100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Other

Ethics for the Information Age 8th Edition by Michael Quinn - All 10 Chapters | TEST BANK

Rating
-
Sold
-
Pages
49
Uploaded on
04-01-2023
Written in
2022/2023

TEST BANK for Ethics for the Information Age 8th Edition by Michael Quinn . ISBN 8006, 4. All 10 Chapters (Complete Download). Table of Contents 1. Catalysts for Change 2. Intr oduction to Ethics 3. Networked Communications 4. Intellectual Property 5. Information Privacy 6. Privacy and the Government 7. Computer and Network Security 8. Computer Reliability 9. Professional Ethics 10. Work and Wealth Multiple-choice Questions For each of the following questions, choose the letter of the one best response. Chapter 1 The two principal catalysts for the Information Age have been a) books and pamphlets. b) computers and communication networks. c) radio and television. d) newspapers and magazines. e) telephones and television networks. Which statement best supports the conclusion that society can control whether to adopt a new technology? a) No new nuclear power plants were built in the United States for 25 years after the accident at Three Mile Island. b) About half of all email messages are spam. c) Despite decades of research, fusion power is an elusive goal. d) People do not have to listen to Rush Limbaugh if they do not want to. e) Some new technologies are simply too expensive to even consider adopting. Tablets, abacuses, and manual tables a) are no longer used, because of the proliferation of calculators and computers. b) are examples of aids to manual calculating. c) were developed in Western Europe in the late Middle Ages. d) replaced Hindu-Arabic numerals as the preferred way to do calculations. e) All of the above. The mechanical adding machines of Pascal and Leibniz were not widely adopted because a) they were too expensive. b) there were unreliable. c) they were too difficult to program. d) they could not handle fractions. e) bookkeepers successfully lobbied the King, and he made the machines illegal. The calculating machine of Georg and Edvard Sheutz a) computed the values of polynomial functions. b) typeset the results of its computations. c) performed calculations faster than they could be done manually. d) performed calculations more reliably than they could be done manually. e) All of the above. Which of the following phrases does not describe the Gilded Age in America? a) rapid industrialization b) economic expansion c) widespread electrification d) concentration of corporate power e) corporate mergers . 3 Which of the following was not a result of the adoption of mechanical calculators? a) Less demand for “superstars” who could rapidly compute sums by hand b) Higher productivity of bookkeepers c) Higher salaries of bookkeepers d) Proliferation of companies making calculators e) Feminization of bookkeeping Which of the following was not a feature of cash registers in the early 1900s? a) Ability to compute total of purchases b) Ability to print itemized receipts for customers c) Ability to print log of transactions for owners d) Ability to compute amount of change to give customer e) Ability to ring a bell every time cash drawer is opened Punched card tabulation was invented by Herman Hollerith when he was an employee of a) the Pennsylvania Railroad. b) the Census Bureau. c) the Pennsylvania Steel Company. d) the Burroughs Adding Machine Company. e) IBM. Which of the following phrases best describes a machine that inputs data, performs one or more calculations, and produces output data? a) manual calculator b) digital computer c) data-processing system d) difference engine e) cash register The first commercial electronic digital computers were produced just after a) the Spanish-American War. b) World War I. c) World War II. d) the Korean War. e) the Vietnam War. Programming languages were developed in order to a) make it possible to program computers in English. b) make programming faster and less error-prone. c) speed translations between English and Russian during the Cold War. d) improve the computation speed of computers, which were very expensive. e) All of the above. Programming languages FORTRAN and COBOL became international standards, meaning a) they were approved by the United Nations. b) the United States and other members of NATO agreed to share the designs. c) the United States and the Soviet Union agreed to share the designs. d) they were supported by every computer manufacturer. e) they were based on the metric system. 