Ethics Quiz Questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following are characteristics of a mature profession? Select all that apply. Question 2 options: mandatory drug testing code of ethics licensing mandatory professional development continuing professional education

-code of ethics -licensing -mandatory -professional development -continuing professional education

Which of the following apply to the Family Education Rights and Privacy Act? Select all that apply. Question 20 options: gives instructors the right to post student grades on Facebook gives instructors the right to inform parents about their child's grades without consent. gives students 18 years of age and older the right to request corrections to errors in their educational records. gives students 18 years of age and older the right to review their educational records. gives students 18 years of age and older the right to prevent educational records from being released without their permission, except under certain circumstances.

-gives students 18 years of age and older the right to request corrections to errors in their educational records. -gives students 18 years of age and older the right to review their educational records. -gives students 18 years of age and older the right to prevent educational records from being released without their permission, except under certain circumstances.

Which of the following apply to the Financial Services Modernization Act? Select all that apply. Question 18 options: requires banks to inform consumers how they can "opt out" of having their confidential information released to other companies. requires banks to develop policies that will prevent unauthorized access of customers' confidential information. allows banks to offer insurance and stock brokerage services. makes opting out of paperless billing a federal offense. requires banks to disclose their privacy policies to consumers.

-requires banks to inform consumers how they can "opt out" of having their confidential information released to other companies. -requires banks to develop policies that will prevent unauthorized access of customers' confidential information. -allows banks to offer insurance and stock brokerage services. -requires banks to disclose their privacy policies to consumers.

The Patriot missile system Question 4 options: was designed to shoot down airplanes. failed to shoot down a Scud missile that killed 28 U.S. soldiers in the Gulf War. failed because it had been left running too long. was a deciding factor in the American Civil War. failed because of a computer error.

-was designed to shoot down airplanes. -failed to shoot down a Scud missile that killed 28 U.S. soldiers in the Gulf War. -failed because it had been left running too long. -failed because of a computer error.

Which of these problems was not encountered by BAE as it tried to install an automated baggage handling system at Denver International Airport? Question 8 options: The bar code printers didn't print tags clearly enough to be read by the scanners. A key customer, United Airlines, kept changing the specifications of the system. The automated baggage handlers shredded some of the luggage. The system misrouted luggage carts. Workers painted over electric eyes installed in the underground tunnels.

A key customer, United Airlines, kept changing the specifications of the system.

Which of these events happened when Uber tested its self-driving car service in San Francisco? Question 14 options: Almost self-driving Lyft cars became jealous. Two self-driving Ubers collided with each other. A self-driving Uber ran a red light. Uber removed all of its safety operators from its self-driving cars. A self-driving Uber hit and killed a pedestrian.

A self-driving Uber ran a red light.

What happened when the FBI asked Apple to create a new version of the iOS operating system was would allow the FBI to gain access to the locked iPhone of Syed Rizwan Farook? Question 1 options: Apple denied the request and chose to fight the FBI in court. Apple created the new version of iOS but required FBI to bring the iPhone to Apple's headquarters in Cupertino to install it on the Farook's iPhone. Apple threatened to move its headquarters to Vancouver, Canada, unless the US government dropped its unreasonable request. Apple created the new version of iOS and gave the FBI a copy. Apple created the new version of iOS and made it publicly available, so not just the FBI would have a copy.

Apple denied the request and chose to fight the FBI in court.

In Carpenter v. United States, the US Supreme Court ruled that it is a violation of the Fourth Amendment when police or prosecutors access what kind of information without a search warrant? Question 23 options: Lists of numbers that have called the cell phone Recordings of cell phone conversations Cell phone location information Lists of numbers called by a cell phone Cell phone photos

Cell phone location information

The Social Security numbers and other personal information from 22 million Americans were stolen by hackers from computers managed by the Office of Personnel Management, and the prime suspect was a group of hackers located in Question 11 options: China. Iran. Afghanistan. Russia. North Korea.

China.

