Ethics and Privacy Concerns Quiz
Which of the following are correct statements regarding credit monitoring? More than one answer may be selected.
-Ordering your FICO score from each major credit agency multiple times a year is an easy way to keep track of your credit score. -Soft inquiries do not affect your credit rating. -The three major credit reporting agencies are TransUnion, Equifax, and Experian.
Describe categories of intellectual property rights. More than one answer may be correct.
-patents Correct -copyrights -trade secrets
When facing an ethical decision regarding how to act, which three basic principles provide guidance?
-the Principle of Moral Rights -the Principle of Virtue -the Principle of Distributive Justice
Which intellectual property is correctly matched with the legal device or tool that protects it?
A portrait that you paint can be copyrighted.
Describe qualifications necessary to obtain a patent on an invention. More than one answer may be correct.
-To qualify for a patent, the invention must be novel, or different, from other similar inventions. -To qualify for a patent, the invention must be non-obvious, meaning that a skilled artisan would find the invention surprising or unexpected. -A patent will only be granted for something that is useful.
From the following list, select the items that are considered intellectual property and entitled to protection.
-a mural that you painted -a song that you wrote -a story that you published
Which of the following are true about privacy protection techniques? More than one answer may be selected.
-antivirus software uses a variety of techniques to identify and remove viruses and malware -a virtual private network (VPN) hides your IP address by running communications through a secure network -credit monitoring includes watching your monthly bills to look for fraudulent charges
A form of protection for original works of literature is called a trademark.
FALSE
A form of protection provided by the laws of the United States for "original works of authorship," including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a patent.
FALSE
The Act that requires that public schools and libraries must comply with Internet safety policies imposed by the government under this legislation and specifically requires all pornographic sites to include some sort of age verification is The Children's Internet Privacy Act of 2000 (CIPA).
FALSE
The Children's Internet Protection Act of 2000 (CIPA) seeks to keep children off the Internet.
FALSE
The Digital Millennium Copyright Act is the law that protects email and VoIP communications by requiring a warrant to intercept calls and messages.
FALSE
Which of the following are true about protecting big data? More than one answer may be selected.
-A data breach can cause a company great expense. -Human error causes the majority of data breaches. -An advantage of cloud storage is that it reduces the potential for human error.
Direct inquiry, indirect tracking, and third-party data purchase are three common methods of predictive analytics.
FALSE
If you are downloading a game or software onto a device, there may be an empty box asking you to check the box to agree to Terms of Use and the site's Privacy Policy. This checkbox is called an authorization box.
FALSE
Insurance companies use big data in actuarial analysis in order to better understand their customers' needs.
FALSE
Raw facts that describe the characteristics of an event, object, or set of information that can be entered into a computer are known as cookies.
FALSE
The Universalist Principle advocates for the greatest good for greatest number of people.
FALSE
The disciplinary dimension of ethical dilemmas addresses how individuals or corporations can be held responsible in case of violations of privacy or intellectual property rights.
FALSE
The federal law that protects person-to-person wire, oral, and electronic communications and also includes a variety of network crime statutes that include identity theft and unlawful access to stored communications is the Cybersecurity Information Sharing Act.
FALSE
The least that employers can do to discourage employees from misusing business computers is to use employee monitoring software and inform employees of their computer usage policies.
FALSE
The two major categories of computer ethics violations are personal activities and organizational policy violations.
FALSE
Victims of a data breach should consider purchasing antivirus software.
FALSE
When a manager thinks of someone they truly admire, whether a mentor or a historical figure, and asks how that person would decide, they are following the Universalist Principle.
FALSE
When the government grants an inventor the right to exclude others from the use of the invention for a period of time, this is called a copyright.
FALSE
What is the benefit to using a password manager? More than one answer may be selected.
It allows you to create strong, unique passwords without requiring you to remember them. It automatically completes the login procedure for you at sites where you have saved your password.
Which of the following is a benefit of antivirus software that charges a fee? More than one answer may be selected.
It includes identity theft protection and parental controls. It provides technical support.
Which Act requires all government agencies to have a plan in place in the event of a cyberattack?
Federal Information Security Management Act (FISMA)
The U.S. Constitution specifically protects freedom of speech from government censorship through the
First Amendment.
In 2013 the U.N. General Assembly adopted a resolution affirming that the rights held by people offline must also be protected online, calling for its member nations to respect the right to privacy in digital communication. Which of the following statements applies to the real-life impact of this resolution?
This sounds good, but users should be aware that digital privacy is not honored by many on the Internet.
The principle that states that when faced with an ethical dilemma a manager should choose the option that does the greatest good for the most people involved is called the
Utilitarian Principle.
Which situation involves a computer ethics violation that you should report to your employer?
You pass a coworker's computer screen and see him surfing through child pornography.
Which of the following is an example of direct inquiry?
asking a customer to fill out a survey after calling customer service
What is predicting the impact of a hurricane that is predicted to make landfall in New Orleans on a trucking route that goes from Houston, TX to Miami, FL an example of?
big data
Small text files created by websites you visit that your web browser stores on your hard disk are called
cookies
Which of the following determines the interest rate you'll be charged when you want to borrow money?
credit report
Cyber criminals often demand ________ as a ransom payment because this type of money is difficult to trace and accessible through any Internet-connected device.
cryptocurrency
Which of the following points is part of the fifth, or final, step in an ethical analysis?
cultivating the ability to defend your decision
When making an ethical analysis, you should get all the pertinent facts and then
determine the affected.
What does the third step of a five-step ethical analysis involve?
determining whether other managers have faced similar dilemmas
While a religious leader may provide guidance on how to uphold high morals, ________ provide the reasons for acting morally.
ethics
There are ________ basic principles of ethical conduct.
five
How your private data and information are used, who has access to them, which techniques and technologies protect them, and the communications and preferences surrounding how they are handled are components of Internet
privacy
Which dimension of ethical concerns would examine the issue of how playing video games relates to or influences childhood obesity?
quality of life
Which step of an ethical analysis is designed to enable a manager to obtain guidance or insights from other managers?
searching for precedents
June, an IT manager at a financial institution, learns that team member Charla has a health issue and needs to take a half day off once a week for a few months. Without violating Charla's privacy, how can June make an ethical decision that maintains a perception of fairness at a very busy time?
Following the Universalist Principle, June can remind the team that flexible hours are available to all members as long as everyone logs their total hours per week.
A form of spyware that records all actions typed on a keyboard is called a keystroke logger.
TRUE
Creative works are considered intellectual property and can be protected with copyrights, trademarks, and patents.
TRUE
In a five-step ethical analysis, the second step is to determine whom will be affected by a decision.
TRUE
Methodologies that attempt to deal with the vast amount of complex information that accumulates at high, and accelerating, velocity use big data.
TRUE
Cookies that are stored on the hard drive and are not lost when the web browser is closed are called
persistent cookies.
The Act that specifically requires all pornographic sites to include some sort of age verification is
the Children's Internet Protection Act of 2000 (CIPA).
Which principle of ethical conduct calls for allocating rewards equitably according to individuals' productivity?
the Principle of Distributive Justice
When a decision maker considers what a highly moral person would do when faced a particular question, which principle of ethical conduct is in play?
the Principle of Virtue
Of the following principles, which states that a manager must attempt to determine if a decision is fair for all employees involved?
the Universalist Principle
Of the principles of ethical conduct, one is said to be similar to a cost-benefit analysis. Which of the following principles does this description fit?
the Utilitarian Principle
From the following list, select the activities that are both violations of workplace computer ethics and illegal.
-computer scams launched from work computers -software piracy using an employer's computer network
________ software allows managers to take control of an employee's computer remotely and record the computer's mouse and keyboard entries.
Remote desktop
One way to stay safe while browsing the Internet is to use a VPN. VPN stands for virtual private network.
TRUE
Using cookies to follow someone's browsing habits is a form of data collection called indirect tracking.
TRUE
Which of the following is the first of the five steps in an ethical analysis?
getting the facts
When conducting a five-step ethical analysis, the first step in the process is
getting the facts.
A wi-fi tracker following a shopper's path within a store is an example of what kind of data collection?
indirect tracking
Music files and video games are examples of what kind of property in the eyes of the law?
intellectual property
What is the fourth step in a five-step ethical analysis?
listing options
Managers can encourage employees to act less than ethically through which of the following ways? More than one answer may be correct.
-by acting unethically themselves -by not enforcing strong ethical behavior
Which browser settings should you consider adjusting? More than one answer may be correct.
-deleting cookies -blocking or customizing your cookie settings -deciding from which sites you want to allow cookies
From the following list, select all the effective methods of encouraging ethical computer use in the workplace.
-employee monitoring software -remote desktop software -setting a good example
Which of the following are examples of the direct inquiry method of data collection? More than one answer may be selected.
-ordering food delivery via a smartphone app -registering an account for a new social media platform
What is an example of something that may be copyrighted? More than one answer may be correct.
-sculptures -choreography
Which of the following describes why a credit institution would use big data? More than one answer may be selected.
-to anticipate the likelihood of loan default -to accurately report credit ratings -to sell to other corporations
How have businesses reduced the likelihood of experiencing a data breach?
moving data storage to a cloud service provider such as Amazon Web Services
You own a pool installation business and need a list of high-income houses with large backyards. You buy the list from a data marketing company. What is this called?
third-party data purchase
A type of cookie, sometimes called a transient cookie, that is not stored but just kept in memory when a user visits a website is called an authentication cookie.
FALSE
Cookies stored on your device's hard drive and remain even if your computer has been restarted are called authentication cookies.
FALSE
To address the ethical concerns surrounding ________, many employee handbooks state that the organization must use data responsibly and always respect privacy.
information privacy rights
When making an ethical analysis, what is the last thing a manager should do before making a decision and preparing for the consequences?
listing options
Which type of cookie is lost only if deleted or if is created with an expiration date?
persistent cookie
Data that is traditionally used in commercially available relational databases, where the data resides in a fixed field and can easily be queried is called big data.
FALSE
Which Act outlines a plan to protect government information and assets against cyberthreats?
Federal Information Security Management Act (FISMA)