4 Software that allows multiple users to edit and run their programs simultaneously on the same computer is called a) a data-processing system. b) an intranet. c) a microprocessor. d) a programming language. e) a time-sharing system. A semiconductor device containing transistors, capacitors, and resistors is called a) a difference engine. b) a diode. c) an integrated circuit. d) a radio. e) a transformer. Which Cold War program played an important role in advancing integrated circuit technology? a) B-52 bomber b) Hydrogen bomb c) Mark 37 torpedo d) Minuteman II ballistic missile e) NORAD radar network Which company produced the System/360, a family of 19 compatible mainframe computers? a) Fujitsu b) Hewlett-Packard c) IBM d) Intel e) Texas Instruments The company that invented the microprocessor is a) Fujitsu b) Hewlett-Packard c) IBM d) Intel e) Texas Instruments Which of the following was not an activity of the People’s Computer Company, a not-for-profit corporation in the San Francisco area? a) Publishing a newspaper containing the source code to programs b) Allowing people to rent time on a time-shared computer c) Hosting Friday-evening game-playing sessions d) Promoting a culture in which computer enthusiasts freely shared software e) Developing the world’s first graphical user interface Who wrote “An Open Letter to Hobbyists,” complaining about software theft? a) Stewart Brand b) Bob Frankston c) Bill Gates d) Steve Jobs e) Steve Wozniak . 5 A key application that first made personal computers more attractive to business was a) the spreadsheet program. b) the World Wide Web. c) desktop publishing. d) video editing. e) email. The software company that provided IBM with the operating system for its PC was a) Apple. b) Boeing. c) Microsoft. d) Novell. e) Tandy. The first electronic networking technology widely used in the United States was the a) Internet. b) radio. c) telegraph. d) telephone. e) television. The Pony Express went out of business when a) the Mexican War ended in 1846. b) the Civil War began in 1861. c) the transcontinental telegraph was completed. d) AT&T completed the national telephone network. e) the radio was invented. Alexander Graham Bell invented the harmonic or musical telegraph, which enabled a) more than one message to be sent over a single telegraph wire at the same time. b) human speech to be sent over a telegraph wire. c) music to be send over a telegraph wire. d) B and C e) None of the above. Most early telephones were installed in businesses, because a) people were afraid that telephones were dangerous. b) people thought that the government was using telephones as eavesdropping devices. c) only men were allowed to use a telephone. d) most homes did not have electricity. e) leasing a telephone was expensive. A typewriter that prints a message transmitted over a telegraph line is called a a) computer. b) monitor. c) teletype. d) terminal. e) transponder. Guglielmo Marconi originally conceived of the radio as a way to a) transmit telegraph messages without wires. b) transmit electricity without wires. c) transmit votes in national elections. d) transmit light without wires. e) All of the above 6 The power of radio as a medium of mass communication was demonstrated in 1938 when Orson Welles put on a dramatization of a) War of the Worlds. b) Hamlet. c) Homer’s Odyssey. d) the assassination of Franklin Roosevelt. e) 20,000 Leagues Under the Sea. ARPA Director J.C.R. Licklider conceived of a Galactic Network that would a) control weapons from space. b) guide spacecraft to distant planets. c) become the world’s most powerful number-crunching machine. d) facilitate the exchange of programs and data. e) All of the above One of the first and most important applications of the ARPANET was a) email. b) voice mail. c) spreading computer viruses. d) disseminating anti-Communist propaganda to American citizens. e) stealing secrets from the Soviet Union. What term is used to describe a high-speed Internet connection? a) broadband b) hypertext c) Internet2 d) the Matrix e) World Wide Web Which country has the fastest broadband connections on average? a) China b) Germany c) India d) South Korea e) United States A common name for a wireless Internet access point is a) broadband hub. b) hotspot. c) Internet access-ory. d) Internet café. e) wap. The utilization of remote computing resources over the Internet is called a) cloud computing. b) distributed computing. c) lend-leasing. d) parallel computing. e) WiFi. . 