Which of the following statements about the REAL ID Act is not true? Question 19 options: Between 70 and 80 percent of US drivers now hold licenses from states that meet the standards of the REAL ID Act. The REAL ID Act required states to issue new driver's licenses with stronger verification of identities before licenses are issued. Legislatures in about half the states passed laws or resolutions opposing the REAL ID Act. Congress repealed the REAL ID Act after many states refused to issue new driver's licenses. The driver's licenses mandated by the REAL ID Act have security features designed to prevent tampering, counterfeiting, and duplication. Question 20 (1 point)

Congress repealed the REAL ID Act after many states refused to issue new driver's licenses.

Which of the following laws does not provide some sort of authorization for governmental wiretapping? Question 11 options: Electronic Communications Privacy Act USA PATRIOT Act Federal Communications Act Title III of the Omnibus Crime Control and Safe Streets Act Communications Assistance for Law Enforcement Act

Federal Communications Act

Which of the following statements about the fatal Tesla accident involving Joshua Brown is not true? Question 13 options: Autopilot's radar mistook the tractor trailer for an overhead sign. The "autopilot" feature was engaged. Foggy conditions made visibility poor. The Tesla was speeding. Brown did not have his hands on the steering wheel.

Foggy conditions made visibility poor.

What was the original purpose of Operation Shamrock? Question 10 options: Identify Irish-Americans raising money for the IRA. Read all letters going between the United States and Ireland. Scan email messages to identify drug dealers. Wiretap all calls made from public telephone booths. Intercept all international telegrams entering or leaving the United States.

Intercept all international telegrams entering or leaving the United States.

Which mistake was not made by AECL, the manufacturer of the Therac-25? Question 12 options: AECL made all of these mistakes, and more. It reused code without proper testing. It did not include software or hardware devices to detect and report overdoses. It did not tell other hospitals about possible overdose incidents. It continued to sell the Therac-25 after the FDA declared it to be defective.

It continued to sell the Therac-25 after the FDA declared it to be defective

After the terrorist attacks of September 11, 2001, which U.S. governmental agency collected telephone call records of tens of millions of Americans without a court order? Question 12 options: Federal Communications Commission Federal Bureau of Investigation Department of Homeland Security National Security Agency Central Intelligence Agency

National Security Agency

The Principles and Clauses in the Software Engineering Code of Ethics and Professional Practice Question 6 options: address every ethical dilemma a software engineer may face. provide algebraic formulas for determining the best course of action. incorporate every relevant feature into the formulas. All of the above None of the above

None of the above

According to records leaked to the Guardian newspaper, which of the following kinds of information were not released by Verizon to the National Security Agency? Question 13 options: Date of the telephone call Duration of the telephone call Recording of the conversation Location of the telephone making the call Time of the telephone call

Recording of the conversation

The Internet worm was released by Question 7 options: Bruce Sterling. Robert Morris, Jr. Katie Hafner. John Markoff. John Barlow.

Robert Morris, Jr.

Which of these statements about the National Crime Information Center (NCIC) is true? Question 1 options: The NCIC databases contain about 40 million records. It is based in China. The Department of Homeland Security is in charge of the NCIC. Improper use of the NCIC has led to about 1 million false arrests. Local law enforcement agencies enter 99 percent of the information that is in the NCIC databases.

The Department of Homeland Security is in charge of the NCIC.

Which of the following precepts is not part of the Code of Fair Information Practices? Question 15 options: There must be a way for a person to collect damages for financial losses caused by incorrect information about that person stored in a data record-keeping system. There must be no personal data record-keeping systems whose very existence is secret. There must be a way for a person to correct or amend a record of identifiable information about the person. There must be a way for a person to prevent information obtained for one purpose being used or made available for other purposes without the person's consent. There must be a way for a person to find out what information about the person is in a record and how it is used.

There must be a way for a person to collect damages for financial losses caused by incorrect information about that person stored in a data record-keeping system.

A program with a benign capability that conceals another, sinister purpose is called a Question 4 options: hack. rogue. virus. Trojan horse. worm.

Trojan horse.

An intentional action designed to prevent legitimate users from making use of a computer service over the Internet is called Question 10 options: a curtain closer. an electronic overdose. phreaking. a bombing run. a denial-of-service attack.

a denial-of-service attack.

