Ethics chap9
the major disadvantage of the Financial Service Modernization Act of 1999 is,
It empowered financial companies to develop exceptionally detailed profiles of their customers
A technique that lures prey into revealing passwords and other private data by providing a convincing offer is called a. nunmg. b. phishing. c. data trapping. d. ultra-collecting
Phishing
Motorists who use cell phone - 4 times more
Texting -23 times worse than not distracted
The value of stem cells is
They offer the greatest hope for developing treatments for diseases such as cancer, Alzheimer's , Parkinson's, and juvenile diabetes.
Which of the following is not an undesirable side effect of technology? a. environmental pollution b. creation of unsatisfying work c. clash of cultural and religious forces d. depletion of natural resources
clash of cultural and religious forces
Human cloning is illegal in the United States. a. True b. False
false
Which of the following is not a way that businesses attempt to protect consumers' privacy? a. ethical leadership b. privacy policies c. periodic purges of databanks d. chief privacy officers
periodic purges of databanks
The primary tool that bioethicists use is called
proceduralism. It involves elaborate protocols that certain classical worries, such as informed consent, are not being violated.
examples of sensitive data likely to be stolen from social networking web sites such as Facebook, Twitter, LinkedIn, Pinterest, and others are, e-mail addresses, contact lists, birthdays,hometowns, and mother's maiden name, which all then become useful for
targeting specific victims
The imperative that states "what can be developed will be developed" is a. economic determinism. b. technological determinism. c. the iron law of technology. d. rationality.
technological determinism
EDR(Event Data Recorder)
they were initualy designed to analyze the cause and effect of crashes to improve safety,but their data has many other usages, we need to be aware of how we are being tracked
Companies use technology through the use of cookies and spam to invade consumer privacy. a. True b. False
true