I am Ethical

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

According to Quinn, the PE exam for licensing of Software Engineers, was first offered in

-1999 -2010 -2012 -2019 Correct! None of the Above

Quinn makes an ethical evaluation of online voting and comes to what conclusion(s)?

-A single individual could corrupt the election process at more than one voting sites. -Paper records would not exist -Relying on the security of PCs managed by ordinary citizens greatly increases chances of electoral fraud Correct! All of the Above

According to Section G of http://www.k-state.edu/honor/basics/investigation.html (Links to an external site.), possible sanctions for a first violation include:

-A written warning -XF in the class -Require the Development & Integrity course Correct! All of the Above

According to Quinn, what happened when the FBI asked Apple to create a new version of the iOS operating system was would allow the FBI to gain access to the locked iPhone of Syed Rizwan Farook?

-Apple created the new version of iOS and made it publicly available, so not just the FBI would have a copy. -Apple created the new version of iOS but required FBI to bring the iPhone to Apple's headquarters in -Cupertino to install it on the Farook's iPhone. -Apple threatened to move its headquarters to Vancouver, Canada, unless the US government dropped its unreasonable request. Correct! None of the Above

According to the information in Module 6, which of the solutions listed below can help companies deal with the all too real possibility of CyberCrime/CyberAttacks?

-Backup data regularly -Stay up-to-date on the most critical internet security threats and properly address -Realize that many attacks come from insiders so establish policies to minimize cybercrime -Install safe guards like corporate firewalls and install anti-virus software Correct! All of the Above

According to the latest annual Honor & Integrity System report (2018-2019), which College reported the most student violations in 2018-2019?

-Business -Arts & Science -Education -Agriculture Correct! None of the Above

According to the information in Module 5, the ethical collection and use of information should include:

-Collecting only relevant data -Informing the individual of what data is being collect and why -Protecting against unauthorized access -Respecting the privacy of the general public Correct! All of the Above

According to the information in Module 4, which of the following are used to protect Intellectual Property?

-Copyrights -Patents -Trade Secret Laws Correct! All of the Above

According to the information in Lecture 1 (Module 7), software defects include which of the following?

-Defects in the requirements stage of development -Defects in the design stage of development -Defects in the code -Defects in the software documentation Correct! All of the Above

According to Quinn, harms (costs) of privacy include:

-Easier to carry out illegal activities -Has put an extra burden in caring for members of a family -Can be a curse for introverts Correct! All of the Above

According to the information in Module 5 , as Software Engineers / Programmers, you have a strong influence on enacting ethical policies concerning privacy. Which of the following should you ethically argue for and include?

-Ethical default privacy settings -Privacy tools embedded in the software -Easy to set privacy settings Correct! All of the Above

According to the information in Module 2, how do we make the "right" choice?

-Go beyond our own preferences -Base decision on universal values rather than self-interest -Base decision on what all rational persons would advocate Correct! All of the Above

According to the information in Module 4, which of the following is used to protect trade secrets?

-Have employees sign a nondisclosure clause. -Have employees sign a document when leaving company verifying they won't divulge trade secrets. -Have employees sign a non-compete agreement. -Both a & b Correct! All of the Above

According to the information in Module 6, how can companies ethically reduce their chances of experiencing cybercrime?

-Hire a black hat hacker to break into the company's system -Establish a security policy and make it known to employees -Determine possible threats to the company's computer network and address Correct! Only B & C

According to the Uniform Trade Secrets Act (UTSA), which of the following is true?

-Includes coding algorithms and compilation methods -Must derive economic value, actual or potential -Must be an effort by the trade secret owner to keep it a secret Correct! All of the Above

Within Quinn, Daniel Solove groups privacy-related activities into four categories. Which of the following are included?

-Information Collecting -Information Processing -Information Dissemination -Invasion Correct! All of the Above

Which of the following would be considered safety-critical software?