Identifying a danger when in fact there is none is called Question 15 options: type XLII error. the "boy cries wolf" phenomenon. a false negative. having a "hair trigger" predisposition. a false positive.

a false positive.

Anonymous is Question 12 options: an activist group that promotes the interests of the Recording Industry Association of America. a loosely organized group of hacktivists that claimed responsibility for a DDoS attack on Church of Scientology Web sites. the name given to the People's Liberation Army group that was responsible for more than 100 intrusions around the world. Australian journalist and computer programmer, Julian Assange. he name of the group that launched the Stuxnet worm.

a loosely organized group of hacktivists that claimed responsibility for a DDoS attack on Church of Scientology Web sites.

The Census Bureau has not always kept confidential the information it has collected. According to the textbook, this became apparent Question 5 options: after the attack on Pearl Harbor. during the first Gulf War. during the Civil War. during the Vietnam War. after September 11, 2001.

after the attack on Pearl Harbor.

A computer used as a component of a larger system is called Question 2 options: a network. a mainframe computer. an embedded system. an operating system. a personal computer.

an embedded system.

The Health Insurance Portability and Accountability Act Question 22 options: ensures that doctors and hospitals can counter sue patients who file frivolous medical malpractice claims. ensures that a consumer can sue doctors and hospitals for medical malpractice. attempts to limit the exchange of information among health care providers to that information necessary to care for the patient. ensures that all health insurance services are available as an Android app. ensures that a consumer can keep the same health care provider even when he or she changes employers.

attempts to limit the exchange of information among health care providers to that information necessary to care for the patient.

A software program that responds to commands sent by a command-and-control program located on an external computer is called a Question 8 options: bot. spoof. worm. virus. vampire.

bot.

The Ariane 5 satellite launch vehicle failed because Question 5 options: a faulty on-board computer caused the other computers in the network to crash repeatedly. a software failure caused the rocket to self-destruct when in actuality the rocket's flight was going perfectly. the rocket's on-board computer sent back faulty information to ground control, causing the human controllers to destroy the rocket. code that worked correctly on the Ariane 4 failed on the Ariane 5. a bad sensor fed faulty information into the flight control computer, causing it to fail.

code that worked correctly on the Ariane 4 failed on the Ariane 5.

The FBI's National Crime Information Center database Question 6 options: is updated only once a week to give the FBI time to check the accuracy of the data. is entirely non-digital for security purposes. has never led to a false arrest. consists of 21 files with more than a million records. has information about every American citizen.

consists of 21 files with more than a million records.

Unlike most professionals, the typical software engineer Question 4 options: does not have expert knowledge. does not have a college education. does not make more than minimum wage. does not work directly with individual clients. does not interact with other professionals.

does not work directly with individual clients.

The Fair and Accurate Credit Transactions Act Question 17 options: makes it possible for a consumer to declare bankruptcy without harming his or her credit rating. ensures that people with criminal convictions are still able to obtain credit. allows credit bureaus to sell personal financial information they have gathered. gives consumers the right to request a free copy of their credit report every year. allows consumers to choose what is included in their credit reports.

gives consumers the right to request a free copy of their credit report every year.

The OneDOJ database Question 7 options: is a national database that consolidates records from federal, state, and local law enforcement agencies. combines records from all U.S. governmental agencies into a single database that can be used by data mining by the FBI. received the endorsement of the ACLU for its innovative privacy-protection measures. gives state and local police officers access to information provided by five federal law enforcement agencies. is the first database created by the U.S. government that completely implements the Code of Fair Information Practices.

gives state and local police officers access to information provided by five federal law enforcement agencies.

According to Michael McFarland, a team of engineers Question 9 options: has the same amount of moral accountability as its members. should always defer to management when ethical evaluations are being made. has more moral accountability than any of its members. should always designate a single person to be the ethical "watchdog." has less moral accountability than any of its members.

has more moral accountability than any of its members.