7 Enabling a single physical computer to emulate many virtual computing devices is called a) emulation. b) extension processing. c) parallel processing. d) virtualization. e) the World Wide Web. The first alphabet to represent vowels as well as consonants was developed by the a) Babylonians. b) Egyptians. c) Greeks. d) Romans. e) Syrians. In the fourth century the codex replaced the scroll because a) it was more durable, and it was much easier to look up a particular passage. b) it was much lighter, and it could be made much more rapidly. c) Gutenberg’s printing press had just been invented. d) there was a worldwide shortage of papyrus. e) All of the above Hypertext is supposed to mimic a) the associative memory of human beings. b) the way that creeks flow into streams and streams merge into rivers. c) constellations in the night sky. d) road networks. e) the way that some people “channel surf” with a remote control. What visionary invented the computer mouse and demonstrated windows, email, and live network videoconferencing at “the mother of all demos” in 1968? a) Vannevar Bush b) Douglas Engelbart c) Al Gore d) Alan Kay e) Ted Nelson The first popular personal computer with a graphical user interface was the a) Apple Macintosh. b) Compaq Presario. c) IBM PC. d) NeXT workstation. e) Tandy TRS-80. The World Wide Web is the creation of a) Tim Berners-Lee. b) Vannevar Bush. c) Douglas Engelbart. d) Alan Kay. e) Ted Nelson. 8 A Web browser enables you to a) view Web pages. b) edit Web pages. c) create Web pages. d) delete Web pages. e) All of the above A program that accepts a list of keywords and returns documents most closely matching them is called a(n) a) folder. b) object-oriented database. c) relational database. d) search engine. e) Web browser. Storing data remotely on servers accessed through the Internet is often called a) cloud storage. b) distributed hard drive. c) random access memory. d) solid state memory. e) virtual memory. Chapter 2 Taking “the ethical point of view” means a) abiding by your religious beliefs, even when it is difficult. b) deciding that other people and their core values are worthy of your respect. c) choosing to sacrifice your own good for the good of someone else. d) putting your self-interest above the interests of everyone else. e) refusing to accept help from other people. An association of people organized under a system of rules designed to advance the good of its members over time is called a a) business. b) constitution. c) government. d) monopoly. e) society. Rules of conduct describing what people ought and ought not to do in various situations are called a) denominations. b) ideals. c) morality. d) philosophy. e) virtues. Ethics is a) a rational examination of people’s moral beliefs. b) a branch of philosophy. c) one way to determine which activities are “good” and which are “bad.” d) a field of study more than 2,000 years old. e) All of the above . 9 An ethical relativist claims that a) there are no universal moral principles. b) morality has an existence outside the human mind. c) morality and law are identical. d) there is no such thing as free will. e) God does not exist. Ethical objectivism is based on the idea that a) there are no universal moral principles. b) morality has an existence outside the human mind. c) morality and law are identical. d) there is no such thing as free will. e) God does not exist. The divine command theory is an example of a) relativism. b) ethical objectivism. c) ethical egoism. d) existentialism. e) materialism. Which of the following is an argument in favor of the divine command theory? a) The divine command theory is not based on reason. b) It is fallacious to equate “the good” with “God.” c) God is all-knowing. d) Some moral problems are not addressed directly in scripture. e) The Bible has contradictory moral teachings. Ethical egoism is a) not based on reason or logic. b) based on determining long-term beneficial consequences. c) the divine command theory by another name. d) Kantianism by another name. e) utilitarianism by another name. Which of the following is an argument in favor of ethical egoism? a) Ethical egoism is supported by verses in the Bible. b) People are naturally altruistic. c) The community can benefit when individuals put their well-being first. d) It is not true that people naturally act in their own long-term self-interest. e) Ethical egoism treats all persons as moral equals. According to Kant, our sense of “ought to” is called a) necessity. b) insecurity. c) paranoia. d) love. e) dutifulness. According to Kant, the moral value of an action depends upon a) its consequences. b) the underlying moral rule. c) how closely it aligns with Biblical teachings. d) how closely it aligns with the law. e) the extent to which it produces happiness. 