-Mobile medical applications -Airplane Piloting Systems - Google Translate -All of the Above Correct! Only A & B

According to the information in the article "Therac-25", (a) reason(s) for the failed use of the Therac-25 radiation machine was (were)

-Reuse of old software -Manufacturer belief that the machine couldn't fail -Miscommunication between major parties involved Correct! All of the Above -Only A & B

According to the information in the article "Therac-25", improper amounts of radiation was administered to patients due to

-Software Error -Human Error -Patient Error -All of the Above Correct! Only A & B

According to the information in Module 2, why is it important to distinguish between the terms Morality and Ethics?

-Terminological inaccuracy impedes a true meeting of the minds -Important to determine if a discussion on any issue is based on ethical or moral principles Correct! Both A and B

According to the information in Module 6, what is the most important part of a company's computer system?

-The Hardware -The Software -The Network Infrastructure -The people that maintain it Correct! None of the Above

According to Quinn, which legislation(s) encourages whistle blowing by providing some protection to whistle-blowers against retaliation by their employers?

-Whistle-blower Protection Act -The False Claims Act -Whistle-blowers Retaliation Act Correct! Both A & B

According to the COPYRIGHT (What is copyright?) article, which of the following are protected under copyright laws?

-a poem -a movie -a music CD -a computer program registered as literary works Correct! All of the Above

According to Quinn, Ethics is

-a rational examination of people's moral beliefs. -a branch of philosophy. -one way to determine which activities are "good" and which are "bad." -Moral Philosophy Correct! All of the Above

According to Quinn, the Principles and Clauses in the Software Engineering Code of Ethics and Professional Practice

-address every ethical dilemma a software engineer may face. -provide algebraic formulas for determining the best course of action. -incorporate every relevant feature into the formulas. -All of the above Correct! None of the above

According to the information in Module 5 (as well as your readings), which of the following are also used by various authors to define Privacy?

-being let alone -secrecy, anonymity, solitude -restricted access to info about oneself Correct! All of the Above

According to Quinn, whistle-blowing raises moral questions regarding

-loyalty -trust -responsibility Correct! All of the Above

According to the information in Module 5 (as well as your readings), which of the following could be used to define Privacy?

-secrecy -freedom from intrusion -seclusion Correct! All of the Above

In "Guidelines on the use of External Sources", Dr. Howell

-stresses to always give credit to those whose writings or ideas you use. -that plagiarism can result in both academic and legal penalties -rephrasing a quote without credit is still a form of plagiarism Correct! All of the Above

According to Appendix A in your text, plagiarism occurs when a when a writer deliberately _______________ without acknowledging its source.

-uses some else's ideas or theories -paraphrases the words of another -uses facts that are not common knowledge -using the words of another without quotation marks and Correct! All of the Above

According to Quinn, the PE exam for licensing of Software Engineers, was last offered in

2019

According to Quinn, which of these events happened when Uber tested its self-driving car service in San Francisco?

A self-driving Uber ran a red light.

According to Quinn, both John Podesta, chairman of Hillary Clinton's presidential campaign, and former secretary of state, Colin Powell, were victims of what kind of CyberCrime attack?

A spear phishing attack

Within Quinn, the General Data Protection Regulation requires companies to

All but 'protect the info'

According to Quinn, benefits of privacy include:

Allows us to develop social relationships

According to Kidder (Chapter 1), do unto others (Golden Rule principle) is an example of

Care-based thinking

According to the second lecture for this unit, which country is the source for the most CyberAttacks?

China

According to the COPYRIGHT article, which of the follow would constitute fair use?

Copying/Distributing a single case study from a textbook for CIS 415

According to Quinn, the "Bring Your Own Device" movement bring numerous risks, including

Data is compromised if employee's device is stolen.

The article "Ethics_NSA" states, "...the NSA's spying tactics are proving counterproductive" and "university researchers have a duty to stop assisting them [the NSA]". This justification best illustrates or embraces which ethical theory?

Deontology

__________________ is a moral theory that holds that X is good exclusively because God commands it.

Divine Command Theory

__________________ is an ethical philosophy that judges an action as right if it creates the most happiness for yourself.

Egoism

According to Kidder (Chapter 1), doing whatever produces the greatest good for the greatest number is an example of

Ends-based thinking

According to "Kohlberg's Moral Development Theory", the higher the moral stage of development, the more likely an individual will act unethically.