You may find a virus Question 5 options: in a download. in an email attachment. on a CD-ROM. on a hard disk. on a thumb drive.

in a download. in an email attachment. on a CD-ROM. on a hard disk. on a thumb drive.

Which of the following is not one of the categories in Daniel Solove's taxonomy of privacy? Question 1 options: invasion. information processing. information dissemination. information filtering. information collection.

information filtering.

The Fair Credit Reporting Act Question 16 options: makes it possible for a consumer to declare bankruptcy without harming his or her credit rating. ensures that information about criminal convictions does not haunt a consumer's credit report forever. authorizes state governments to issue interest-free credit cards. gives consumers the right to request a free copy of their credit report every year. is designed to promote the accuracy of credit reports.

is designed to promote the accuracy of credit reports.

The Conficker worm is notable because Question 6 options: it is a native insect of Central America. it shut down the White House Web site for three days. it is Cuba's first attempt at cyberwarfare. it is the fastest spreading worm of all time. it continues to infect computers many years after it was first discovered.

it continues to infect computers many years after it was first discovered.

The USA Freedom Act, passed in 2015, is significant because Question 14 options: it authorized the National Security Agency to collect customer telephone call records in bulk. it put new restrictions on the government's surveillance activities. it prohibited any federal or state police agency from recording telephone calls made by members of Congress, even with a warrant. it authorized the National Security Agency to record telephone calls of all Americans. it made permanent the surveillance activities begun under the USA PATRIOT Act.

it put new restrictions on the government's surveillance activities.

The process giving someone the legal right to practice a profession is called Question 3 options: matriculation. professional ethics. professional development. licensing. certification.

licensing

Whistle-blowers Question 7 options: make an unauthorized disclosure about a harmful situation or fraud. typically get promoted to management. are usually financially rewarded by their organizations for their integrity. describe a privileged position within an orchestra. usually gain the respect and admiration of their colleagues.

make an unauthorized disclosure about a harmful situation or fraud.

According to the Employee Polygraph Protection Act, which organization(s) cannot administer lie detector tests to job applicants? Select all that apply. Question 2 options: most private employers local governments state governments federal government private companies whose business is moving cash or drugs

most private employers

The AT&T long-distance network did not collapse entirely on January 15, 1990, because Question 6 options: the faulty computers shut themselves off before they could do any further damage. the U.S. Secret Service arrested the culprits before they could do any further damage. MCI loaned some equipment to AT&T. AT&T technicians rapidly fixed the software bug in the routing switches. not all the routing switches had been converted to the latest software.

not all the routing switches had been converted to the latest software.

Mizuho Securities lost $225 million when Question 9 options: a bug in its currency trading system caused it to sell yen and purchase dollars when it should have purchased yen and sold dollars. hackers broke into its trading system and raided the accounts of 10,000 of its most important customers. it tried unsuccessfully to automate the Tokyo Stock Exchange. a bug in its billing system caused it to send out improper invoices to 10,000 of its most important customers. one of its employees mistyped a sell order, and a bug in the Tokyo Stock Exchange trading program made it impossible to cancel the order.

one of its employees mistyped a sell order, and a bug in the Tokyo Stock Exchange trading program made it impossible to cancel the order.

The Mars Climate Orbiter crashed on the surface of Mars because Question 7 options: the extreme cold of deep space caused the computer to crash. before programmers went on strike at subcontractor Lockheed Martin, one of them sabotaged the flight control software. one program output thrust in terms of foot-pounds, and another program expected thrust to be expressed in terms of newtons. the probe lost contact with the Jet Propulsion Laboratory when it entered the Martian atmosphere. a bug in the computer program caused the vehicle to consume too much fuel on the way to Mars, leaving an inadequate supply for landing.

one program output thrust in terms of foot-pounds, and another program expected thrust to be expressed in terms of newtons.

The discipline focused on the production of software, as well as the development of tools, methodologies, and theories supporting software production, is most accurately called Question 17 options: computer engineering. software simulation. artificial intelligence. computer science. software engineering.

software engineering.

The Genetic Information Nondiscrimination Act Question 4 options: provides subsidies to private citizens who wish to take a DNA test. requires US citizens to submit to an annual DNA test. applies to all private employers, but not state or federal agencies. ensures a life insurance company cannot take genetic information into account when making a decision about underwriting a policy. prohibits most employers from taking genetic information into account when making hiring, firing, promotion, or other employment-related decisions.

prohibits most employers from taking genetic information into account when making hiring, firing, promotion, or other employment-related decisions.

The Video Privacy Protection Act Question 21 options: protects homemade videos from entering public record makes it legal to send "adult" DVDs through the mail without a warning label on the envelope. prohibits DVD manufacturers from installing software that sends reports over the Internet every time a DVD is played. prohibits video stores from disclosing rental records without the written consent of the customer. prohibits the government from prosecuting minors who play "adult" DVDs in their own home.

prohibits video stores from disclosing rental records without the written consent of the customer.

Computers that process data from sensors as events occur are called Question 3 options: event-driven simulations. distributed computers. real-time systems. pseudo-sensory systems. time-activated systems.

real-time systems.

By making the PDP 11 minicomputer an integral part of the Therac-25, AECL was able to Question 11 options: provide a VT100-based user interface. increase the stock price of its subsidiary Digital Equipment Corporation. shrink the size of the machine considerably. eliminate the need for lead shielding. reduce costs by replacing hardware safety features with software safety features.

reduce costs by replacing hardware safety features with software safety features.

The Children's Online Privacy Protection Act Question 3 options: makes it illegal for children 12 years and younger to participate in chat rooms. makes it illegal for an online service to request a credit card number from a child 17 years old and younger. requires online services to create aliases for all customers who are 17 years old and younger. requires online services to obtain parental consent before collecting any information from children 12 years old and younger. requires US citizens to register a Facebook account by age 9.

requires online services to obtain parental consent before collecting any information from children 12 years old and younger.

The Fourth Amendment to the United States Constitution has to do with Question 8 options: the right to bear arms. quartering of soldiers in private homes. search warrants. self-incrimination. freedom of speech and religion.

search warrants

Manipulating someone within an organization to gain access to confidential information is called Question 9 options: hacking. trashing. social engineering. phreaking. diving.

social engineering.

According to the textbook, which of the following careers is not an example of a mature profession? Question 1 options: dentist lawyer accountant doctor software engineer

software engineer

The Software Engineering Code of Ethics and Professional Practice was developed by Question 5 options: Immanuel Kant. a consortium of computer science departments in the United States, Canada, and Mexico. the Association for Computing Machinery and the Institute for Electrical and Electronics Engineers. John Rawls. Computer Professionals for Social Responsibility.

the Association for Computing Machinery and the Institute for Electrical and Electronics Engineers.

After Congress ruled that wiretapping was illegal Question 9 options: the FBI ceased all wiretapping activity. the CIA took over the job of wiretapping U.S. citizens. the FBI continued wiretapping people secretly. the FBI began wiretapping every member of Congress. the FBI convinced Congress to grant it an exemption from the ban.

the FBI continued wiretapping people secretly.

A principal factor contributing to the loss of the space shuttle Challenger was that Question 8 options: there were no experienced astronauts on board. NASA was experimenting with a new type of fuel. it was hit by lightning. the weather in Florida was unusually cold.

the weather in Florida was unusually cold.

Some computer experts have spoken out against the conversion to touch-screen voting machines because Question 10 options: the machine run Windows XP. they are made in China, which does not even hold elections. there is no evidence that there have been any problems with punched card systems. they do not have a paper audit trail. a power failure could make it impossible for people to vote.

they do not have a paper audit trail.

The process of determining if a model is an accurate representation of the real system is called Question 16 options: software engineering. synthesis. validation. verification. the null hypothesis.

validation.

A piece of self-replicating code embedded within another program is called a Question 2 options: rogue. hack. worm. virus. Trojan horse.

virus.

A self-contained program that spreads through a computer network by exploiting security holes is called a Question 3 options: worm. Trojan horse. hack. rogue. virus.

worm.


Set pelajaran terkait

Principles of Marketing Final Exam Review

View Set