Ethics chap9

Ace your homework & exams now with Quizwiz!

the major disadvantage of the Financial Service Modernization Act of 1999 is,

It empowered financial companies to develop exceptionally detailed profiles of their customers

A technique that lures prey into revealing passwords and other private data by providing a convincing offer is called a. nunmg. b. phishing. c. data trapping. d. ultra-collecting

Phishing

Motorists who use cell phone - 4 times more

Texting -23 times worse than not distracted

The value of stem cells is

They offer the greatest hope for developing treatments for diseases such as cancer, Alzheimer's , Parkinson's, and juvenile diabetes.

Which of the following is not an undesirable side effect of technology? a. environmental pollution b. creation of unsatisfying work c. clash of cultural and religious forces d. depletion of natural resources

clash of cultural and religious forces

Human cloning is illegal in the United States. a. True b. False

false

Which of the following is not a way that businesses attempt to protect consumers' privacy? a. ethical leadership b. privacy policies c. periodic purges of databanks d. chief privacy officers

periodic purges of databanks

The primary tool that bioethicists use is called

proceduralism. It involves elaborate protocols that certain classical worries, such as informed consent, are not being violated.

examples of sensitive data likely to be stolen from social networking web sites such as Facebook, Twitter, LinkedIn, Pinterest, and others are, e-mail addresses, contact lists, birthdays,hometowns, and mother's maiden name, which all then become useful for

targeting specific victims

The imperative that states "what can be developed will be developed" is a. economic determinism. b. technological determinism. c. the iron law of technology. d. rationality.

technological determinism

EDR(Event Data Recorder)

they were initualy designed to analyze the cause and effect of crashes to improve safety,but their data has many other usages, we need to be aware of how we are being tracked

Companies use technology through the use of cookies and spam to invade consumer privacy. a. True b. False

true


Related study sets

PEDS - Exam 1 Pre and Post Quizzes

View Set

Immunology ASCP MLT medialab exams

View Set

Test Construction Prepjet Exam #1,2,4,7

View Set