cs stuff

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which describes a fundamental or basic conceptual problem with granting software patent introduced by the Supreme Court and in the Alice case?

All software requires generic computers to perform generic computer functions

Which type of ethical theory focuses on one's duties and the rights of others, a priori moral obligations, and suggests that ends do not justify the means?Representatives are Captain America and Immanuel Kant.

Deontology

Match the items with the best description

Electronic Frontier Foundation Correct match:Opposes DRM Creative Commons Correct match:Personal digital copyright Google Library Project Correct match:Digital card catalog of all books

The FCC classified Internet Service Providers as common carriers for the purpose of enforcing net neutrality.

Open Internet Order

NPI and PPI distinguish between types of which of the following?

Personal Information

According to much of the neuromarketing research, one particular part of the brain is responsible for most of the (buying) decisions consumers make. Which best describes that understanding?

The amygdala (reptilian) has more influence on the cortex than the cortex has on the amygdala.

Which of the following does NOT represent a typical source of measures used in neuromarketing research?

Preference Survey

Match the term and definition.

Principles of right action (of a group). a standard of social behavior expected of a group; the normal. usual typical or standard. Correct match:Norms Relating to a standard or norm, especially of behavior. Correct match:Normative Verifiable by observation or experience. Correct match:Empirical

Which represent a set of stimuli for the reptilian brain applied in neuro-marketing as described by Patrick Renvoise?

Self-centered, Contrast, Beginning & End

Which two neuro-chemicals were the focus of decision-making research discussed by Molly Crockett? Select one from the choices below.

Serotonin and Tryptophan

Which of the following does NOT prevent you from patenting your idea?

Someone else thought of the idea first

Which aspect of the First Amendment is the LEAST closely connected with privacy?

The Right to Assemble

Which of the following is true of privacy and the Wiretap Act?

The Wiretap Act provides for suppression of evidence and civil cause of action for unlawful wiretap

Our norms of privacy refer to five independent parameters. Match the description with the best label for the data parameter.

The person the data is about Correct match:data subject The entity that directed or provided the data Correct match:data sender The entity that accepted or admitted the data Correct match:data recipient The kind of information (health or behavioral or demographic) Correct match:information type How the data was transferred Correct match:transmission principle

Which type of ethical theory judges actions according to the principle of the greatest happiness given to the greatest number? Representatives are Iron Man, John Stuart Mills, and Jeremy Bentham.

Utilitarianism (Consequentialism)

Which type of ethical theory focuses on the character of individuals and good character traits from the kinds of habits they develop? Representatives are Thor and Aristotle.

Virtue Ethics

Match the description with the Internet infrastructure term which best describes it

Where one internet operation connects directly to another so that they can trade traffic such as an ISP and content provider like Google. Correct match:Peering Transit network provider: network that accesses every other network on the Internet without purchasing IP transit Correct match:Tier 1 Uneven distribution in Internet or digital access among different groups based on socio-economics geography or related demographics. Correct match:Digital Divide

What does Acquisti mean when he says transparency with personal data is necessary but not sufficient?

You can be transparent and still violate our norms of privacy.

A person's

being left alone physically -- freedom from intrusion into one's physical space. Correct match:Accessible freedom from interference in their choices. Correct match:Decisional control over the flow of their personal information including the transfer and exchange of that information. Correct match:Informational

Match the description with the name of the theory of consciousness from the field of Neuroscience

1 Consciousness is something we do. It is active cause-effect relationships in physical systems rather than passive reception like a movie on a screen. Correct match:Integrated Information theory 2 Consciousness is analogous to memory. The streams of information from memory in the brain is consciousness. Consciousness is like present memory. Correct match:Global Work Space Theory

Match the name with the description of the dark pattern.

1 You set out to do one thing but a different undesirable thing happens instead. Correct match:Bait and Switch 2 When free trial ends and your credit card is charged without warning e.g. when it is difficult to cancel a membership. Correct match:Forced Continuity 3 The design makes it very easy for you to get into a certain situation but hard to get out of it (e.g. a subscription). Correct match:Roach Motel The web site automatically adds an item often through the use of an opt-out radio button. Correct match:Sneak into Basket

When did the courts clarify that the Copyright Act gave computer programs the copyright status of literary works?

