Ethical Social & Legal Issues - Final Exam Comprehensive [INFO 323]

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

According to the ACM Code of Ethics and Professional Conduct, which of the following is not listed as general moral imperatives? a. Always do the right thing! b. Contribute to society and human well bring c. Given proper credit for intellectual property d. Be honest and trustworthy e. Avoid harm to others

Always do the right thing!

An 'ad hominem' argument is: a. An argument invoking society's wishes as the justification b. An attack directed at the person rather than the substance of the person's argument c. An argument that is inherently invalid d. An argument based on what's best for humanity e. An attach on the premises of the argument rather than the structure of the argument

An attack directed at the person rather than the substance of the person's argument

What is the definition of a data controller? a. An entity that holds personal data and determines the purpose of use. b. A supervisory authority empowered to enforce privacy regulation or law. c. The individual who provides the personal data. d. A third-party service provider that maintains the platform on which personal data is stored.

An entity that holds personal data and determines the purpose of use.

What is the correct definition of a privacy policy? a. An internal statement that details an organization's penalties for employee's who leak personal information b. An internal statement that summarizes the compliance challenges an organization faces c. An internal statement that summarizes an organizations goals for its privacy programs d. An internal statement that governs an organization's handling practices of personal information

An internal statement that governs an organization's handling practices of personal information

In 1988, the USS Vincennes equipped with the then most sophisticated Aegus Radar System accidentally shot down an Iranian Airbus killing all 290 passengers. Gottenbarn uses this tragedy to argue that software failures like this result from the following defect(s) in the current risk assessment of software development: [Select all that apply] a. A failure to include chain-of-command b. An overly narrow concept of risk c. A limited notion of system stakeholders d. A failure to consider human factors e. Misspecifications of the software requirements

An overly narrow concept of risk A limited notion of system stakeholders

Andrew is employed as a Chief Financial Officer of EasyMoney firm in NYC, for a salary of $200,000 per year on a 3 year contract. His employor terminates Andrew with 2 years left in the contract. Andrew accepts employment as a financial analyst at a different firm that pays $150,00 per year. Which of the following hold true in this scenario? a. Andrew can only sue to receive nominal damages b. Andrew can sue his prior employer and recover $100,000 c. Andrew cannot take any legal action against his formal employer after accepting another job d. Andrew's former employer must pay Andrew 2 year's worth of his former salary.

Andrew can sue his prior employer and recover $100,000

Some states have security breach notificaiton requirements. For those that do, what general information must the breach-of-personally-identifiable-information notificaiton letter to those individulas include?

A brief description of the incident, the type of information involved, and a toll-free number for answers to questions.

If a computer located in Massachusetts maintains all of its employees' personal information in a hosted online database in Florida, what must the third party service provider agree to? a. A confidentiality provision b. A ban on use of subcontractors c. Upgrades in technology d. Periodic audits

A confidentiality provision

What is a first-party cookie? a. A cookie that is set to expire at some point in time. b. A cookie that operates as a tag and records an end users visit to a particular webpages. c. A cookie that is set and read by the web server hosting the website the user is visiting. d. A cookie that only uses a persistent variation when justified.

A cookie that is set and read by the web server hosting the website the user is visiting.

An employer can discriminate in their hiring if it is not discriminating against a protected class of citizen. Which person is protected? a. A left-handed person b. Someone who smokes c. Someone who is obese d. A disabled, gay, Latino, Christian, female veteran

A disabled, gay, Latino, Christian, female veteran

According to the EU Data Protective Directive, what three elements are essential characteristics of consent? a. A freely-given, informed and written indication b. A freely-given, written and implied/ expressed indication c. A freely-given, specific and implied/ expressed indication d. A freely-given, specific and informed indication

A freely-given, specific and informed indication

The _____________ is a federal statue that permits trademark owners and famous persons to recover domain names that use their names where the domain name has been registered by another person or business in bad faith. a. UCITA b. ACPA c. ECPA d. ICANN

ACPA

Which is NOT an example of privacy notice? a. A spreadsheet containing specific product names and general descriptions b. The interactive Advertising Bureau's Advertising Option icon and accompanying language c. Cardholder agreements or employment contracts d. Terms governing a user's participation in an online service or social network

A spreadsheet containing specific product names and general descriptions

FERPA mandates that the educational institution must provide access to a studen'ts request for access within _____ days. a. 45 b. 30 c. 14 d. 60

45

Which of the following is not an example of cyber ethics? a. Philosophical b. Absolute Truth c. Socialogical/Descriptive d. Professional

Absolute Truth

Role-based access controls are based on what basic security principle? a. Employees should be granted access if it is determined they are stakeholders b. Employees should not be able to access personal information unless it is from a public source c. Access should be granted to employees on the basis of the lowest possible level d. Employees shall not be granted access without management approval from CIO or CEO

Access should be granted to employees on the basis of the lowest possible level

What kind of information security control is an incident response procedure? a. Administrative control b. Physical control c. Data control d. Technical control

Administrative control

The Privacy Rights Clearinghouse tracks all breaches and categorizes each into what 8 areas? [Select all that apply] a. physical loss b. insider. c. uninteded disclosure d. stationary devices. e. payment card fraud. f. portable devices. g. unkown. h. hacking or malware.

All apply

What are the Consumer/User preferences for privacy used in the U.S.? a. double opt-in b. opt-in. c. opt-out. d. no option. e. all of the above.

All of the above

FERPA allows disclosure of PII for the following: [Select all that apply] a. to determine financial aid eligibility. b. to another educational institution for enrollment. c. to comply with a judicial order. d. if disclosure is to the alleged victim of a forcible or non-forcible sex offense. e. to school officials who have a "legitimate and educational interest" in the records. f. to appropriate parties in connection with a "health or safety emergency" to protect the student or others.

All of them

What are the key questions that would help determine privacy risk? [Select all that apply] a. Where, how and for what length of time is the data stored? b. How sensitive is the information? c. Should the information be encrypted? d. Will the information be transferred to or from other countries, and if so, how will it be transferred? e. Who determines the rules that apply to the information? f. How is the information to be processed, and how will these processes be maintained? g. Is the use of such data dependent upon other systems?

All of these

What types of educational records are not covered by FERPA?

Alumni

For optimal success when assigned a task as a lower level resource or higher level manager, the level of responsibility must be: a. At the same as the level of authority b. At or above the level of authority c. At or below the level of authority d. At the discretion of the mananger's guidance

At the same as the level of authority

What phrase describes the ability for an employee from leaving their company at any time and a company from releasing an employee at any time (assuming no dsicrimination is evident)?