10 According to the second formulation of the Categorical Imperative, a) the moral worth of a person depends upon that person’s actions. b) one good turn deserves another. c) bad deeds should be punished. d) it is wrong for one person to “use” another. e) the moral worth of a person depends upon that person’s intentions. The Principle of Utility is also called a) the Categorical Imperative. b) the Difference Principle. c) the Greatest Happiness Principle. d) the Social Contract. e) the Ten Commandments. Two philosophers closely associated with utilitarianism are a) Jeremy Bentham and John Stuart Mill. b) Immanuel Kant and Jeremy Bentham. c) Immanuel Kant and John Stuart Mill. d) John Stuart Mill and John Rawls. e) Jean-Jacques Rousseau and John Rawls. Utilitarianism is an example of a) a consequentialist theory. b) the social contract theory. c) a non-consequentialist theory. d) a practical implementation of the divine command theory. e) a relativistic theory. The problem of moral luck is raised as a criticism of a) the divine command theory. b) act utilitarianism. c) rule utilitarianism. d) cultural relativism. e) Kantianism. Utilitarianism does not mean “the greatest good of the greatest number” because a) it is impossible to calculate “the greatest good.” b) it focuses solely on “the greatest good” and pays no attention to how “the good” is distributed. c) some people have no moral worth. d) it is impossible to maximize “the good” without ruining the environment. e) All of the above Thomas Hobbes called life without rules and a means of enforcing them a) utopia. b) anarchy. c) democracy. d) communism. e) the state of nature. . 11 An early proponent of the social contract was a) Jeremy Bentham. b) John Stuart Mill. c) Jean-Jacque Rousseau. d) Karl Marx. e) John Brown. A right that another can guarantee by leaving you alone to exercise the right is called a) a positive right. b) a negative right. c) an absolute right. d) a limited right. e) a proverbial right. A right that is guaranteed without exception is called a) a positive right. b) a negative right. c) an absolute right. d) a limited right. e) a proverbial right. The idea that social and economic inequalities must be to the greatest benefit of the least-advantaged members of society is called a) capitalism. b) communism. c) socialism. d) utilitarianism. e) the difference principle. Modern writers often refer to moral virtues as a) intellectual virtues. b) philosophical virtues. c) psychological virtues. d) social virtues. e) virtues of character. A character trait that prevents a human being from flourishing or become truly happy is called a a) fatal attraction. b) inverse virtue. c) negative virtue. d) tragic flaw. e) vice. According to Aristotle, moral virtue results from a) a good education. b) living a long life. c) a happy marriage and loving family. d) repetition of the appropriate acts. e) All of the above. 12 According to Aristotle, deriving pleasure from a virtuous act is a sign that you a) have developed the virtue. b) have not yet developed the virtue. c) are egotistical. d) are hedonistic. e) have not done enough good deeds lately. Chapter 3 Some businesses have resorted to spam because a) they have found it to be effective. b) it is 30,000 times less expensive than a traditional flyer sent via the U.S. mail. c) some people respond to spam advertisements. d) All of the above e) None of the above Networks of compromised computers are called a) botnets. b) the Internet of Things. c) slave systems. d) virtual computers. e) None of the above Every object on the Web has a unique address called its a) hashtag. b) IP address. c) name. d) server. e) uniform resource locator (URL). Resource limitations of smartphones, including limited screen size, help explain the popularity of a) desktop computers. b) Google docs. c) magnifying glasses. d) mobile apps. e) Web browsers. A Korean cybercafé where people play on-line, persistent games is called a a) coffee clubhouse. b) computer commons. c) PC bang. d) Tenretni (Internet spelled backwards). e) virtual reality theater. A wiki is a) An online encyclopedia. b) A personal journal kept on the Web. c) An electronic profile constructed automatically by a Web browser. d) A piece of software that allows ISPs to monitor who visits which Web sites. e) A Web site that allows multiple people to contribute and edit its content. . 13 A blog is a) a character in Lineage, a popular on-line game. b) a personal journal kept on the Web. c) a person who assumes a false identity in a chat room. d) a special symbol visible on displays that show Unicode characters. e) the Web version of a “couch potato.” Many people are now using the Web not simply to download content, but to build communities and upload and share content they have created. This trend has been given the name a) Persistent online reality b) Online networking c) Web 2.0 d) Interactive hypermedia e) Virtual reality What do you call an online method of getting goods or services from a large group of people? a) Cannibalizing. b) Co-opting. c) Corralling. d) Craiglist. e) Crowdsourcing. Which two companies get the lion’s share of online advertising revenue? a) Amazon and Apple. b) Amazon and Google. c) Facebook and Google. d) Google and Microsoft. e) Microsoft and Apple. Agents of which country were indicted for interfering in the US presidential election of 2016? a) China b) France