1983

According to experts, non-verbal communication accounts for (over) what percentage of what we communicate with others?

90

According to John Rawls' ideas of just as fairness in A Theory of Justice, which best matches to the terms?

A fair and impartial point of view Correct match:Original Position Blocking all knowledge of personal circumstances Correct match:Veil of Ignorance

Match terms with the statements that best describes them.

A user interface that has been carefully crafted to trick users into doing things such as buying insurance with their purchase or signing up for recurring bills. Correct match:Dark Pattern A subset of UX that applies psychological principles of influence and decision-making in a consumer context to the design of compelling user interactions. Correct match:Persuasive Design Device designs that hide their function so that they do not operate as assumed by the user such as "close door" elevator or crosswalk call buttons that do nothing. Correct match:Deceptive Design

Choose the BEST answer. Which can be used as a trademark for a software product or company?

All of the above

Which of the following statements characterizes "privacy" as discussed? Choose the BEST answer.

All of the above

Match the description of communication technology with the term that best describes it

Allows for lost or corrupted and self routing data Correct match:Packet Switching Requires constant connection between sender and receiver Correct match:Circuit Switching

Which case or principle allows warrants for wiretap of phone calls by law enforcement and which restricts such warrants?

Allows wiretap Requirement of physical intrusion Olmstead v. US (1928) ruling Restricts warrant for wiretap Katz test (societal expectation of privacy) Katz v. US (1967) ruling

Which TWO (2) factors are most critical to determining whether a UI or design is a "deceptive design" rather than merely a persuasive or just a bad design?

Balance between benefit to the user and benefit to the designer or business interest. Awareness of choices or decisions being made through the UI or process

What does the "on-sale bar" for patents do?

Bars the patenting of items offered for sale

Which of the following is true of copyright?

Begins automatically when the work is created

Daheane, Lau, and Kouider (2017) suggest that AI distinguish between two uses of the term "consciousness" that describe two different types computations that humans do. Match the kind of consciousness with the best description.

Being aware of something having some information in mind in order to act on it. Correct match:C1 (The first kind of "consciousness") Reflexive and self-referential - like self-awareness or self-monitoring or introspection and subjective experience. Correct match:C2 (The second kind of "consciousness")

Match the examples of data mining techniques to the name or term

Buying habits or market segments Correct match:classes and clusters of data Probability that items are purchased together or subsequently Correct match:associations and sequential patterns Model mutation and natural selection to discover new patterns in the data Correct match:Genetic algorithms Extracts rules based on statistical significance Correct match:Rule induction

Which of the following is NOT cited as a criticism of codes of ethics in the text?

Codes of ethics do not distinguish the features of the technology and the ethical issue.

A person or company that transports goods or people and that is responsible for any possible loss of the goods during transport, e.g. public airlines, railroads, bus lines, taxicab. A service that cannot discriminate, or refuse service, unless there is some compelling reason.

Common Carrier

Title II services refer to which of the following

Common carriers like telephone, gas, and electricity providers which are often considered utilities.

Established the regulation of telecommunications carriers by the Federal Communications Commission (FCC).

Communications Act of 1934

Match the particular cognitive biases with the type of bias they best exemplifies.

Confirmation Anchoring Availability Correct match:Decisional Authority Conformity Association Correct match:Social Bizarreness Egocentric Fading Correct match:Memory

Which statement best describes "the hard problem of AI"?

Consciousness and self awareness

Which two (2) are NOT factors needed to evolve trust in the game theory simulation The Evolution of Trust?

Cooperation Forgiveness

Order the following Trademark brand names from distinctive (fanciful) to generic.

Correct Order Answer: Kodak Correct Order Answer: The Weather Channel Correct Order Answer: Milk

Sort the following technologies in order of development and dependency from earliest to latest. - Earliest at the TOP - Latest at the BOTTOM

Correct Order Answer: Packet Switching Correct Order Answer: TCP/IP Correct Order Answer: Internet Correct Order Answer: HTML

Maslow's Hierarchy Order with the most basic need on top:

Correct Order Answer: Physiological (food & shelter) Correct Order Answer: Safety (security) Correct Order Answer: Sociality (belonging & friendship) Correct Order Answer: Esteem (accomplishment) Correct Order Answer: Self-fulfillment (creation)

"Mirroring" can be an easy and safe guide to appropriate eye contact, behavior, and posture. Which of the following describes what it means?

