cards

When using a key management infrastructure system, a certification authority functions as a digital _____ to verify the identity of the individual associated with a given key.

notary public

58
New cards

Because governments have been apprehensive about exporting sophisticated encryption systems due to the worry of international terrorism, governments have sought to gain a sort of regulation through _____ access.

backdoor

59
New cards

The United States has retreated from its impulse to regulate _____ but there is no guarantee that it will not impose new regulations.

encryption