c) Germany d) Israel e) Russia Which of these is not an example of direct censorship? a) government monopolization b) self-censorship c) pre-publication review d) licensing and registration e) All of the above are examples of direct censorship. According to John Stuart Mill’s Principle of Harm, the only ground on which the government should intervene in the conduct of an individual is when a) the individual is breaking the law. b) it would clearly be to the benefit of the individual. c) the individual is under 18 or over 65. d) it would prevent harm to others. e) According to Mill, the government should intervene if any of the above conditions are true. 14 In the United States, freedom of expression a) is a positive right. b) is not an absolute right. c) is limited to political speech. d) has been abolished by decisions of the U.S. Supreme Court. e) is guaranteed by the Fourth Amendment to the U.S. Constitution. A Web filter is a piece of software that a) keeps track of the pages your Web browser displays. b) sends Google information about your Web surfing habits. c) prevents certain Web pages from being displayed by your browser. d) prevents unauthorized people from using your computer to surf the Web. e) A and B. Which of the following laws was upheld as constitutional by the U.S. Supreme Court? a) Communications Decency Act b) Child Online Protection Act c) Child Internet Protection Act d) All of these laws were upheld as constitutional by the U.S. Supreme Court. e) None of these laws were upheld as constitutional by the U.S. Supreme Court. Sexting refers to a) sending text messages with nude or nearly nude photographs. b) sending emails with nude or nearly nude photographs. c) posting nude or nearly nude photographs to a Web site. d) A and B. e) A, B, and C. Sexting is causing a legal crisis because a) police and prosecutors refuse to get involved in sexting cases. b) police and prosecutors are treating sexting as a felony offense. c) prisons are starting to fill up with people convicted of sexting. d) police have been charged with possession of child pornography. e) B and C. What percentage of American adults are victims of identity theft each year? a) Less than 1 percent. b) About 7 percent. c) About 13 percent. d) About 19 percent. e) More than 25 percent. What is the principal reason why point-of-sale credit card fraud has declined rapidly? a) More people are going online to purchase major items. b) Credit cards now have embedded chips in them. c) Police are apprehending more identity thieves. d) States increased prison terms for those convicted of identity theft. e) All of the above factors have contributed to the decline in point-of-sale credit card fraud. . 15 What is one reason why college students are five times more likely than other adults to be victims of identity theft? a) Most college students use their parents’ credit cards. b) Most college students have at most one personal credit card. c) College students are particularly vulnerable to phishing attacks. d) Many students live in close proximity with others and do not do a good job securing checkbooks and financial documents. e) All of the above. How many people trust a business more after reading positive online reviews? a) A very small percentage of consumers. b) About one-third of consumers. c) About three-quarters of consumers. d) Nearly 100% of consumers. e) No one has ever conducted such a study. Cyberbullying is defined as inflicting psychological harm on another person using a) the phone system. b) the Internet. c) broadcast media such as radio or television. d) A and B. e) A, B, and C. Revenge porn is a special case of a) cyberbullying. b) Internet addiction. c) child abuse. d) identity theft. e) censorship. Which of the following is not a variant of Internet addiction, according to psychiatrist Jerald Block? a) excessive gaming b) sexual preoccupations c) cyberbullying d) e-mail/text messaging e) Actually, all of the above are variants of Internet addiction, according to Block. The Enlightenment view of addiction is that a) there is nothing wrong with addiction. b) addiction is not real. c) addiction can never be overcome by will-power alone. d) society is responsible for the bad choices people make. e) people are responsible for the choices they make. Chapter 4 Which philosopher argued in The Second Treatise of Government that people have a natural right to property? a) Jeremy Bentham b) Immanuel Kant c) John Locke d) John Stuart Mill e) Jean-Jacques Rousseau 16 Intellectual property is a unique product of the human intellect that a) has commercial value. b) can be reproduced digitally. c) has been produced on paper. d) can be performed in public. e) cannot be understood by anyone other than the creator. The value of intellectual property is recognized a) in the Constitution of the United States. b) in the free market. c) in legislation passed by the U.S. Congress. d) through court decisions. e) All of the above The proper noun “Kleenex” is protected a) as a trade secret. b) with a trademark. c) with a patent. d) with a copyright. e) All of the above Which of the following rights is not a right of a copyright holder? a) The right to reproduce the copyrighted work. b) The right to distribute the work to the public. c) The right to perform the work in public. d) The right to prevent others from producing competitive works. e) The right to produce new works derived from the copyrighted work. Since the first Copyright Act was passed in 1790 a) Congress has repeatedly increased the number of years of copyright protection. b) Congress has made more kinds of intellectual property protected under copyright. c) Congress has attempted to reconcile American copyright law with European copyright law. d) All of the above e) None of the above Sometimes it is legal to reproduce a copyrighted work without the permission of the copyright holder. These circumstances are called a) fair use. b) noncommercial use. c) piracy. d) public domain. e) reciprocity. The Audio Home Recording Act of 1992 a) protects the right of consumers to make backup copies of CDs. b) requires manufacturers of digital audio records to incorporate the Serial Copyright Management System. c) requires manufacturers of digital audio recording devices and blank digital media to pay a royalty to songwriters and music publishers. d) All of the above e) None of the above . 17 The U.S. Supreme Court decision in Sony v. Universal City Studios established the concept of a) fair use. b) intellectual property protection for movies. c) licensing fees for videotapes. d) space shifting. e) time shifting. The decision by the U.S. Court of Appeals, Ninth Circuit in RIAA v. Diamond Multimedia Systems Inc. established the concept of a) fair use. b) intellectual property protection for movies. c) licensing fees for videotapes. d) space shifting. e) time shifting. The decision by the U.S. Court of Appeals, Ninth Circuit in Kelly v. Arriba Soft Corporation established that the display of thumbnail images by a search engine a) is a fair use of those images. b) is not a fair use of those images. c) is an unfair use of network bandwidth. d) is an illegal attempt to circumvent Web filters. e) is legal, even when the original images are pornographic. Google Books is a) an effort to scan millions of books and make all their words searchable. b) an effort to gain copyrights on millions of books in the public domain. c) a book reader designed to compete with the Kindle. d) an online store competing with A. e) None of the above In Authors Guild v. Google, a US District Court judge ruled that Google’s project to scan millions of copyrighted books was a fair use of copyrighted books because a) it is an example of time shifting. b) it is an example of space shifting. c) Google pledged to give all of the profits to charity. d) the project represents a highly transformative use of the copyrighted material. e) all of the copyrights will eventually expire, but the database will last for centuries. In 2005 Sony BMG Music Entertainment made headlines by a) purchasing the publishing rights to the Beatles’ songs from Michael Jackson. b) purchasing the iTunes Store from Apple. c) announcing they would begin shipping CDs without digital rights management. d) shipping CDs that would only play on devices manufactured by Sony. e) shipping CDs that secretly installed a rootkit on Windows computers. After the RIAA sued Napster, a) the Supreme Court ruled in favor of Napster. b) Congress passed the Digital Millennium Copyright Act that legalized file sharing. c) Congress made peer-to-peer networks illegal. d) Napster renamed itself KaZaA. e) Napster went off-line. 18 Suppose you buy a Microsoft game at the bookstore. Under current U.S. law, which of the following actions is illegal? a) Copying it onto a CD to give or sell to someone else. b) Preloading it onto the hard disk of a computer being sold. c) Distributing it over the Internet. d) All of the above are illegal. e) None of the above is illegal. The Digital Millennium Copyright Act is controversial, in part, because a) it lengthens copyright protection to 1,000 years. b) it makes it illegal for consumers to circumvent encryption placed on digital media. c) it adds a new federal tax to all CDs and DVDs. d) it requires music streaming services to register with the US Copyright Office. e) All of the above Apple’s digital rights management system called FairPlay prevented a) songs from being played on more than five computers. b) songs from being copied onto CDs more than seven times. c) music purchased from the iTunes Store from playing on non-Apple MP3 players. d) All of the above e) None of the above Compared with other peer-to-peer networks, BitTorrent takes advantage of the fact that broadband Internet connections a) continue to drop in price. b) are immune from surveillance by the police. c) provide higher speeds for downloading than for uploading. d) have become the standard in most homes in the United States. e) All of the above. The court’s ruling in Apple Computer v. Franklin Computer Corp. established that a) computer hardware can be patented. b) computer software can be copyrighted. c) object programs can be copyrighted. d) the “look and feel” of a computer program can be patented. e) Apple Computer could not patent its desktop icons. Patent-holding companies that file lawsuits to enforce their intellectual property rights are often called a) patent blackmailers. b) patent gangsters. c) patent profiteers. d) patent trolls. e) patent zombies. The so-called “smartphone patent wars” ended when a) Samsung agreed to stop copying Apple’s design features. b) Apple bought all of the patents owned by Samsung and Nokia. c) the smartphone makers agreed to stop patenting new inventions. d) the smartphone makers agreed to cross-license each other’s patents. e) the US Supreme Court ruled that “look and feel” could not be patented. . 19 The US Supreme Court decision in Alice Corporation v. CLS Bank is significant because a) it reduced the length of software patents to only four years, making them far less valuable. b) it stated that the “look and feel” of software cannot be patented. c) it stated that no more new software patents can be issued. d) district courts and federal courts have cited it to invalidate hundreds of software patents. e) Both (c) and (d) The Linux operating system is an example of a) free-market software. b) open-source software. c) pirated software. d) proprietary software. e) unreliable software. Chapter 5 The Third Amendment to the United States Constitution has to do with a) freedom of speech and religion. b) search warrants. c) the right to bear arms. d) quartering of soldiers in private homes. e) self-incrimination. Who wrote an influential paper in the 1890s urging that privacy rights be enacted into law? a) Benn and Brandeis b) Benn and Thomson c) Levine and Benn d) Thomson and Warren e) Warren and Brandeis Who wrote that every violation of a “privacy right” is also a violation of another right? a) Stanley Benn b) Louis Brandeis c) Morton Levine d) Judith Jarvis Thomson e) Samuel Warren Most commentators cite the benefits of privacy as a reason why people ought to have some privacy rights. A right that benefits society is called a a) Constitutional right. b) legal right. c) natural right. d) prudential right. e) social right. A public record contains information about an incident or action reported to a government agency for the purpose of a) enhancing public safety. b) informing the public. c) protecting the innocent. d) regulating the economy. e) upholding the law. 20 An example of a public record is a) a birth certificate. b) a marriage license. c) a deed to a house. d) a record of a criminal conviction. e) All of the above What was the reason given by the Electronic Privacy Information Center (EPIC) for filing a complaint with the Federal Trade Commission about Facebook Tag Suggestions? a) It is immoral to give computers the power to perform facial recognition. b) Facebook released the Tag Suggestions feature before it was 99% accurate in associating names with faces. c) Facebook did not get the permission of its users before gathering facial data from photos tagged by humans. d) Facebook sold its facial recognition technology to the US government for use in rounding up illegal immigrants. e) All of the above reasons were included in EPIC’s complaint. An RFID is f) a magnetic bar code. g) a microscopic bar code. h) a wireless transmitter. i) a biometric identification device. j) a random field interferometry device. What benefit does a company gain by allowing people to login to its app using Facebook Login? a) It gains access to information from the consumers’ Facebook profiles. b) It is paid a royalty from Facebook. c) It suffers less credit card fraud. d) It is more likely to be acquired by Facebook. e) All of the above The OnStar system allows a) a vehicle owner to initiate a conversation with an OnStar representative. b) the vehicle to automatically send a message to an OnStar representative after an accident. c) an OnStar representative to disable the gas pedal of the vehicle without the driver’s permission. d) a and b e) a, b, and c The process of searching through many records in one or more databases looking for patterns or relationships is called a) credit reporting. b) data mining. c) information gathering. d) microtargeting. e) pattern matching. When information collected for one purpose is put to another purpose, that is called a a) backdoor exploit. b) collaborative filter. c) cookie. d) data leveraging opportunity. e) secondary use of the data. . 