Correct answer: Adopting the same posture or behaviors as the other person.

Choose the best definition or description of "persuasive design" from the choices below.

Correct answer: Design that applies psychological principles of influence and decision-making in compelling user interactions

Which of the following is NOT an access type mentioned that can be controlled by DRM?

Correct answer: Digital Rights Management

Which is NOT one of the four primary functions of codes of ethics described in the text?

Correct answer: Enrich

In the United States, computer programs are protected under the definition of which type of "works" according to the Copyright Act, 17 U.S.C. § 101?

Correct answer: Literary Works

Which statement best characterizes the relationship between privacy and security discussed here?

Correct answer: Privacy and security are in tension. We often balance these forces

Which statement best describes Tavani's conclusion about the CEIU claim?

Correct answer: We should tentatively accept the traditionalists position

The measure of a society is not how it treats its good, compliant citizens, but how it treats its

Correct answer: dissidents

According to Amy Cuddy's work studying body language, posture affects the release of two hormones that are used to measure stress and confidence. Which two hormones were measured in this study?

Cortisol and Testosterone

Which of the following is NOT a DRM technology described?

Decryption

Match the type of design to the best description

Design that tricks a user Correct match:Deceptive Design Design that uses psychology to influence a users decision-making Correct match:Persuasive Design Non functional devices often designed to the satisfy the user by giving some sense or delusion of control to occupy and placate. Correct match:Placebo button (or design)

Which made it illegal to make technology to circumvent copyright measures?

Digital Millennium Copyright Act (DMCA)

For Tavanai, a "new ethical issue" is a new issue involving ethics.

False

Google is required to index and/or include your content in its search results.

False

Match the type of AI with the best description

Focuses on cognitive representation Correct match:Analytical AI Focuses on cognitive and emotional intelligence Correct match:Human-Inspired AI Focuses on the broadest range including cognitive and emotional and social intelligence Correct match:Humanized AI

Match the item with the best description

Forces agencies to tell how they collect information Correct match:Freedom of Information Act Requires permission to share personal information Correct match:Privacy Act Protects right to view explicit material in private Correct match:Stanly v. Georgia (1969) Requires decisional privacy Correct match:Democratic process

Choose the best category for the type of information

HPICorrect answer:medical test resultsCorrect answer:treatment informationCorrect answer:prescription informationCorrect answer:diagnosis CategoryeHPICorrect answer:digitally stored medical recordsCorrect answer:online prescription CategoryNot HPICorrect answer:health information in employment recordsCorrect answer:health information stripped of personally identifiable informationCorrect answer:personal appearance such as hair and eye color

Which is clearly MOST consistent with Net Neutrality? Choose the best answer.

ISP treating all data on the Internet the same

Choose the BEST answer. Copyright protects all original works EXCEPT:

Ideas, Concepts

Which is NOT one of the 4 torts of privacy?

Inferring private information from public

Which is NOT one of the four torts of privacy?

Inferring private information from public

Which statement best characterizes the principle which guides U.S. policy regarding ownership of (personal) information (data)?

Information is property

Match the item with the description related to data mining

Involves surveillance, cookies, and tracking Correct match:Data-gathering Exchange of data between different databases to find connections Correct match:Data-merging, matching, and aggregation Analyzes data for patterns to generate, extrapolate, or infer new information Correct match:Data-mining

Match the description of the method to optimize for non-discrimination to the name that relates to it.

Irrelevant to the outcome Correct match:Demographic parity Conditional on the outcome Correct match:Equalized odds Conditional on the predictor Correct match:Well-calibrated system

Which is true of Open Source software, according to Yochai Benkler?

It is NOT an economically viable mode of production

According to body language experts, what do these imply about a subject or interviewee?

Leaning slightly forward Correct match:Interested and engaged Crossed arms and/or legs Correct match:Guarded or protective or reserved Leaning back in chair with both hands clasped behind head Correct match:Analytical mood or gesture of superiority Rubbing or touching nose when answering a question Correct match:Not telling the complete truth

Match the description with the best category or label of the type of machine learning algorithm

Maps an input to a known output for a data set Correct match:Supervised Algorithms Data is modeled according to inherent clusters or associations Correct match:Unsupervised Algorithms Some data is labeled giving descriptive and predictive outcomes Correct match:Semi-supervised Algorithms Uses positive and negative reward signals Correct match:Reinforcement Algorithms

Distinguish ethical and psychological egoism by matching the terms with the best description:

Morality cannot consist in altruistic or selfless actions which come about as the result of free choice. Such actions are not possible. Every action is selfish. Correct match:Psychological Egoism We are capable of making free choices and acting from altruistic motives; however we should not act freely and make choices which aim to benefit others. Right actions seek to promote one's own self-interest. Correct match:Ethical Egoism

There are TWO basic requirements for software to be patent eligible. The invention should be which of the following. Choose BOTH (two) requirements below:

More than an "abstract idea" "Transform" the abstract idea into a patent-eligible application

Choose the best category (NPI or PPI) for the type of information

NPICorrect answer:HPICorrect answer:Political affiliationCorrect answer:Health information CategoryPPICorrect answer:Social media postCorrect answer:Real estate purchaseCorrect answer:Residence

Tavani (2002) argues that which of the following requires a new ethical rule or theory?

Neither (necessarily) requires new ethical rules or theory

Neuroscientists consider three different types or levels of brain activity to describe how we make decisions, such as buying decisions. Match the part of the brain with the best description.

Neocortex Correct match:Rational Middle Brain Correct match:Emotional Reptillian Brain Correct match:Instinctual

Which of the following elements is NOT a regulatory force according to the "Lessig Model" or "Pathetic Dot Theory"?

Net Neutrality

Which best describes "moral relativism"?

No universal standard of morality is possible because different people have different beliefs about what is right and wrong.

Which of the following statements accurately describes the intersection of First Amendment and privacy.

None of the above

According to Nissenbaum 1998 (Protecting Privacy in an Information Age: The Problem of Privacy in Public), there are three main reasons privacy in public has been ignored. Match the reason with the best description of it.

Privacy in public is like a paradox or an oxymoron. Correct match:Conceptual The "knock-down" argument: There is no expectation of privacy in public. Correct match:Normative The issue was not compelling until now with technologies available today. Correct match:Empirical

Contextual Integrity consists of what four (4) four essential descriptive claims? Match the description with the phrase that best completes it.

Privacy is provided by appropriate ... Correct match:flows of information Appropriate flows of information are those that conform with ... Correct match:contextual information norms Parameters of contextual information norms include ... Correct match:data subject and information type Conceptions of privacy are based on ethical concerns that ... Correct match:evolve over time

Match the type of intellectual property to the best definition, description, or characterization.

Protection for original works fixed in a tangible medium. This protect the owners right to reproduce or distribute or perform or display or prepare derivative works Correct match:Copyright A grant by the government of a right to exclude others from practicing a particular invention for a set period of time. This covers processes or machines and articles of manufacture. Correct match:Patent Any word or name or symbol or device used to identify and distinguish their goods or services from those made and sold by others. This covers product shapes and picture of a person or character. Correct match:Trademark

What are TWO senses of "dark" connoted in the concept of "dark pattern". Select TWO choices below.

Psychological Moral

Categorize the type of information generally as private, public, or both (depends).

Public Information Correct answer:Your personal appearance on the street Correct answer:Personal information from actions that are in public view Correct answer:What you buy in the grocery store Private InformationCorrect answer:Email (generally)Correct answer:Phone mail messages (generally)Correct answer:Personal information where there is clear expectation of privacy CategoryPublic and/or Private (it depends)Correct answer:Phone call in publicCorrect answer:Personal information

Match the description with Net Neutrality related term that best describes it

System that does not filter or throttle data traffic Correct match:Dumb Pipes Capability of ISPs to manage data without degradation of data flow Correct match:Provisioning (or over-provisioning) ISPs deliberately slowing or delay data according to data type or protocol Correct match:Throttling The (application) features of a system are left for the end points or nodes. Correct match:End-to-end principle

Match the term with the best description of it.

The ability to reflect on and examine one's own thinking and biases. Correct match:Reflexivity A process that calls itself or a similar process. When something is defined in terms of itself. Correct match:Recursion

Which of the following claims was advanced by Molly Crockett in the TED Talk.

The benefits of "neuro-enhancements" are not proven scientifically

Which of the following best describes the term "affordances" coined by Don Norman in "The Design of Everyday Things"?

The property of an object that defines its possible uses or makes clear how it can or should be used

In Adam Grant's work, Give and Take, several interesting findings and ideas and discussed. Which is NOT one that was mentioned in the review?

The three types of (professional) team members: Givers, Takers, and Receivers.

"Gestalt principles" describe which of the following?

The way visual information is grouped in terms of features like proximity, similarity, and symmetry.

Why might someone wish to violate copyright and view code in (RAM) memory?

To reverse engineer software

Match the type of intellectual property to the best definition, description, or characterization.

Trademark Correct match:Any word name symbol or device used to identify and distinguish their goods or services from those made and sold by others. This covers product shapes and picture of a person or character Patent Correct match:c A grant by the government of a right to exclude others from practicing a particular invention for a set period of time. This covers processes machines and articles of manufacture. Copyright Correct match:Protection for original works fixed in a tangible medium. This protect the owners right to reproduce distribute perform display or prepare derivative works.

Match the feature of a moral system according to Bernard Gert with the best description:

accessible to everyone Correct match:Public no authority or judge Correct match:Informal follows principles of reason Correct match:Rational does not favor any group Correct match:Impartial

In the video, Alessandro Acquisti explains how any personal information can become sensitive information. He described an experiment where they used only facial recognition to do which of the following?

all of the above

Match the different ethics level with the descriptions.

apply to individuals and individual actions Correct match:Micro ethics refer to general morals which are often part of mission statements for professional organizations. Correct match:Meso ethics refers to laws and policies and collective social responsibility of the profession Correct match:Macro ethics

Which of the following is NOT one of the four (4) principles describing the changes in FCC stance on the Telecommunications Act of 1996?

consumers are entitled to access any Internet content of their choice.

Match the description to the best fitting term:

ethical hacking for example computer security experts and testing specialists who focus on penetration and related testing of computer and information systems. Correct match:White hat hacking unauthorized access to systems usually with malicious or criminal intent or developing and releasing destructive malware and holding computers hostage and stealing password and credit card and other personal information. Correct match:Black hat hacking the use of computing in violating laws and unauthorized access or crossing ethical boundaries but without malicious intent. Correct match:Grey hat hacking using computer hacking to engage civil disobedience and social change. Correct match:Hacktivism those that use computing for fear or terrorism and information warfare to spy or deceive and disrupt computer and information systems. Correct match:Cyber-Terrorism computer and information tactics to spy deceive and disrupt computer and information systems and in conventional warfare to disrupt and take down enemy computer systems and targets. Correct match:Cyber-Warfare

Which Amendment in the Bill of Rights for the US Constitution explicitly guarantees the right to privacy?

none

The 5th Amendment (self incrimination) has been invoked to protect certain personal private computer information. What is a key example?

passwords

According to criticisms, ethical codes rest on a series of confusions that are both "intellectual and moral." Choose the word that completes the statements describing the the following key criticism: Giving codes a disciplinary function makes them more like ____ than ____.

policies and laws (legal), ethical rules

Match the type of code with the best description.

refer to general morals which are often part of mission statements for professional organizations. Correct match:Codes of ethics refer to the guidelines used in the course of particular work in a profession such as the interaction between the professionals and their clients or engineering oversight and specification Correct match:Codes of practice refer to attitudes and behaviors in professional settings such as sexual harassment or privacy or discrimination Correct match:Codes of conduct

For Immanuel Kant, we come to our knowledge of morality by way of which kind of propositions (like categorical moral imperatives)?

synthetic a priori (intuitive, yet informative)


Ensembles d'études connexes

Quiz: Chapter 32: Orthopedic Injuries

View Set

Ch. 14 Developing and Pricing Goods and Services

View Set

Pack 1, Lesson 2: Practice Exercise 2-1

View Set