Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Ethics for the Information Age Exam Questions with Correct Answers 100% Pass

Beoordeling
-
Verkocht
-
Pagina's
8
Cijfer
A+
Geüpload op
04-04-2025
Geschreven in
2024/2025

Ethics for the Information Age Exam Questions with Correct Answers 100% Pass Which of the following inventions were created for military applications? - Answers ENIAC and ARPANET A notable feature of the Digital Millenium Copyright Act (DMCA) was that - Answers It created a "safe haven" for internet service providers, so they are not automatically responsible when users post copyrighted things, and it made it illegal to circumvent DRM PRISM is an example of a government data collection program. - Answers True, the PRISM program utilizes extensive data mining efforts to collect information and analyze that data for patterns of terrorist or other potential criminal activity. The right to freedom of speech as protected by the 1st Amendment to the Constitution is an absolute right with no limitations. - Answers False, there are limitations on the amendment for the public good. These include child pornography, libel, obscenity, and harmful to minors material The Supreme Court has held that the Internet can be regulated like other broadcast mediums, such as television and radio - Answers False, the supreme court has ruled that the internet is not a broadcast medium, and cannot be regulated for decency like tv or radio The United States constitution does not include a right to own intellectual property - Answers True, the constitution gives the congress power to create intellectual property law, but there is no right that they create such laws. They may do so, if they think it is in the public interest—that is, if it promotes "progress in science and arts" There is no general right to privacy explicitly mentioned in the Bill of Rights, but the Supreme Court has ruled that there is a constitutional right to privacy. - Answers True [The 3rd, 4th, and 5th Amendments do include specific kinds of privacy rights, but the Supreme Court has ruled that we have a more general right to privacy that can be inferred from these specific rights.] Which of the following are factors used to determine whether a person's use of a work (e.g., music, film, book, software code) is fair use? - Answers Nature of the work (fact or fiction), Purpose of the use (educational or commercial), Amount and substantiality of work used (short clip, whole film), Impact of your use on the market for the work Which of the following are problems that have arisen due to new Networked Communication technologies? - Answers Cyberbullying, internet addiction, Spam Privacy - Answers The claim of individual, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others. Three elements of Solove's Taxonomy of Privacy? - Answers 1.) Collection (grocery stores and loyalty cards) 2.) Processing (Amazon using data mining to figure out what sort of music you prefer) 3.) Dissemination (Facebook sharing your profile with advertisers) What is meant by an opt-in privacy policy? - Answers An opt-in policy means that the company will not collect or disseminate information on or to you, unless you agree. When Facebook makes a default setting private, but allows you to make it public, that is an "opt-in" scenario. What are the three values of privacy described in the lecture and what theories are the derived from? - Answers Three values of privacy described in the lecture are: safety or protection from harm (utiliatarianism), autonomy (kant), intimacy (virtue theory) Which of the following reject subjective relativism? - Answers It makes the actions of Hitler and Mother Teresa equal, It blurs the lines between what you want vs. what you should do John Rawls - Answers Says that we should put the least well of individuals first, difference principle. Cultural Relativism - Answers What is "right" and "wrong" depends on society's moral guidelines. Kantianism - Answers People's actions should be guided by moral laws that are universal. This is derived through a reasoning process, "What is good without qualification" Follows a moral rule because it is in accord with the categorical imperative Rule Utilitarianism - Answers An ethical theory that holds we ought to adopt those morals, which if everyone followed, everyone would be happy. Universal adoption= greatest happiness Categorical Imperative - Answers From Kant, wants to act only from moral rules that you can at the same time make universal 2nd Formulation - Answers From Kant, act so you treat both yourself and others as ends in themselves and never only as a means to an end Social Contract Theory - Answers Rules that are mutually beneficial to society, set of rules governing how people should treat one another , Hobbes Jeffery Reiman's view on internet addition - Answers Addicts behavior makes sense if the addict has no hope for a better future, society bears responsibility for putting people in hopeless situations

Meer zien Lees minder
Instelling
Ethics For The Information Age
Vak
Ethics for the Information Age

Voorbeeld van de inhoud

Ethics for the Information Age Exam Questions with Correct Answers 100% Pass

Which of the following inventions were created for military applications? - Answers ENIAC and ARPANET

A notable feature of the Digital Millenium Copyright Act (DMCA) was that - Answers It created a "safe
haven" for internet service providers, so they are not automatically responsible when users post
copyrighted things, and it made it illegal to circumvent DRM

PRISM is an example of a government data collection program. - Answers True, the PRISM program
utilizes extensive data mining efforts to collect information and analyze that data for patterns of
terrorist or other potential criminal activity.