False

According to Appendix A in your text, if a person has no intention of deceiving but fails to cite a source or use quotation marks correctly, that person is still guilty of plagiarism.

False

According to Dr. Roberts (within her video lecture), having unauthorized materials during exams is an uncommon violation within the College of Engineering.

False

According to Dr. Roberts (within her video lecture), the Honor System was first put in place at K-State in the late 1980's.

False

According to James Gibson in the article "Piracy and Copyright", individuals have both a legal and an ethical right to swap music and movies.

False

According to Quinn, a natural right to privacy is synonymous with a prudential right to privacy.

False

According to Quinn, a profession is defined solely by a high level of education.

False

According to Quinn, if an action is not explicitly forbidden by a profession code of ethics, then it is morally acceptable to do.

False

According to Quinn, professional computing organizations (like the ACM), have the authority to ban someone from developing software if a major violation of their code of ethics is found.

False

According to Quinn, since the Supreme Court ruling in 2014, many district and federal courts have cited Alice Corporation v. CLS Bank to validate hundreds of software patents.

False

According to Quinn, the majority of people that have computer-related jobs belong to professional computing societies.

False

According to the "Honor and Integrity System_PPT" posted on Canvas, if a professor does not explicitly state that you must do your own work, the default policy is "teamwork IS ALLOWED on assignments in the course"

False

According to the "Honor and Integrity System_PPT" posted on Canvas, to be considered an "Honor Code Institution", there must be a requirement that students officially report any honor code violation that they witness.

False

According to the COPYRIGHT article, reproduction in any form of copyrighted works is NOT allowed.

False

According to the KSU Honor Code, Plagiarism covers only published works.

False

According to the KSU Honor Code, a distance student that attends Kansas State University online is held to different honor and integrity standards than that of an on-campus student

False

According to the article "Piracy and Copyright", the argument that sharing songs or movies between friends is a form of civil disobedience against the corporate machine is a valid, ethical argument.

False

According to the article regarding the National Security Agency ("Ethics_NSA"), many of the corporate advisers on the advising committee have been replaced with professors steeped in the tactics of surveillance.

False

According to the information in Lecture 1 (Module 7), it is a bad idea to have an outside company do the testing of your developed software.

False

According to the information in Lecture 1 (Module 7), not being truthful about a defect in your developed software is reasonable and allowed by law if done in the general interest of the public.

False

According to the information in Lecture 1 (Module 7), software quality is how well software meets the skills of the developer.

False

According to the information in Lecture 1 (Module 7), the majority of errors in commercial software is from poor coding.

False

According to the information in Lecture 1 (Module 7), thorough testing guarantees a program is correct and error-free.

False

According to the information in Module 4, Patents only protect tangible inventions.

False

According to the information in Module 4, a shape cannot be trademarked.

False

According to the information in Module 4, computer hardware cannot qualify for trade secret protection under the Uniform Trade Secrets Act.

False

According to the information in Module 4, mathematical formulas can be patented.

False

According to the information in Module 4, the Digital Millennium Copyright Act made it an offense for a programmer to copying digital works that are copyrighted.

False

According to the information in Module 5, the HUMANISTIC VIEW taken by the U.S. views privacy protection as market regulated, not legislation (i.e. legally regulated).

False

According to the information in Module 6, CyberCrime comes only from those currently or formally hired by the company - those considered to be inside the company.

False

According to the information in Module 6, a Denial-of-Service attack also includes some type of electronic break-in or electronic trespassing.

False

According to the information in Module 6, before the 21st century, security threats were largely from those outside of the company.

False

According to the information in Module 6, companies can reduce their chances of experiencing CyberCrime by developing a security system with only a single layer of security, so updates and modifications can easily and quickly be implemented.

False

According to the information in Module 6, hacktivism represents 80% of the primary motivation in CyberAttacks.

False

According to the information in Module 6, with CyberCrime, the computer is only the target of the crime.

False

According to the information in the Module 4 PowerPoint presentation, when you purchase and install a software application, you now own the software.

False

According to the information in the article "Therac-25", a person died before the errors with the machine were discovered.

False

According to the latest annual Honor & Integrity System report (2018-2019), the total number of Honor Pledge Violations (cases) has increased from the previous year (2017-2018).

False

An ethical relativist claims that God does not exist.

False

Consequentialism (Teleology) is the theory that states that the motivation behind the action, not the end result behind an action, makes the action either right or wrong / good or bad.

False

Morality literally means the Philosophy of Ethics.

False

Quinn emphasis that ALL viruses are extremely dangerous - there are no innocent viruses.

False

Quinn mentions the MAXIMUM penalty for hacking (thus violating the Computer Fraud and Abuse Act) is 20 years in jail or a $250,000 fine.

False

The KSU Honor Council consists only of KSU faculty members.

False

Utilitarianism relies heavily on the two Categorical Imperatives.

False

While sitting in a hot classroom, you get an idea and invent a mini-A/C unit that plugs into a USB port. You begin selling your invention. However, the device was previously patented and sold by a small company a few years ago that no longer sells the item. According to the information in Module 4, since you had no previous knowledge of this patented invention, you are not violating any laws.

False

Within Quinn, Warren and Brandeis argue that laws against libel and slander are sufficient because they address the situation where malicious but true stores about someone are circulated.

False

According to Quinn, which of the following statements about the fatal Tesla accident involving Joshua Brown is false?

Foggy conditions made visibility poor.

According to Quinn, which of these statements about the National Crime Information Center (NCIC) is true?

Improper use of the NCIC has led to numerous false arrests.

The type of plagiarism illustrated in the "Creative Recycling" article, in which phrases were borrowed without citation quotation marks, with words randomly replaced, is an example of

Mosaic Plagiarism

According to the latest annual Honor & Integrity System report (2018-2019), Seniors and Juniors (combined) represented ____________ of all alleged violations.

Over 50% but less than 75%

According to the 2016-2017 annual Honor & Integrity System report, __________ had the greatest number of violations reported followed by ____________.

Plagiarism, Unauthorized Collaboration

According to the latest annual Honor & Integrity System report (2018-2019), __________ had the greatest number of violations reported followed by ____________.

Plagiarism, Unauthorized Collaboration

According to the information in Module 5, which of the following would be considered Libel if done with an intent to harm their reputation.

Publishing a "Photoshopped" picture of someone

According to the information in Lecture 1 (Module 7), interviewing the client to determine what they what the software to do is done during which phase of the SDLC?

Requirements phase

According to Kidder (Chapter 1), Immanuel Kant's categorical imperative is an example of

Rule-based thinking

The difference principle, which states that social and economic inequalities must be to the greatest benefit of the least-advantaged members of society, is part of which ethical theory?

Social Contract Theory

In the article "Ethics_NSA", not only has the advisory board changed with fewer university advisers, but the agency's top management corps has consisted solely of _______________ rather than academics.

Software Engineers

According to the information in Lecture 1 (Module 7), developing a plan of how the software will be thoroughly tested is done during which phase of the SDLC?

Specification and Design phase

According to "Kohlberg's Moral Development Theory", a student who does NOT cheat on exam because of a great respect for authority and states, "Well, what if EVERYONE cheated?" would best be consider at _______________ of moral development?

Stage 4

According to the information in Module 5, which of the following would be considered Slander if done with an intent to harm their reputation.

Telling everyone in the office that 'Sally' regularly steals office supplies

According to the information in Module 4, which of the following is true about copyright protection of software?

To prove copyright infringement, copyright holder must show a resemblance explained only by copying

A professor, instructor, GTA, or a student can file a violation report with the Honor and Integrity System.

True

According to Appendix A in your text, technology has made it easier to both commit and detect plagiarism.

True

According to Kidder (Chapter 1), the really tough choices don't center on right versus wrong but right vs right.

True

According to Quinn, public trust in the competence and integrity of those in the profession places a responsibility on those in the profession to ensure co-workers act ethically.

True

According to Quinn, someone in a profession (such as software development) has a special obligation to act for the good of others, since their decisions can have serious consequences.

True

According to Quinn, the ability to cause harm to members of the public is a powerful reason why those in computer-related careers must act according to ethical principles.

True

According to the "Honor and Integrity System_PPT" posted on Canvas, paraphrasing without citing the original source is considered plagiarism.

True

According to the KSU Honor Code, a group of students working together on a homework assignment intended to be done individually (like this one) would be a violation of the honor code and ALL students involved could face the same sanction(s).

True

According to the KSU Honor Code, a student SHARING (i.e. providing) the answers to a homework assignment (like this one) would be in violation of the honor code.

True

According to the article "Piracy and Copyright", a possible argument against monitoring KSU student downloads and activities on the University network is an invasion of privacy and a violation of academic freedom.

True

According to the information in Lecture 1 (Module 7), honesty about the limitations and possible errors in your software is a key component of developing custom software.

True

According to the information in Lecture 1 (Module 7), one of the key emphasis of the 40-20-40 rule is that coding is only a minimal part of the overall software development process.

True

According to the information in Module 4, a sound can be trademarked.

True

According to the information in Module 4, copyright infringement occurs when someone copies a substantial part of a copyrighted work without permission.

True

According to the information in Module 4, reverse engineering can be used to figure out a company's trade secret.

True

According to the information in Module 4, using reverse engineering of existing software for interoperability in getting outdated software to work on a current system is allowed.

True

According to the information in Module 5, Defamation involves statements that damage another person's reputation.

True

According to the information in Module 5, Natural Rights Theory argues that our rights to privacy should transcend the collection of data as a way to generate profit.

True

According to the information in Module 6, CyberCrime requires the use of a computer and possibly a network to commit a criminal act.

True

According to the information in Module 6, each type of CyberCrime perpetrator has different objectives, different resources, and a different acceptable level of risks they are willing to take.

True

Even though a student may have no intention of plagiarizing but uses exact wording without quotation marks or forgets to cite a source, that student could still be found guilty of plagiarism by the KSU honor council.

True

The Honor Code at KSU allows students DUE PROCESS by allowing them to contest the allegations made against them.

True

The KSU Honor pledge is implied by enrolling in any class at K-State. The student does not need to sign anything to be held to the policies of the pledge.

True

Universality is a key aspect of both the Golden Rule (Ethic of Reciprocity) and Categorical Imperative.

True

Within Quinn, Thomson argues that whenever the right to privacy is violated, another right is violated as well, such as property rights.

True

According to both lectures for this unit, which country has experienced the most CyberCrime?

United States

Hacktivism could best be ethically justified using which of the following ethical principles?

Utilitarianism / Greatest Good

According to the latest annual Honor & Integrity System report (2018-2019), the number one sanction was __________ followed by ____________.

Zero on Assignment, Assigned to take DI Course

According to the class syllabus, a single violation of the honor code in this course (CIS 415) will result in

an XF in the class

According to Quinn, a right that is guaranteed without exception is called

an absolute right.

According to Quinn, the Ariane 5 satellite launch vehicle failed because

code that worked correctly on the Ariane 4 failed on the Ariane 5.

According to Quinn, taking "the ethical point of view" means

deciding that other people and their core values are worthy of your respect.

According to Quinn, unlike most professionals, the typical software engineer

does not work directly with individual clients.

According to Michael McFarland (as cited in Quinn), a team of engineers

has more moral accountability than any of its members.

According to Quinn, Whistle-blowers

make an unauthorized discloser about a harmful situation or fraud.

According to Quinn, Ethical objectivism is based on the idea that

morality has an existence outside the human mind.

According to Quinn, Cambridge Analytica collected personal information in order to

provide microtargeting services to conservative political candidates.

According to the information in Module 5, Privacy Legislation in the U.S.

relies heavily on industry regulating itself

According to specifications discussed by Quinn, which of the following careers is NOT an example of a mature profession?

software engineer

According to Quinn, the Software Engineering Code of Ethics and Professional Practice was developed by

the Association for Computing Machinery and the Institute for Electrical and Electronics Engineers.


Ensembles d'études connexes

Subjunctive, indicative, infinitive, and past subjunctive examples

View Set

legal and social environment of business exam 1

View Set

Pharmacology Chapter 20 study set

View Set

APW Unit 6--Topic 6.7 & 6.8 Impact of Migration

View Set