At will

According to Hume's law of meta-ethics: a. If "A" implies "B" and "B" implies "C" then "A" imples "C" b. Meta-ethics is real science c. You can derive an "ought" from an "is" d. Math logic is not applicable in the study of ethics e. You can't derive an "ought" from and "is"

You can't derive an "ought" from an "is"

Reversibility is a principle of Kantian ethics which says that _____________. a. a person must be allowed to selectively choose moral judgments based on the circumstances b. a person must treat all moral circumstances as one c. a person must be allowed to reverse his moral judgement to better suit his needs d. a person must abide by the rule he/she uses to judge the morality of someone else's conduct

a person must abide by the rule he or she uses to judge the morality of someone else's conduct

An offer is terminated on the grounds of "supervening illegality" when _____________. a. a statue or court decision deems an object of the offer unlawful b. the set period in the offer has expired c. the subject matter in the offer has been destroyed d. the offeror or offeree passes away prior to the offer being accepted

a statue or court decision deems an object of the offer unlawful

The Children's Online Privacy Protection Act of 1998 applies to all of the following entities except: a. Operations of commercial websites directed to children under the age of 14. b. Operations of commercial websites directed to children under the age of 13. c. Online services directed to children under the age of 13. d. Any website that knows they're collecting PI from children under the age of 13.

Operations of commercial websites directed to children under the age of 14.

The Fair and Accurate Credit Transactions Act (FACTA) gives consumers all of the following rights, EXCEPT: a. Free credit reports every year. b. Opt-in for CRAs use of data for their marketing purposes. c. Federal law preempt states' law. d. Truncated or redacted information on reports and receipts.

Opt-in for CRAs use of data for their markeitng purposes.

Which international organization published a set of privacy principles entitled Guidelines Governing the Protection of Privacy and Transborder Data Flows of Personal Data"? a. International Organization of Standards b. Organization for Economic Cooperation and Development c. Asia-Pacific Economic Cooperation d. Council of Europe Convention

Organization for Economic Cooperation and Development

How is a copyright different from a patent? a. Patents have a limited term period, while copyrights carry lifelong terms b. Patents fall under the federal law, while copyrights fall under state law c. Copyrights should be novel, and useful, while patents need not be so d. Copyrights are applied for inventions, while a patent is applied for tangible writings

Patents have a limited term period, while copyrights carry lifelong terms

What is the lowest legal standard to obtain private information?

Pen register

Which of the following is not one of what Tavani identifies as a "discussion stopper" as it relates to discourse on ethics and morality? a. People disagree on solutions to moral issues b. People fail to distinguish between moralists and ethicists c. Morality is simply a matter for individual cultures to decide d. Who am I to judge? e. Ethics is simply a private matter

People fail to distinguish between moralists and ethicists

Which of the following statements describes the moral theory of utilitarianism? a. People must choose the action or follow the rule that provides the greatest good to society b. People must choose to follow actions of a virtuous person c. People must follow actions that are in accordance with a specific moral rule or principle from a religious text d. People must follow actions based on moral duties imparted from one's community

People must choose the action or follow the rule that provides the greatest good to society

The use of personal information should follow what primary principle? a. Organizations should use personal information for any and all business practices. b. Personal information should be limited to the purposes identified in the notice. c. Personal information usage should be determined by the data controller that collected the personal information. d. Personal information usage should be determined by third-party contracts.

Personal information should be limited to the purposes identified in the notice.

The Family Education Rights and Privacy Act of 1974 (FERPA) gives students rights for all but the following:

Private right of action under FERPA

Hinman argues that search engine companies have a special obligation to society because search engines: [Select all that apply] a. Provide access to information that is crucial for responsible citizenship b. Are owned by private corporations c. Play an absolute crucial role in the access of information d. Are now central to education

Provide access to information that is crucial for responsible citizenship Are owned by private corporations Play an absolute crucial role in the access of information Are now central to education

What are the three main sources of personal information? a. Birth records, national and foreign government records and state/provincial government information b. Public and private sector financial records, medical records and military service records c. National insurance information, employment records, and law enforcement records d. Public records, publicly available information and non-public information

Public records, publicly available information and non-public information

A QPO prevents certain PII from being disclosed to the public. What does QPO stand for? a. Qualified protection order b. Qualified protection ordinance c. Qualified public order d. Qualified privacy order

Qualified protection order

____________ is a moral theory which asserts that fairness is the essence of justice. a. Rawls's Social Justice Theory b.Utilitarianism c. Moral Relativism d. Kantian Ethics

Rawls's Social Justice Theory

An employer can do all but which of the following: a. Require drug testing before and during your employment b. Open personal mail delivered to the company c. Record your movements with video and audio using closed circuit TVs. d. Access personal emails stored on company servers.

Record your movements with video and audio using closed circuit TVs.

According to Tavani, the basic components of a moral system include all of the following EXCEPT: [Select all that apply] a. Micro-level rules of conduct that guide individual action b. Macro-level rules of conduct that guide social policy c. Religious upbringing that guide individual behavior d. Principles of evaluation of standards used to justify conduct e. Individual beliefs guiding individual behavior

Religious upbringing that guide individual behavior Individual beliefs guiding individual behavior

Disclosures by law are divided into required, permitted and forbidden. What is the best example of each? a. Required: Discovery for litigation. Permitted: HIPAA PHI required by law. Forbidden: Attorney-client privilege. b. Required: If US laws require it. Permitted: HIPAA PHI to spouses. Forbidden: Lack of consent. c. Required: Deposits > $10,000 in one day. Permitted: The system owner allows access. Forbidden: Trans-border laws equitable. d. Required: Legally mandated. Permitted: Hacker trespasser with or without court order. Forbidden: If it would incriminate the corporation.

Required: Discovery for litigation. Permitted: HIPAA PHI required by law. Forbidden: Attorney-client privilege.

__________ is an action to undo a contract a. Retribution b. Restitution c. Rescission d. Recession

Rescission

Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003, amended in 2008, has penalties that include all the following except: a. $16,000 per violation b. Imprisonment c. Restraining Order d. Injuntive Relief

Restraining Order

The Video Privacy Protection Act of 1998 was passed because of the publishing of what Supreme Court nominee's video rentals?

Robert Bork

The PATRIOT Act of 2001 passed by President bush had many provisions that were extended in 2011 by President Obama. What provisions were extended?

Roving wiretaps, searches of business records, and surveillance of "lone wolves."

A privacy professional for a company is responsible for assessing risks for all the following except: a. Reputational b. Safety c. Operational d. Investment e. Legal

Safety

Section 2-201(1) of the Uniform Commercial Code states which of the following? a. All sales contracts must be in writing b. Lease contracts involving payments of $1,000 or more be in writing c. Sales contracts involving payments of $1,000 or more must be in writing d. All lease contracts must be in writing

Sales contracts involving payments of $1,000 or more must be in writing

The __________ Act enacted by Congress in 2002, requires public companies to adopt codes of ethics, and establishes criminal penalties for companies that partake in violations. a. False Claims b. Business Norms c. Glass-Steagall d. Sarbanes-Oxley

Sarbanes-Oxley

Which measures have been adopted by major search engine firms to address privacy concerns specific to search technologies? a. Searches are anonymized after a defined period of time b. Searches are encrypted after a defined period of time c. Searches are archived after a defined period of time d. Searches are deleted after a defined period of time

Searches are anonymized after a defined period of time

A detailed review of corporate behavior that includes how well employees adhered to the company's code of ethics and how well the company met its community responsibilities is called a: a. Social Assessment b. Compliance Audit c. Social Audit d. Social Entrepreneurship

Social Audit

Which of the following moral theories matches the dictum "I will keep the rules if everyone else does?" a. perspectivism b. social contract c. moral relativism d. utilitarianism

Social Contract

What is the basis of common law?

Social customs and expectations.

Toughones, a car part manufacturer, entered into a contract to license computer software from a Vizera Inc. for $250,000. This software is to be used to keep track of inventory, accounts receivable, and other financial data. After the software was installed, the computer system worked but it had a few glitches. Toughones refused to pay the full amount in the contract. To settle the dispute, the parties agree that $180,000 is to be paid as full and final payment for the software. Toughones paid the $180,000 as agreed. What kind of agreement did Toughones and Vizera reach in the end? a. counteroffer b. preexisting duty c. accord and satisfaction d. mirror image acceptance

accord and satisfaction

An invitation to make an offer or an actual offer is referred to as a(n) _______________. a. proposal b. bid c. reward d. advertisement

advertisement

If a competitor revers engineers a trade secret, then the competitor is ______________. a. not allowed to gain commercially from the trade secret b. obligated to inform the original owner of the trade secret c. allowed to use the trade secret but not the original trademark d. rightfully allowed co-ownership to the trade secret and its original trade mark

allowed to use the trade secret but not the original trademark

The tort of "intrusion upon or on seclusion" is a clause of action that arises out of sector?

Telemarketing

Robin Hood stole from the rich and gave to the poor. What form of ethics does this represent? a. Deontological Contractarianism b. Ethical Fundamentalism c. Categorical Imperative d. Teleological Utilitarianism

Teleological Utilitarianism

Two of the four categories of data protection and privacy law practices are informational privacy and a. Territorial privacy b. Financial privacy c. Electronic privacy d. Health privacy

Territorial privacy

What does the "red flags rule" require of financial instituions?

That they develop and implement methods of detecting identity theft.

The Federal law that forced telecommunications, wire carriers, broadband and voice over IP carriers to have built-in mechanisms for law enforcement to use for criminal cases is called what?

The Communications Assistance for Law Enforcement Act (CALEA)

In addition to the Security Rule, what other rule was promulgated by Health and Human Services and mandated by the Health Insurance Portability and Accountability Act?

The Privacy Rule

According to the Right to Financial Privacy Act, the government cannot access a person's financial records unless the request is reasonably specific and what condition is met? a. the customer authorizes access. b. the records are subject to a subpoena or search warrant. c. there's an appropriate written request from an authorized government authority. d. a or b, above. e. none of the above. f. any of the above

any of the above

Carriers can only use Customer Proprietary Network Information (CPNI) if: [Select all that apply] a. the customer opts-out. b. as required by law. c. the customer opts-in. d. express customer approval.

as required by law. the customer opts-in. express customer approval.

Jonas enters into an oral contract with Chelsea to lease his house to her for $100,000. Chelsea pays him $100,000 and moves in. A month later, Jonas learns that his state requires contracts for the lease of goods with payments of $1,000 or more to be in writing. Which of the following options does either party have? a. Jonas can rescind the contract on the grounds of noncompliance with the Statute of Frauds b. Jonas can evict Chelsea as the contract does not comply with the Statue of Frauds and is hence void. c. The contract cannot be rescinded by either party as it has already been executed d. Chelsea can rescind the contract on the grounds of noncompliance with the Statute of Frauds

The contract cannot be rescinded by either party as it has already been executed

Effective security risk management balances the potential for loss with what cost? a. The cost of security protection and management b. The cost of statuatory compliance and oversight c. The cost of reduced efficiencies in operations. d. The cost of notifications related to a data form

The cost of security protection and management

Which of the following is true of a contract, the object of which has become unlawful after the creation of the contract? a. Both parties of the contract will be discharged from that contract b. The contract is still legal as the object was legal at the time of creating that contract c. The contract is illegal even if the parties don't complete the contractual agreement d. The parties of the contract will be discharged from that contract

The parties of the contract will be discharged from that contract

What is "corporate citizenship" as a social responsibility theory in business? a. businesses are responsible to help solve social problems, even those that they did not cause. b. businesses are obligated to consider the effects its actions have on persons other than its shareholders. c. businesses owe a duty to take actions that increase profits for shareholders d. businesses have a responsibility solely to its stakeholders, and should strive to maximize their well-being

Businesses are responsible to help solve social problems, even those that they did not cause.

Why does an illusory contract lack consideration? a. because the consideration promised is unlawful and therefore void b. because one or both parties can choose not to perform their contractual obligations c. because the compensation paid is for work done in the past d. because the person promises to perform an act or do something he is already under an obligation to do

because one or both parties can choose not to perform their contractual obligations

How are ethical rules established in Kantian ethics? a. by an individual's feelings on what is right and wrong b. by a set of universal rules that are based on consistency and reversibility c. by following principles that have been derived from holy books d. by choosing the alternative that's best for society as a whole

by a set of universal rules that are based on consistency and reversibility.

Preprinted forms whose terms the consumer cannot negotiate, and must sign in order to obtain a product or service are referred to as ____________. a. contracts of adhesion b. quasi-contracts c. voidable contracts d. contracts in restraint of trade

contracts of adhesion

A ___________ is a contract that provided that a seller of a business or an employee will not engage in a similar business or occupation within a specified geographical area for a specific time following the sale of the business of termination of employment. a. contract in restraint or trade b. covenant not to compete c. contact of adhesion d. quasi-contract

covenant not to compete

Scientists such as anthropologists and sociologists that write about what is, are __________ scientists, and scientists that write about what should be are ___________ scientists. a. descriptive / normative b. design / behavior c. normative / descriptive d. research / engineering

descriptive / normative

Kantian ethics is also referred to as __________ ethics. a. relativistic b. duty c. utilitarian d. nihilistic

duty

A right to use someone else's land without owning or leasing it is called ___________. a. leasehold b. life estate c. mortgage d. easement

easement

Jeffery became a victim of fraud when he entered a pyramid scheme which turned out to be a scam. In order to claim damages, Jeffrey has to prove which of the following? a. motive of the fraudster b. involvement in the pyramid scheme c. economic injury d. misrepresentation

economic injury

According to the ___________, evidence obtained from an unreasonable search and seizure can generally be prohibited from introduction at a trial or an administrative proceeding against the person searched. a. presumption of innocence doctrine b. double jeopardy rule c. Miranda rights d. exclusionary rule

exclusionary rule

In order to use the defense of assumption of risk, the defendant has to prove that the plaintiff ______________. a. was injured after the defendant's liability far the risk ended b. assumed there was no risk involved and entered into the activity that injured him/her c. had knowledge of the specific risk and voluntarily assumed the risk d. was injured in an activity that had no risk of any manner

had knowledge of the specific risk and voluntarily assumed the risk

In a(n) ____________ contract, agreement between parties is inferred from their conduct. a. formal b. express c. implied-in-fact d. implied-in-law

implied-in-fact

A(n) ____________ is a charge of having committed a crime, usually a felony, based on the judgement of a grand jury. a. arraignment b. plea c. indictment d. information statement

indictment

The ___________ is a legal principle that allows minors to cancel most contracts they have entered into with adults. a. duty of restitution b. infancy doctrine c. contract of adhesion d. duty of restoration

infancy doctrine

Which of the following constitutes material breach? a. anticipatory repudiation b. rescission without notification c. substantial performance d. inferior performance

inferior performance

A court order that prohibits a person from doing a certain act is termed as a(n) _____________ a. injunction b. restitution c. reformation d. rescission

injunction

Intellectual property falls into a category of property known as ______________. a. real property b. moveable property c. tangible property d. intangible property

intangible property

Parties to a contract agree in advance to pay ______________ damages if the contract is breached. a. nominal b. compensatory c. consequential d. liquidated

liquidated

The __________ states that an acceptance is effective when it is dispatched, even if it is lost in transmission. a. mutual assent rule b. mailbox rule c. rule of silence as acceptance d. mirror image rule

mailbox rule

The ECPA (Electronic Communications Protection Act) is a federal statue that _____________ a. makes it a crime to intercept an electronic communication at the point of transmission b. rules that ISPs are not liable for the content transmitted over their networks by e-mail users and websites c. establishes that an e-signature is as effective as pen-and-paper signature d. establishes that businesses are allowed send spam e-mails, as long as they do not lie

makes it a crime to intercept an electronic communication at the point of transmission

Which of the following terms refers to a nonbreaching party's legal duty to avoid or reduce damages caused by a breach of contract? a. tender to performance b. liquidation of damages c. mitigation of damages d. disclaimer of consequential damages

mitigation of damages

A social responsibility theory of business which says that a corporation's duty is to make a profit while avoiding causing harm to others is referred to as _____________ a. moral minimum b. maximizing profits c. stakeholder interest d. corporate citizenship

moral minimum

Under the theory of ___________, if a business corrects the social injury it causes, it has met its duty of social responsibility. a. moral minimum b. corporate citizenship c. stakeholder interest d. maximizing profits

moral minimum

Portman, who runs a computer hardware store, had signed a contract with Stewie Inc. to deliver 125 computer monitors. He was to deliver it by the 5th of August, but by the 3rd of August, Portman could not arrange for the monitors, as his usual supplier was not available. Portman then decided to go to another supplier who has a higher selling price rather than cancel the contract with Stewie Inc. as he believed it was his duty to do so. What of the following moral theories matches Portman's behavior? a. moral relativism b. utilitarianism c. Rawls's social justice theory d. Kantian ethics

moral relativism

Which overarching law covers employment privacy in the U.S.?

There are no such laws

Which is a concept provided for in the 1973 Code of Fair Information Practices? a. There must be a way for a person access to delete a record of identifiable information b. There must be a way for a person access to make a correct or amend a record of identifiable information c. There must be a way for a person access to make a record anonymous d. There must be a way to allow a person access to a record of identifiable information

There must be a way for a person access to make a correct or amend a record of identifiable information

Which of the following statements is true of nominal damages? a. They are also know as compensatory damages. b. They are awarded even when a breach did not result in financial loss. c. Most courts favor nominal damages lawsuits. d. Only damages above $1,000 can qualify as nominal damages.

They are awarded even when a breach did not result in financial loss.

A US citizen, Ima Degenerate, starts a company that produces and publishes child pornography on an internet website. The government obtains a subpoena and prior notice to intercept the systems' content. Mr. Degenerate argues that the government didn't obtain a search warrant. The government wins by what action? a. Third Party Doctrine b. Protective Order c. Exclusionary rule d. Hackers' trespass

Third Party Doctrine

Under the US Children's Online Privacy Protection Act (COPPA), which of the following is FALSE? a. COPPA provides complete preventive measures against the potential abuse of children's personal information online. b. COPPA was passed with the express purpose of protecting children's use of the internet-particularly websites & services targeted towards children. c. COPPA requires website operators to provide clear and conspicuous notice of the data collection methods employed by the website. d. COPPA mandates strict requirements on parental oversight and consent on behalf of children.

COPPA provides complete preventive measures against the potential abuse of children's personal information online.

Billions of dollars of office supplies are stolen each year. Many of those that take office supplies do not think of taking scotch tape or paper or paperclips for their private use as stealing. "They're only borrowing these items, and there's plenty here in the office." However, according to the material presented in Candidate Ethical Principles, Kant would find that the above reasoning violated his.

Categorical Imperative

Developing a moral system of rules based on the notion that such a system is in the self interest of human beings is the hallmark of: a. Virtue ethics b. Utilitarianism c. Kant's deontology d. Contract theory

Contract Theory

Conch Corporation, a global oil and gas company, has plans to open a subsidized post-secondary vocational school in the town of Cristen, where one of their offices is situated. The plan was put to vote and approved despite some objection from shareholders. The school is being opened in collaboration with the local government, and the objective is to help the youth of that neighborhood, especially dropouts, learn a vocational skill. What social responsibility theory describes Conch Corporation's move to open the school? a. corporate citizenship b. maximizing profits c. moral minimum d. stakeholder interest

Corporate Citizenship

What types of laws are designed to restrict access to financial information? a. Tax enforcement laws b. Money laundering laws c. Credit monitoring laws d. Anti-terrorism laws

Credit monitoring laws

Which threat to online privacy includes malicious code that is unwillingly incorporated into a website's own source code? a. Phishing b. Pharming c. Denial or service attack d. Cross-site scripting

Cross-site scripting

True or False: FERPA applies to all educational institutions that receive federal funding.

True

True or False: The Children's Online Privacy Protection Act has no private right of action but states may bring civil action for COPPA violations.

True

True or False: The Dodd-Frank Wall Street Reform and Consumer Protection Act established enforcement actions against "abusive acts and practices."

True

True or False: The FCC in 2012 amended rules to allow health care related entities governed by HIPAA to use robo-calling.

True

True or False: The contents of your telephone conversation are protected, but not the dialing information.

True

True or False: There are 9 exemptions to the PATRIOT Act.

True

Use of a smart card would be identified as what type of safeguard? a. Perimeter control b. Two-factor authentication c. Public key infrastructure d. Intrusion prevention systems

Two-factor authentication

According to the Hague Evidence Convention, trans-border conflict of laws regarding privacy and evidentiary discovery, a. U.S. conflict of laws rule over foreign laws. b. The burden is on the foreign country to show that US rules of discovery should be subordinated. c. The burden is on the US to show their laws of discovery should preempt the foreign laws. d. Foreign laws rule over US conflict of laws rules.

U.S. conflict of laws rule over foreign laws.

The ___________ establishes uniform legal rules for the formation and enforcement of electronic contracts and licenses. a. UCITA b. UCC c. Restatement of the Law of Contracts d. common law of contracts

UCITA

The ____________ establishes a uniform and comprehensive set of rules that govern the creation, performance, and enforcement for computer information transactions. a. CAN-SPAM-Act b. UCITA c. ACPA d. ECPA

UCITA

Which statement is considered a best practice regarding information security governance? a. Ultimately, security is about technology b. Ultimately, security is about people c. Ultimately, security is about information asset oversight d. Ultimately, security is about well written Internet policies

Ultimately, security is about people

Which jurisdiction limits its privacy protections to those established only by sector-specific statutes? a. United States b. Asia-Pacific Economic Cooperation c. European Union d. Canada

United States

According to Reynolds, ____________ are one's belief about right and wrong; the term ___________ describes standards or codes of behavior expected of an individual by a group to which the individual belongs; ... and _____________ are a system of rules that tell use what we can and cannot do. a. morals, ethics, laws b. ethics, laws, morals c. laws, morals, ethics d. morals, laws, ethics e. ethics, morals, laws

morals, ethics, laws

Morality is a system of ____________ rules and standards whose content is studied by ethicists. a. descriptive b. prescriptive c. theological d. normative

normative

Of the following outcomes, which would be the one most preferred by someone applying utilitarianism? a. Twenty people each get $1 million; b. or one person gets $21 million and others get nothing; c. or allocate the money in a way that makes the most people happy; d. or give money to a charity.

or one person gets $21 million and others get nothing

A __________ is a grant by the federal government upon the inventor of an invention for the exclusive right to use, sell, or license the invention for a limited amount of time. a. copyright b. trade secret c. patent d. trademark

patent

A(n) ___________ is an agreement in which the accused admits to a lesser crime than charged, and in return, the government agrees to impose a lesser sentence than might have been obtained had the case gone to trial. a. nolo contendere b. plea bargain c. arraignment d. indictment

plea bargain

A promise lacks consideration if a person promises to perform an act or do something he is already under an obligation to do. This is called a(n) ____________. a. illusory promise b. preexisting duty c. gift promise d. illegal consideration

preexisting duty

A(n) _____________ is an equitable doctrine whereby a court may award monetary damages to a plaintiff for providing work or services to a defendant even though no actual contract existed. a. implied-in-fact contract b. bilateral contract c. quasi-contract d. common law of contracts

quasi-contract

According to the objective theory of contracts, the intent to enter into an express or implied-in-fact contract is judged by the _____________. a. common law of contracts b. doctrine of equity c. legality of the contract d. reasonable person standard

reasonable person standard

Consistency and _____________ are the two principles of Kantian ethics that states that a person must abide by the rule he/she uses to judge the morality of someone else's conduct. a. utilitarianism b. relativity c. reversibility d. perspectivism

reversibility

Which of the following would be considered an offer to form a unilateral contract? A. advertisement B. reward offer C. auction without reserve D. auction with reserve

reward offer

In terms of U.S. employee's workplace privacy rights, all of the following are acceptable monitoring techniques available to employers except

secret surveillance

Gary Govetty is a famous movie star. A tabloid published an interview with his ex-girlfriend in which she falsely claimed that Gary was completely bald and had been wearing a wig for several years. Gary can sue his ex-girlfriend for ___________. a. slander b. invasion of the right to privacy c. tort of appropriation d. negligent infliction of emotional distress

slander

An award of __________ orders the breaching party to perform the acts promised in a contract. a. reformation b. specific performance c. restitution d. injunction

specific performance

Data Confidentiality, Data Availability, and what other attribute comprise the three key attributes of information auditing and monitoring? a. Data retention b. Data security c. Data consistency d. Data integrity

Data integrity

Which human resources data element is not generally considered personal data? a. Employee evaluation b. Salary c. Job title d. Department assignment

Department assignment

What agency oversees the welfare of job seekers, wage earners and retirees?

Department of Labor

In terms of data breaches, most problems occur at the:

Disposal Stage

___________ is a situation in which one party threatens to do a wrongful act unless the other party enters into a contract. a. Duress b. Battery c. Assault d. Scienter

Duress

The ___________ recognizes electronic contracts as meeting the writing requirement of the Statue of Frauds for most contracts. a. Uniform Computer Information Transaction Act b. Uniform Commercial Code c. Communications Decency Act d. E-SIGN Act

E-SIGN Act

Which is NOT a method used for combating spam? a. Network protection software b. Anti-virus software c. Encryption d. Firewall

Encryption

What is NOT a privacy risk raised by the use of smart grid technology? a. Energy use data could be shared with law enforcement without disclosure b. Energy use information obtained by a hacker could indicate when a residence is occupied or empty c. Energy use for individual homes could be shared for behavioral marketing purposes without the consumer's permission d. Energy use could increase due to continuous monitoring by energy companies

Energy use could increase due to continuous monitoring by energy companies

____________ is a moral theory which holds that individuals must decide what is ethical based on their own feelings about what is right and wrong. a. Rawls's social justice theory b. Utilitarianism c. Kantian ethics d. Ethical relativism

Ethical relativism

In "phishing" which practices are used to collect personal information? a. Fake e-mails contain links to websites that only appear to be genuine and request personal information b. Fraudulent websites secretly install malware on site visitor's computers that automatically collect personal information c. Malware attached to freely downloaded games and apps secretly installing keylogging software that collects passwords and account numbers d. Anonymous e-mails contain elaborate stories of available unclaimed funds with requests for participation in transfers.

Fake e-mails contain links to websites that only appear to be genuine and request personal information

True or False: All 50 states have data breach disclosure laws except California.

False

True or False: An employer can ask and can receive your password to your social media accounts.

False

True or False: An employer can ask and can recieve your password to your social media accounts.

False

True or False: Cyber insurance is necessary for corporations to establish an incident response plan.

False

True or False: Per FERPA, even if the student gives consent, the parents cannot see the educational records of the students.

False

True or False: Search warrants can be issued for both civil and criminal cases.

False

True or False: The Federal Trade Commission can bring actions against "unfair and deceptive" acts and "abusive acts and practices."

False

True or False: The Protection of Pupil Rights Amendment (PPRA) applies to elementary, secondary and postsecondary schools.

False

True or False: There are Federal laws that protect employee's emails from being accessed by their employer, if they are stored on the company's server.

False

True or False: Trap & trace devices record the phone numbers that you call, while pen registers record the numbers that call you.

False

Which statement is true about the requirements under the U.S. Gramm-Leach-Bliley Act (GLBA)?

Financial institutions can share customer information with non-affiliated third-party companies without obtaining an opt-in from the customer.

The "exclusionary rule" prevents evident from illegal seraches and seizures to be used in court. What Constitutional amendement did this rule derive from? a. Sixth b. Third c. Fourth d. Fifth

Fourth

16-year old Frank bought a video game console from John for $150. Frank is a minor, while John is a competent adult. A month later, the console started malfunctioning on its own. Frank returned the console to John. If Frank disaffirms his contract with John for buying the console, which of the following will be considered true? a. Frank is legally obligated to fix the console before returning it to John b. Frank can reclaim full refund of the amount he paid c. John is not bound by the contract any more as the exchange has been completed d. Frank can only ask for full refund once he has reached the age of majority

Frank can reclaim full refund of the amount he paid

All of the following are considered acceptable methods for U.S.-based multinational transportation companies to achieve compliance with the EU Data Protection Directive except: a. Binding corporate rules b. Model contracts c. Safe Harbor d. Global consent

Global consent

What was the first case where the US Safe Harbor rules were enforced?

Google, Inc.

In criminal cases, the plaintiff is the ______.

Government

What does HIPAA stand for and who does to apply to?

Health Insurance Portability Accountability Act, covered entities.

Which of the following can access Henry's stored electronic communications without violating the ECPA? a. Henry's colleague at work, who is working on the same project as Henry and needs the information. b. Henry's wife, who suspects him of cheating on her c. Henry's boss, who suspects him of leaking confidential information d. Henry's personal financial advisor, who wants to see if he has sufficient funds to make an investment

Henry's boss, who suspects him of leaking confidential information

An incident management system has what four elements? a. Contain, Remediate, Train, Employ b. Comply, Research, Notify, Prevent c. Identify, Analyze, Correct, Prevent d. Research, Analyze, Correct, Prevent

Identify, Analyze, Correct, Prevent

Descartes' rule of change is: [Select all that apply] a. If an action achieves the greatest good for all, it is the correct action to take. b. If an action is most consistent with duty as seen by the actor, it is the correct action to take. c. If an action cannot be taken repeatedly, it is not right to take it at all. d. If an action results in a positive change, it is the correct action to take. e. Also known as the slippery-slope rule

If an action cannot be taken repeatedly, it is not right to take it at all. Also known as the slippery-slope rule

The two sector-specific privacy regulations enforced in the US are the Gramm-Leach-Billey Act and a. the Personal Information Privacy Act b. the National Privacy Principle c. the Data Protection Act of 1998 d. the Health Insurance Portability & Accountability Act

the Health Insurance Portability & Accountability Act

Security laws in the U.S. states often restrict

the display of Social Security numbers on identification cards.

Under which of the following conditions is a contract said to have legal value? a. the promisor receives a legal benefit b. the promisor suffers a legal detriment c. both promisor and promisee suffers a legal detriment d. both promisor and promisee receives a legal benefit

the promisor receives a legal benefit

Which of the following theories of morality is Rawls's Social Justice Theory fundamentally derived from? a. the theory of ethical fundamentalism b. the social contract theory c. the theory of utilitarianism d. the theory of moral relativism

the social contract theory

According to ethical relativism, ___________ a. people must choose an action or follow a rule that provides the greatest good to society b. there are no universal ethical rules to guide a person's conduct c. ethics rely on duties based around universal rules which one is morally bound to follow d. each person is presumed to have entered into a social contract with all others in society to obey moral rules

there are not universal ethical rules to guide a person's conduct.

A closely guarded formula for a recipe protected by a soft drink manufacturer would be considered as an example of a _____________. a. trade secret b. copyright c. patent d. trademark

trade secret

What three areas did the FTC emphasize in their 2012 report, "Protecting Consumer Privacy in an Era of Rapid Change?" [Select all that apply] a. transparency. b. self-regulation. c. privacy by design. d. data classification. e. simplified consumer choice.

transparency. privacy by design. simplified consumer choice.

A ____________ is an order of the court that orders that wages, bank accounts, or other property of the breaching party held by third persons be paid to the nonbreaching party to satisfy a judgement. a. liquidation of damages b. writ of attachment c. writ of garnishment d. specific performance

writ of garnishment

Which of these elements may be considered personal information? a. The physical location of a company's headquarters b. The information relating to a company's primary competitors c. Company's financial information disclosed on its website d. Information about a company's leads or propects

Information about a company's leads or propects

For the FTC to consider a practice "unfair" it must meet which of the following criteria: [Select all that apply] a. It must be without offsetting benefits b. The injury caused must be substantial c. It must be a practice that consumers cannot reasonably avoid.

It must be without offsetting benefits The injury caused must be substantial It must be a practice that consumers cannot reasonably avoid.

A theory of cyberethics proposed by Moor that combines both considerations of consequences of actions and consideration of duty is: a. Outcome and Duty b. Outcome-action c. Just-Consequentialism d. Consequentialism-Just

Just-Consequence

Act always on that maxim or principle (or rule) that ensures that all individuals will be treated as ends-in-themselves and never merely as a means to an end. This is the principle tenet of: a. Contract Theory b. Virtue Theory c. Utilitarianism d. Kant's Deontology

Kant's dentology

Consistency is one of the two important principles of ______________ upon which its universal laws based. a. moral relativism b. Kantian ethics c. utilitarianism d. Rawl's social justice theory

Kantian Ethics

Which of the following moral theories would closely follow the categorical imperative "Do unto others as you would have them do unto you?" a. Kantian ethics b. moral relativism c. utilitarianism d. Rawls's social justice theory

Kantian ethics

_________ is a moral theory which says that people owe moral duties that are based on universal rules. a. Kantian ethics b. Moral relativism c. Utilitarianism d. Rawls's social justice theory

Kantian ethics

Which of the following constitute a mutual mistake of a material fact? a. Martha and Graham agreeing on the sale of a house, both referring to different houses b. Martha selling her house to Graham and hiding the fact that its first floor is damaged c. Martha selling Graham an old vase for $20, both of them unaware that it is a valuable antique collectible d. Graham buying a house from Martha without asking her details of damages

Martha and Graham agreeing on the sale of a house, both referring to different houses

Martha contracts a bakery to get a cake for her son's birthday party. She tells the baker that she will pay him $150 for the cake if he delivers the cake on Friday evening.If the baker does not deliver the cake on Friday evening, which of the following will hold true? a. Martha can sue the baker but cannot recover damages b. The baker has to give $150 plus cost of the replacement cake to Martha as he entered into a verbal contract with her c. Martha cannot sue the baker d. Martha can sue the baker to recover $150 in damages

Martha cannot sue the baker

What safeguards should be implemented under the Gramm-Leach-Billey Act (GLBA) to protect data? a. Monitor and implement test controls internally with third parties b. Only protect information that is covered under the GLBA rules c. Annually communicate the safeguards to the relevant workforce d. Allow individuals to securely obtain access to all information

Monitor and implement test controls internally with third parties

The Do Not Call rules apply for all companies except: a. Calls beyond the telemarketer's 31 day call list b. Nonprofits calling on their own behalf c. Calls to former customers having an existing business relationship within the last 19 years d. Outbound calls for "upselling" additional products or services.

Nonprofits calling on their own behalf

Premise 1: Every A is a B; Premise 2: Every C is a A; Conclusion: C is a B. This is an example of a(n); a. Valid Logic Form b. Invalid Logic Form c. Inconsistent Argument d. Logically inconsistent form

Valid Logic Form

Acquiring the "correct" moral habits is the hallmark: a. Virtue Ethics b. Utilitarianism c. Contract Theory d. Kant's Deontology

Virtue Ethics

According to the HITECH Act of 2009, when does a company have to disclose a breach of PI to the Dept. of Health and Human Services? a. When the breach is <500 people b. Up to 60 days after a defined breach c. When the breach is >500 people d. When the breach is in the same jurisdiction

When the breach is >500 people

As it pertains to risk, where can the privacy vulnerabilities be easily found? a. When you assign data accountabilities b. When you inventory the data c. When you create the data flows d. When you perform the data classifications

When you create the data flows

What is the correct process for building an information management privacy program?

Whether counsel for both parties are based in the U.S.

Which new data element with new privacy-related issues has emerged in the telecommunications sector? a. Ghosting b. Burst transmissions c. Location d. Registers

Location

Bank Secrecy Act 1970 requires financial institutions to file reports of cash purchases of negotiable instruments of more than? a. $10,000 US Dollars b. $5,000 US Dollars c. $100,000 US Dollars d. $50,000 US Dollars

$10,000 US Dollars

The "reasonable expectation of privacy" test is:

1) the person has an actual expectations of privacy and ; 2) the expectation is one that society is prepared to recognize as reasonable.

Under the Fair Credit Reporting Act, Consumer Reporting Agencies cannot retain negative information for previous bankruptcies beyond:

10 years

As explained in the Telemarketing Sales Rule, a telemarketer is limited to calling between the hours of: a. Anytime, as long as its been submitted to the FTC b. 8am and 9pm, local time c. 8am and 9:30pm, local time d. 7:30am and 9pm, local time

8am and 9pm, local time

The average breach by malware has a "dwell time" on the system of:

>200 days.

Which of the following is true of misrepresentation? a. An innocent party need not prove economic injury to recover damages for fraud b. A misrepresentation is not actionable unless the innocent party relied on the misrepresentation and acted on it c. An innocent party who acts in reliance on a misrepresentation need not justify hid/her reliance d. An innocent party must prove that the wrongdoer's misrepresentation was the sole reason he/she entered into the contract

A misrepresentation is not actionable unless the innocent party relied on the misrepresentation and acted on it

Below is from a BBC online article written by Craig Jeffrey, 9 November 2014, titled, "The Students Who Feel They Have The Right to Cheat." "It is our democratic right!" a thin, addled-looking man named Pratap Singh once said to me as he stood, chai in hand, outside his university in the nothern state of Uttar Pradesh. "Cheating is our birthright." Corruption in the university exam system is common in this part of India. The rich can bribe their way to examination success. There's even a whole subset of the youth population who are brokers between students and avaricious administrators. Then there's another class of student altogether, who are so well known locally- so renowned for their political links- invigilators dare to touch them. I've heard that these local thugs sometimes leave daggers on their desk in the exam hall. It's a sign to invigilators: "Leave me alone... or else." So if those with money or political influence can cheat, poorer students ask, why shouldn't they? This is a fallacious argument based on:

Appeal to the People Fallacy

The majority of Americans believe that it is perfectly acceptable to share copyrighted music over the Internet. So, despite the objections of greedy entrepreneurs in the recording industry, networks should be allowed to serve the the wishes of the American people. This is an example of the: a. Many-to-Any Fallacy b. Virtuality Fallacy c. Ambiguity-Equivocation Fallacy d. Mob Fallacy e. Appeal to the People Fallacy

Appeal to the People Fallacy

At the heart of a moral system are rules for guiding behavior. Which of the following is not a source of these rules? [Select all that apply] a. Cognitive System b. Logic System c. Religious System d. Legal System e. Philosophical System

Cognitive System Logic System

Which model is used for privacy protection in the European Union? a. Co-regulatory model b. Sectoral model c. Comprehensive model d. Principal model

Comprehensive model

___________ place the nonbreaching party in the same positions as if the contract had been fully performed. a. Tort damages b. Nominal damages c. Compensatory damages d. Consequential damages

Compensatory damages

Professional codes of conduct have been criticized, but Gotterbam suggests that some of this criticism might be eliminated if these codes are thought of as serving which of the following functions. [Select all that apply] a. Codes of Ethics b. Codes of Conduct c. Codes of Practice d. Codes or Expertise

Code of Ethics Code of Conduct Code of Practice

The ESPN broadcast Erin Andrews that won her case against the defendant that put a "peeping hole" into her hotel room is an example of what tort action. a. Defamation b. Publicity given to private life c. Intrusion upon conclusion d. Libel

Intrusion upon conclusion

Which of the following is a perceived disadvantage of Kantian ethics? a. It is based on universal rules that have no common consensus b. It treats morality as if it were an impersonal mathematical calculation c. It distinguishes between the morality one uses to judge others and the morality one uses on oneself d. It does not allow people to have subjective notions of right or wrong

It is based on universal rules that have no common consensus

Luke offered to sell his farm to Kent at $75,000, an offer which Kent declined. A week later, Luke offered to sell the farm for $65,000, stating that it was the final offer, it was valid for one month, and that he would not alter it. Two days later, Kent replied by saying that he was willing to pay $60,000 for the farm. A week after Luke received Kent's offer. Luke declined it. Ten days after that, Kent agreed to buy the farm for $65,000, but Luke refused to sell the farm. Kent decided to sue Luke for a breach of contract. The judge ruled in favor of Luke. Which one of the following is the reason for the ruling in Luke's favor? a. Luke's original offer of $75,000 is still valid, even though rejected b. Kent's acceptance was past the set time period in the offer c. Kent acted in an incompetent manner with regards to the offer d. Kent's counteroffer of $60,000 had rendered the offer for $65,000 invalid

Kent's counteroffer of $60,000 had rendered the offer for $65,000 invalid

Section 2A-201(1) of the Uniform Commercial Code states which of the following? a. Lease contracts involving payments of $1,000 or more must be in writing b. Sales contracts involving payments of $500 or more must be in writing c. All lease contracts must be in writing d. All sales contracts must be in writing

Lease contracts involving payments of $1,000 or more must be in writing

A privacy notice does NOT relate to which principle of the information lifecycle? a. Use and retention b. Collection c. Disclosure d. Monitoring and enforcement

Monitoring and enforcement

___________ is a social responsibility theory of business which says that a corporation must consider the effects its actions have on persons other than its shareholders. a. Stakeholder interest b. Corporate citizenship c. Moral minimum d. Maximizing profits

Stakeholder interest

According to Spinello, there are four constraints on cyberspace activities (behavior). Which of the following is not one of these constraints? a. Code b. Law c. Market d. Standards e. Norm

Standards

What does the U.S. legal concept of "preemption" mean?

States are prevented by federal law from enforcing laws that impose different or stricter laws in the same area.

___________ is a situation in which a party to a contract renders performance exactly as required by the contract. a. Anticipatory repudiation b. Substantial performance c. Strict performance d. Restitution

Strict performance

Safe Harbor violations are enforced by the Federal Trade Commission and what other government department? a. The US Department of Labor b. The US Department of Commerce c. The US Justice Department d. The US Department of Transportation

The US Department of Transportation

Bobby voluntarily enrolls in a skydiving course at OpenSkies Pvt. Ltd., and adventure firm. He signs a contract that relieves OpenSkies of liability. After receiving proper instruction, he jumps from an airplane. Unfortunately, Bobby is injured when he could not steer his parachute toward the target area while landing. He sues the parachute center for damages. But the court found that the contract protected OpenSkies from damages, as Bobby had voluntarily joined the course knowing all the risks involved. What kind of contractual provision protected OpenSkies from having to pay Bobby damages? a. disaffirmance b. noncompete clause c. exculpatory clause d. duty of restitution

exculpatory clause

Contracts that have been fully performed by one side but not by the other are classified as ___________ contracts. a. executed b. voidable c. void d. executory

executory

Intentional misrepresentation is commonly referred to as ______________. a. erroneous misrepresentation b. undue influence c. duress d. fraud

fraud

How are ethical rules established in Rawls's social justice theory? a. by a set of universal rules based on consistency and reversibility b. by the ruling class or people in advantageous positions c. by following what's best for the society as a whole d. from an original position of a veil of ignorance

from an original position of a veil of ignorance

Alan is a subject matter expert for First University, with an employment contract of three years. Two years into the contract, Second University- fully aware of Alan's contract- offers him twice the money he currently makes for a similar post. Alan takes the job. First University can recover damages from Second University for which of the following torts? a. malicious inducement of contractual breach b. breach of the covenant of good faith and fair dealing c. malicious breach of contractual relations d. intentional interference with contractual relations

intentional interference with contractual relations

When a party commits an anticipatory breach, the nonbreaching party ______________. a. loses his/her right to after the due-date for performance is reached b. cannot seek damages because he/she received advance notice of the breach c. is immediately discharged from his/her own duties d. must wait until the performance was due before suing

is immediately discharged from his/her own duties

Which of the following is an apparent disadvantage of utilitarianism? a. it puts too much emphasis on one book or theory b. it does not allow people to have subjective notions of right and wrong c. it treats morality as if it were an impersonal mathematical calculation d. it is based on moral duties derived from universal rules

it treats morality as if it were an impersonal mathematical calculation

According to _____________, keeping a promise to abide by a contract is a moral duty even if that contract turns out to be detrimental to the obligated party. a. Rawls's social justice theory b. moral relativism c. kantian ethics d. utilitarianism

kantian ethics

A contract is ___________ if the offeror's offer can be accepted only by the performance of an act by the offeree. a. unilateral b. bilateral c.implied-by-law d. executory

unilateral

In which of the following cases is parol evidence admitted by a court? a. when the defendant does not wish to appeal b. when the plantiff reduces the value of damages he expects c. when the defendant takes the case to the appellate court d. when the evidence explains ambiguous language

when the evidence explains ambiguous language

Under which of the following conditions does a promissory estoppel provide for the enforceability of an oral contract? a. when the promise induces action or forbearance of action by another b. when the oral promise provides for reduced damages to the defendant c. when the reliance on the oral promise was unforeseeable d. when enforcing the oral promise provides for faster resolution of the case

when the promise induces action or forbearance of action by another


संबंधित स्टडी सेट्स

Fundamentals Mobility/Safety EAQ

View Set

ECPI 2020 NUR164 CHAPTER 4 HEALTH OF THE INDIVIDUAL, FAMILY AND COMMUNITY

View Set

intro to psych chapters 6,7, & 10

View Set

Diving First Aid for Professional Divers (Chapter Review Questions)

View Set

ATI Dosage Calculations Critical Care Medications

View Set