The right to freedom of speech as protected by the 1st Amendment to the Constitution is an absolute
right with no limitations. - Answers False, there are limitations on the amendment for the public good.
These include child pornography, libel, obscenity, and harmful to minors material

The Supreme Court has held that the Internet can be regulated like other broadcast mediums, such as
television and radio - Answers False, the supreme court has ruled that the internet is not a broadcast
medium, and cannot be regulated for decency like tv or radio

The United States constitution does not include a right to own intellectual property - Answers True, the
constitution gives the congress power to create intellectual property law, but there is no right that they
create such laws. They may do so, if they think it is in the public interest—that is, if it promotes
"progress in science and arts"

There is no general right to privacy explicitly mentioned in the Bill of Rights, but the Supreme Court has
ruled that there is a constitutional right to privacy. - Answers True [The 3rd, 4th, and 5th Amendments
do include specific kinds of privacy rights, but the Supreme Court has ruled that we have a more general
right to privacy that can be inferred from these specific rights.]

Which of the following are factors used to determine whether a person's use of a work (e.g., music, film,
book, software code) is fair use? - Answers Nature of the work (fact or fiction), Purpose of the use
(educational or commercial), Amount and substantiality of work used (short clip, whole film), Impact of
your use on the market for the work

Which of the following are problems that have arisen due to new Networked Communication
technologies? - Answers Cyberbullying, internet addiction, Spam

Privacy - Answers The claim of individual, groups, or institutions to determine for themselves when,
how, and to what extent information about them is communicated to others.

Three elements of Solove's Taxonomy of Privacy? - Answers 1.) Collection (grocery stores and loyalty
cards) 2.) Processing (Amazon using data mining to figure out what sort of music you prefer) 3.)
Dissemination (Facebook sharing your profile with advertisers)

, What is meant by an opt-in privacy policy? - Answers An opt-in policy means that the company will not
collect or disseminate information on or to you, unless you agree. When Facebook makes a default
setting private, but allows you to make it public, that is an "opt-in" scenario.

What are the three values of privacy described in the lecture and what theories are the derived from? -
Answers Three values of privacy described in the lecture are: safety or protection from harm
(utiliatarianism), autonomy (kant), intimacy (virtue theory)

Which of the following reject subjective relativism? - Answers It makes the actions of Hitler and Mother
Teresa equal, It blurs the lines between what you want vs. what you should do

John Rawls - Answers Says that we should put the least well of individuals first, difference principle.

Cultural Relativism - Answers What is "right" and "wrong" depends on society's moral guidelines.

Kantianism - Answers People's actions should be guided by moral laws that are universal. This is derived
through a reasoning process, "What is good without qualification" Follows a moral rule because it is in
accord with the categorical imperative

Rule Utilitarianism - Answers An ethical theory that holds we ought to adopt those morals, which if
everyone followed, everyone would be happy. Universal adoption= greatest happiness

Categorical Imperative - Answers From Kant, wants to act only from moral rules that you can at the
same time make universal

2nd Formulation - Answers From Kant, act so you treat both yourself and others as ends in themselves
and never only as a means to an end

Social Contract Theory - Answers Rules that are mutually beneficial to society, set of rules governing
how people should treat one another , Hobbes

Jeffery Reiman's view on internet addition - Answers Addicts behavior makes sense if the addict has no
hope for a better future, society bears responsibility for putting people in hopeless situations

Four types of intellectual property - Answers 1.) Trade secret (not regulated, valid as long as one keeps it
safe) 2.) Trademark (as long as company uses and protects it) 3.) Patent (20 years, patent office) 4.)
Copyright (life of author plus 70 years, 120 years for corporations)

Problems with IP include - Answers Patent trolls, copyright creeps. Both are inconsistent with the
rationale for IP which is to create an incentive for creation and use

Transformative uses - Answers Fair use, Nathan for You, include parody and satire

Digital Rights Managment - Answers Actions owners of intellectual property in digital form take to
protect their rights by changing technology. These may include encryption, digital watermarking, CD's
not being able to be copyrighted

Geschreven voor

Instelling
Ethics for the Information Age
Vak
Ethics for the Information Age

Documentinformatie

Geüpload op
4 april 2025
Aantal pagina's
8
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$10.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
TutorJosh Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
440
Lid sinds
1 jaar
Aantal volgers
16
Documenten
31720
Laatst verkocht
5 dagen geleden
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.5

73 beoordelingen

5
26
4
16
3
14
2
1
1
16

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen