cs stuff
Which describes a fundamental or basic conceptual problem with granting software patent introduced by the Supreme Court and in the Alice case?
All software requires generic computers to perform generic computer functions
Which type of ethical theory focuses on one's duties and the rights of others, a priori moral obligations, and suggests that ends do not justify the means?Representatives are Captain America and Immanuel Kant.
Deontology
Match the items with the best description
Electronic Frontier Foundation Correct match:Opposes DRM Creative Commons Correct match:Personal digital copyright Google Library Project Correct match:Digital card catalog of all books
The FCC classified Internet Service Providers as common carriers for the purpose of enforcing net neutrality.
Open Internet Order
NPI and PPI distinguish between types of which of the following?
Personal Information
According to much of the neuromarketing research, one particular part of the brain is responsible for most of the (buying) decisions consumers make. Which best describes that understanding?
The amygdala (reptilian) has more influence on the cortex than the cortex has on the amygdala.
Which of the following does NOT represent a typical source of measures used in neuromarketing research?
Preference Survey
Match the term and definition.
Principles of right action (of a group). a standard of social behavior expected of a group; the normal. usual typical or standard. Correct match:Norms Relating to a standard or norm, especially of behavior. Correct match:Normative Verifiable by observation or experience. Correct match:Empirical
Which represent a set of stimuli for the reptilian brain applied in neuro-marketing as described by Patrick Renvoise?
Self-centered, Contrast, Beginning & End
Which two neuro-chemicals were the focus of decision-making research discussed by Molly Crockett? Select one from the choices below.
Serotonin and Tryptophan
Which of the following does NOT prevent you from patenting your idea?
Someone else thought of the idea first
Which aspect of the First Amendment is the LEAST closely connected with privacy?
The Right to Assemble
Which of the following is true of privacy and the Wiretap Act?
The Wiretap Act provides for suppression of evidence and civil cause of action for unlawful wiretap
Our norms of privacy refer to five independent parameters. Match the description with the best label for the data parameter.
The person the data is about Correct match:data subject The entity that directed or provided the data Correct match:data sender The entity that accepted or admitted the data Correct match:data recipient The kind of information (health or behavioral or demographic) Correct match:information type How the data was transferred Correct match:transmission principle
Which type of ethical theory judges actions according to the principle of the greatest happiness given to the greatest number? Representatives are Iron Man, John Stuart Mills, and Jeremy Bentham.
Utilitarianism (Consequentialism)
Which type of ethical theory focuses on the character of individuals and good character traits from the kinds of habits they develop? Representatives are Thor and Aristotle.
Virtue Ethics
Match the description with the Internet infrastructure term which best describes it
Where one internet operation connects directly to another so that they can trade traffic such as an ISP and content provider like Google. Correct match:Peering Transit network provider: network that accesses every other network on the Internet without purchasing IP transit Correct match:Tier 1 Uneven distribution in Internet or digital access among different groups based on socio-economics geography or related demographics. Correct match:Digital Divide
What does Acquisti mean when he says transparency with personal data is necessary but not sufficient?
You can be transparent and still violate our norms of privacy.
A person's
being left alone physically -- freedom from intrusion into one's physical space. Correct match:Accessible freedom from interference in their choices. Correct match:Decisional control over the flow of their personal information including the transfer and exchange of that information. Correct match:Informational
Match the description with the name of the theory of consciousness from the field of Neuroscience
1 Consciousness is something we do. It is active cause-effect relationships in physical systems rather than passive reception like a movie on a screen. Correct match:Integrated Information theory 2 Consciousness is analogous to memory. The streams of information from memory in the brain is consciousness. Consciousness is like present memory. Correct match:Global Work Space Theory
Match the name with the description of the dark pattern.
1 You set out to do one thing but a different undesirable thing happens instead. Correct match:Bait and Switch 2 When free trial ends and your credit card is charged without warning e.g. when it is difficult to cancel a membership. Correct match:Forced Continuity 3 The design makes it very easy for you to get into a certain situation but hard to get out of it (e.g. a subscription). Correct match:Roach Motel The web site automatically adds an item often through the use of an opt-out radio button. Correct match:Sneak into Basket
When did the courts clarify that the Copyright Act gave computer programs the copyright status of literary works?
1983
According to experts, non-verbal communication accounts for (over) what percentage of what we communicate with others?
90
According to John Rawls' ideas of just as fairness in A Theory of Justice, which best matches to the terms?
A fair and impartial point of view Correct match:Original Position Blocking all knowledge of personal circumstances Correct match:Veil of Ignorance
Match terms with the statements that best describes them.
A user interface that has been carefully crafted to trick users into doing things such as buying insurance with their purchase or signing up for recurring bills. Correct match:Dark Pattern A subset of UX that applies psychological principles of influence and decision-making in a consumer context to the design of compelling user interactions. Correct match:Persuasive Design Device designs that hide their function so that they do not operate as assumed by the user such as "close door" elevator or crosswalk call buttons that do nothing. Correct match:Deceptive Design
Choose the BEST answer. Which can be used as a trademark for a software product or company?
All of the above
Which of the following statements characterizes "privacy" as discussed? Choose the BEST answer.
All of the above
Match the description of communication technology with the term that best describes it
Allows for lost or corrupted and self routing data Correct match:Packet Switching Requires constant connection between sender and receiver Correct match:Circuit Switching
Which case or principle allows warrants for wiretap of phone calls by law enforcement and which restricts such warrants?
Allows wiretap Requirement of physical intrusion Olmstead v. US (1928) ruling Restricts warrant for wiretap Katz test (societal expectation of privacy) Katz v. US (1967) ruling
Which TWO (2) factors are most critical to determining whether a UI or design is a "deceptive design" rather than merely a persuasive or just a bad design?
Balance between benefit to the user and benefit to the designer or business interest. Awareness of choices or decisions being made through the UI or process
What does the "on-sale bar" for patents do?
Bars the patenting of items offered for sale
Which of the following is true of copyright?
Begins automatically when the work is created
Daheane, Lau, and Kouider (2017) suggest that AI distinguish between two uses of the term "consciousness" that describe two different types computations that humans do. Match the kind of consciousness with the best description.
Being aware of something having some information in mind in order to act on it. Correct match:C1 (The first kind of "consciousness") Reflexive and self-referential - like self-awareness or self-monitoring or introspection and subjective experience. Correct match:C2 (The second kind of "consciousness")
Match the examples of data mining techniques to the name or term
Buying habits or market segments Correct match:classes and clusters of data Probability that items are purchased together or subsequently Correct match:associations and sequential patterns Model mutation and natural selection to discover new patterns in the data Correct match:Genetic algorithms Extracts rules based on statistical significance Correct match:Rule induction
Which of the following is NOT cited as a criticism of codes of ethics in the text?
Codes of ethics do not distinguish the features of the technology and the ethical issue.
A person or company that transports goods or people and that is responsible for any possible loss of the goods during transport, e.g. public airlines, railroads, bus lines, taxicab. A service that cannot discriminate, or refuse service, unless there is some compelling reason.
Common Carrier
Title II services refer to which of the following
Common carriers like telephone, gas, and electricity providers which are often considered utilities.
Established the regulation of telecommunications carriers by the Federal Communications Commission (FCC).
Communications Act of 1934
Match the particular cognitive biases with the type of bias they best exemplifies.
Confirmation Anchoring Availability Correct match:Decisional Authority Conformity Association Correct match:Social Bizarreness Egocentric Fading Correct match:Memory
Which statement best describes "the hard problem of AI"?
Consciousness and self awareness
Which two (2) are NOT factors needed to evolve trust in the game theory simulation The Evolution of Trust?
Cooperation Forgiveness
Order the following Trademark brand names from distinctive (fanciful) to generic.
Correct Order Answer: Kodak Correct Order Answer: The Weather Channel Correct Order Answer: Milk
Sort the following technologies in order of development and dependency from earliest to latest. - Earliest at the TOP - Latest at the BOTTOM
Correct Order Answer: Packet Switching Correct Order Answer: TCP/IP Correct Order Answer: Internet Correct Order Answer: HTML
Maslow's Hierarchy Order with the most basic need on top:
Correct Order Answer: Physiological (food & shelter) Correct Order Answer: Safety (security) Correct Order Answer: Sociality (belonging & friendship) Correct Order Answer: Esteem (accomplishment) Correct Order Answer: Self-fulfillment (creation)
"Mirroring" can be an easy and safe guide to appropriate eye contact, behavior, and posture. Which of the following describes what it means?
Correct answer: Adopting the same posture or behaviors as the other person.
Choose the best definition or description of "persuasive design" from the choices below.
Correct answer: Design that applies psychological principles of influence and decision-making in compelling user interactions
Which of the following is NOT an access type mentioned that can be controlled by DRM?
Correct answer: Digital Rights Management
Which is NOT one of the four primary functions of codes of ethics described in the text?
Correct answer: Enrich
In the United States, computer programs are protected under the definition of which type of "works" according to the Copyright Act, 17 U.S.C. § 101?
Correct answer: Literary Works
Which statement best characterizes the relationship between privacy and security discussed here?
Correct answer: Privacy and security are in tension. We often balance these forces
Which statement best describes Tavani's conclusion about the CEIU claim?
Correct answer: We should tentatively accept the traditionalists position
The measure of a society is not how it treats its good, compliant citizens, but how it treats its
Correct answer: dissidents
According to Amy Cuddy's work studying body language, posture affects the release of two hormones that are used to measure stress and confidence. Which two hormones were measured in this study?
Cortisol and Testosterone
Which of the following is NOT a DRM technology described?
Decryption
Match the type of design to the best description
Design that tricks a user Correct match:Deceptive Design Design that uses psychology to influence a users decision-making Correct match:Persuasive Design Non functional devices often designed to the satisfy the user by giving some sense or delusion of control to occupy and placate. Correct match:Placebo button (or design)
Which made it illegal to make technology to circumvent copyright measures?
Digital Millennium Copyright Act (DMCA)
For Tavanai, a "new ethical issue" is a new issue involving ethics.
False
Google is required to index and/or include your content in its search results.
False
Match the type of AI with the best description
Focuses on cognitive representation Correct match:Analytical AI Focuses on cognitive and emotional intelligence Correct match:Human-Inspired AI Focuses on the broadest range including cognitive and emotional and social intelligence Correct match:Humanized AI
Match the item with the best description
Forces agencies to tell how they collect information Correct match:Freedom of Information Act Requires permission to share personal information Correct match:Privacy Act Protects right to view explicit material in private Correct match:Stanly v. Georgia (1969) Requires decisional privacy Correct match:Democratic process
Choose the best category for the type of information
HPICorrect answer:medical test resultsCorrect answer:treatment informationCorrect answer:prescription informationCorrect answer:diagnosis CategoryeHPICorrect answer:digitally stored medical recordsCorrect answer:online prescription CategoryNot HPICorrect answer:health information in employment recordsCorrect answer:health information stripped of personally identifiable informationCorrect answer:personal appearance such as hair and eye color
Which is clearly MOST consistent with Net Neutrality? Choose the best answer.
ISP treating all data on the Internet the same
Choose the BEST answer. Copyright protects all original works EXCEPT:
Ideas, Concepts
Which is NOT one of the 4 torts of privacy?
Inferring private information from public
Which is NOT one of the four torts of privacy?
Inferring private information from public
Which statement best characterizes the principle which guides U.S. policy regarding ownership of (personal) information (data)?
Information is property
Match the item with the description related to data mining
Involves surveillance, cookies, and tracking Correct match:Data-gathering Exchange of data between different databases to find connections Correct match:Data-merging, matching, and aggregation Analyzes data for patterns to generate, extrapolate, or infer new information Correct match:Data-mining
Match the description of the method to optimize for non-discrimination to the name that relates to it.
Irrelevant to the outcome Correct match:Demographic parity Conditional on the outcome Correct match:Equalized odds Conditional on the predictor Correct match:Well-calibrated system
Which is true of Open Source software, according to Yochai Benkler?
It is NOT an economically viable mode of production
According to body language experts, what do these imply about a subject or interviewee?
Leaning slightly forward Correct match:Interested and engaged Crossed arms and/or legs Correct match:Guarded or protective or reserved Leaning back in chair with both hands clasped behind head Correct match:Analytical mood or gesture of superiority Rubbing or touching nose when answering a question Correct match:Not telling the complete truth
Match the description with the best category or label of the type of machine learning algorithm
Maps an input to a known output for a data set Correct match:Supervised Algorithms Data is modeled according to inherent clusters or associations Correct match:Unsupervised Algorithms Some data is labeled giving descriptive and predictive outcomes Correct match:Semi-supervised Algorithms Uses positive and negative reward signals Correct match:Reinforcement Algorithms
Distinguish ethical and psychological egoism by matching the terms with the best description:
Morality cannot consist in altruistic or selfless actions which come about as the result of free choice. Such actions are not possible. Every action is selfish. Correct match:Psychological Egoism We are capable of making free choices and acting from altruistic motives; however we should not act freely and make choices which aim to benefit others. Right actions seek to promote one's own self-interest. Correct match:Ethical Egoism
There are TWO basic requirements for software to be patent eligible. The invention should be which of the following. Choose BOTH (two) requirements below:
More than an "abstract idea" "Transform" the abstract idea into a patent-eligible application
Choose the best category (NPI or PPI) for the type of information
NPICorrect answer:HPICorrect answer:Political affiliationCorrect answer:Health information CategoryPPICorrect answer:Social media postCorrect answer:Real estate purchaseCorrect answer:Residence
Tavani (2002) argues that which of the following requires a new ethical rule or theory?
Neither (necessarily) requires new ethical rules or theory
Neuroscientists consider three different types or levels of brain activity to describe how we make decisions, such as buying decisions. Match the part of the brain with the best description.
Neocortex Correct match:Rational Middle Brain Correct match:Emotional Reptillian Brain Correct match:Instinctual
Which of the following elements is NOT a regulatory force according to the "Lessig Model" or "Pathetic Dot Theory"?
Net Neutrality
Which best describes "moral relativism"?
No universal standard of morality is possible because different people have different beliefs about what is right and wrong.
Which of the following statements accurately describes the intersection of First Amendment and privacy.
None of the above
According to Nissenbaum 1998 (Protecting Privacy in an Information Age: The Problem of Privacy in Public), there are three main reasons privacy in public has been ignored. Match the reason with the best description of it.
Privacy in public is like a paradox or an oxymoron. Correct match:Conceptual The "knock-down" argument: There is no expectation of privacy in public. Correct match:Normative The issue was not compelling until now with technologies available today. Correct match:Empirical
Contextual Integrity consists of what four (4) four essential descriptive claims? Match the description with the phrase that best completes it.
Privacy is provided by appropriate ... Correct match:flows of information Appropriate flows of information are those that conform with ... Correct match:contextual information norms Parameters of contextual information norms include ... Correct match:data subject and information type Conceptions of privacy are based on ethical concerns that ... Correct match:evolve over time
Match the type of intellectual property to the best definition, description, or characterization.
Protection for original works fixed in a tangible medium. This protect the owners right to reproduce or distribute or perform or display or prepare derivative works Correct match:Copyright A grant by the government of a right to exclude others from practicing a particular invention for a set period of time. This covers processes or machines and articles of manufacture. Correct match:Patent Any word or name or symbol or device used to identify and distinguish their goods or services from those made and sold by others. This covers product shapes and picture of a person or character. Correct match:Trademark
What are TWO senses of "dark" connoted in the concept of "dark pattern". Select TWO choices below.
Psychological Moral
Categorize the type of information generally as private, public, or both (depends).
Public Information Correct answer:Your personal appearance on the street Correct answer:Personal information from actions that are in public view Correct answer:What you buy in the grocery store Private InformationCorrect answer:Email (generally)Correct answer:Phone mail messages (generally)Correct answer:Personal information where there is clear expectation of privacy CategoryPublic and/or Private (it depends)Correct answer:Phone call in publicCorrect answer:Personal information
Match the description with Net Neutrality related term that best describes it
System that does not filter or throttle data traffic Correct match:Dumb Pipes Capability of ISPs to manage data without degradation of data flow Correct match:Provisioning (or over-provisioning) ISPs deliberately slowing or delay data according to data type or protocol Correct match:Throttling The (application) features of a system are left for the end points or nodes. Correct match:End-to-end principle
Match the term with the best description of it.
The ability to reflect on and examine one's own thinking and biases. Correct match:Reflexivity A process that calls itself or a similar process. When something is defined in terms of itself. Correct match:Recursion
Which of the following claims was advanced by Molly Crockett in the TED Talk.
The benefits of "neuro-enhancements" are not proven scientifically
Which of the following best describes the term "affordances" coined by Don Norman in "The Design of Everyday Things"?
The property of an object that defines its possible uses or makes clear how it can or should be used
In Adam Grant's work, Give and Take, several interesting findings and ideas and discussed. Which is NOT one that was mentioned in the review?
The three types of (professional) team members: Givers, Takers, and Receivers.
"Gestalt principles" describe which of the following?
The way visual information is grouped in terms of features like proximity, similarity, and symmetry.
Why might someone wish to violate copyright and view code in (RAM) memory?
To reverse engineer software
Match the type of intellectual property to the best definition, description, or characterization.
Trademark Correct match:Any word name symbol or device used to identify and distinguish their goods or services from those made and sold by others. This covers product shapes and picture of a person or character Patent Correct match:c A grant by the government of a right to exclude others from practicing a particular invention for a set period of time. This covers processes machines and articles of manufacture. Copyright Correct match:Protection for original works fixed in a tangible medium. This protect the owners right to reproduce distribute perform display or prepare derivative works.
Match the feature of a moral system according to Bernard Gert with the best description:
accessible to everyone Correct match:Public no authority or judge Correct match:Informal follows principles of reason Correct match:Rational does not favor any group Correct match:Impartial
In the video, Alessandro Acquisti explains how any personal information can become sensitive information. He described an experiment where they used only facial recognition to do which of the following?
all of the above
Match the different ethics level with the descriptions.
apply to individuals and individual actions Correct match:Micro ethics refer to general morals which are often part of mission statements for professional organizations. Correct match:Meso ethics refers to laws and policies and collective social responsibility of the profession Correct match:Macro ethics
Which of the following is NOT one of the four (4) principles describing the changes in FCC stance on the Telecommunications Act of 1996?
consumers are entitled to access any Internet content of their choice.
Match the description to the best fitting term:
ethical hacking for example computer security experts and testing specialists who focus on penetration and related testing of computer and information systems. Correct match:White hat hacking unauthorized access to systems usually with malicious or criminal intent or developing and releasing destructive malware and holding computers hostage and stealing password and credit card and other personal information. Correct match:Black hat hacking the use of computing in violating laws and unauthorized access or crossing ethical boundaries but without malicious intent. Correct match:Grey hat hacking using computer hacking to engage civil disobedience and social change. Correct match:Hacktivism those that use computing for fear or terrorism and information warfare to spy or deceive and disrupt computer and information systems. Correct match:Cyber-Terrorism computer and information tactics to spy deceive and disrupt computer and information systems and in conventional warfare to disrupt and take down enemy computer systems and targets. Correct match:Cyber-Warfare
Which Amendment in the Bill of Rights for the US Constitution explicitly guarantees the right to privacy?
none
The 5th Amendment (self incrimination) has been invoked to protect certain personal private computer information. What is a key example?
passwords
According to criticisms, ethical codes rest on a series of confusions that are both "intellectual and moral." Choose the word that completes the statements describing the the following key criticism: Giving codes a disciplinary function makes them more like ____ than ____.
policies and laws (legal), ethical rules
Match the type of code with the best description.
refer to general morals which are often part of mission statements for professional organizations. Correct match:Codes of ethics refer to the guidelines used in the course of particular work in a profession such as the interaction between the professionals and their clients or engineering oversight and specification Correct match:Codes of practice refer to attitudes and behaviors in professional settings such as sexual harassment or privacy or discrimination Correct match:Codes of conduct
For Immanuel Kant, we come to our knowledge of morality by way of which kind of propositions (like categorical moral imperatives)?
synthetic a priori (intuitive, yet informative)