CSCI 2600 Midterm Exam with
complete solutions latest version
A ______ is a way to remotely delete apps or content from devices - CORRECT
ANSWER-kill switch
(T or F) Utilitarianism emphasizes duty and absolute rules regardless of consequences -
CORRECT ANSWER-F
A branch of computer science that makes computer perform task we normally think of
that requires human intelligence - CORRECT ANSWER-Artificial Intelligence
(T/F) Ethics rules are to be followed in our interactions with other people and in our
actions that affect other people. - CORRECT ANSWER-T
(T/F) Kant ethical theory consists of 3 guiding principles: to increase happiness
regardless of consequences, one must never treat people as a means to an end, and
we should follow rules of behavior that can universally be applied to everyone. -
CORRECT ANSWER-F
(T/F) The First Amendment which describes The Freedom of Speech is an example of
positive right. - CORRECT ANSWER-F
(T/F) Rawl's belief is that an action, social, or political structure is not ethical if it has the
effect of leaving the least advantage people worse than they were before. - CORRECT
ANSWER-T
Examples of negative rights are - CORRECT ANSWER-Freedom of Speech
This Act is a privacy law that protects the vulnerable population by requiring website to
set parental permission for collecting personal information from children under 13. -
CORRECT ANSWER-Children Online Privacy Protection Act
BRAINSCAPE1
, BRAINSCAPE1
__________ allows developers of ideas to raise money in small amount from a large
number of people for charities, political cause, artistic project, and investment in startup
companies. - CORRECT ANSWER-Crowd Funding
Which of the following is NOT a key aspect of privacy? - CORRECT ANSWER-Freedom
to cover deception.
When information is put to another purpose, that is called a - CORRECT ANSWER-
secondary use of data
Any information relating to an individual person: - CORRECT ANSWER-is personal
information
The process of searching through many records in one or more databases looking for
patterns or relationships is called - CORRECT ANSWER-data mining
A 'low-tech' method of invading someone's privacy is - CORRECT ANSWER-social
engineering
Critics of privacy argue that: - CORRECT ANSWER-it allows fraud and protects the
guilty
Re-identification is accomplished through - CORRECT ANSWER-data search and
analysis tools
The Fourth Amendment to the U.S. Constitution has to do with: - CORRECT ANSWER-
search warrants
Invisible information gathering is: - CORRECT ANSWER-collection of information
without a person's knowledge
Use of personal information for a purpose other than the one for which a person
supplied it is called - CORRECT ANSWER-secondary use
___ requires that websites get parental permission before collecting personal
information of children under 13. - CORRECT ANSWER-The Children's Online Privacy
Act
Many large businesses have staffed this position to guide and oversee company privacy
policies - CORRECT ANSWER-Chief Compliance Officer
____ check for leaks of information and review the company's privacy policy and its
compliance - CORRECT ANSWER-Privacy Audits
The position that people have the right to prohibit publication of facts about themselves
and photographs of themselves is, according to Warren and Brandeis: - CORRECT
ANSWER-The principle of an inviolate personality
BRAINSCAPE1