21 A policy that requires the consumer to explicitly give permission before an organization can share information with another organization is called a) fair use. b) full disclosure. c) nondisclosure. d) opt-in. e) opt-out. The practice of mailing advertisements only to the most likely prospects is called a) discriminatory mailing. b) focused mailing. c) mail list trimming.. d) predatory mailing. e) targeted direct mail. Cambridge Analytica collected personal information in order to a) provide credit reports to banks and other lenders. b) provide microtargeting services to companies. c) provide microtargeting services to conservative political candidates. d) provide income estimates to the Internal Revenue Service e) All of the above Chapter 6 Which of the following is not one of the categories in Daniel Solove’s taxonomy of privacy? a) information collection. b) information dissemination. c) information filtering. d) information processing. e) invasion. According to the Employee Polygraph Protection Act, which organization(s) cannot administer lie detector tests to job applicants? a) most private employers b) local governments c) state governments d) federal government e) All of the above The Children’s Online Privacy Protection Act a) makes it illegal for an online service to request a credit card number from a child 17 years old and younger. b) requires online services to create aliases for all customers who are 17 years old and younger. c) makes it illegal for children 12 years and younger to participate in chat rooms. d) requires online services to obtain parental consent before collecting any information from children 12 years old and younger. e) All of the above 22 The Genetic Information Nondiscrimination Act a) applies to all private employers, but not state or federal agencies. b) prohibits most employers from taking genetic information into account when making hiring, firing, promotion, or other employment-related decisions. c) ensures a life insurance company cannot take genetic information into account when making a decision about underwriting a policy. d) All of the above. e) None of the above. The Census Bureau has not always kept confidential the information it has collected. According to the textbook, this became apparent a) during the Civil War. b) after the attack on Pearl Harbor. c) during the Vietnam War. d) during the first Gulf War. e) after September 11, 2001. The FBI’s National Crime Information Center database a) contains more than 39 million records. b) has information about every American citizen. c) has never led to a false arrest. d) is updated only once a week to give the FBI time to check the accuracy of the data. e) All of the above The OneDOJ database a) is a national database that consolidates records from federal, state, and local law enforcement agencies. b) gives state and local police officers access to information provided by five federal law enforcement agencies. c) combines records from all U.S. governmental agencies into a single database that can be used by data mining by the FBI. d) received the endorsement of the ACLU for its innovative privacy-protection measures. e) is the first database created by the U.S. government that completely implements the Code of Fair Information Practices. The Fourth Amendment to the United States Constitution has to do with a) freedom of speech and religion. b) search warrants. c) the right to bear arms. d) quartering of soldiers in private homes. e) self-incrimination. After Congress ruled that wiretapping was illegal a) the FBI ceased all wiretapping activity. b) the FBI continued wiretapping people secretly. c) the FBI convinced Congress to grant it an exemption from the ban. d) the FBI began wiretapping every member of Congress. e) the CIA took over the job of wiretapping U.S. citizens. What was the original purpose of Operation Shamrock? a) Intercept all international telegrams entering or leaving the United States. b) Wiretap all calls made from public telephone booths. c) Scan email messages to identify drug dealers. d) Read all letters going between the United States and Ireland. e) Identify Irish-Americans raising money for the IRA. . 23 Which of the following laws does not provide some sort of authorization for governmental wiretapping? a) Title III of the Omnibus Crime Control and Safe Streets Act b) Electronic Communications Privacy Act c) Federal Communications Act d) Communications Assistance for Law Enforcement Act e) USA PATRIOT Act After the terrorist attacks of September 11, 2001, which U.S. governmental agency collected telephone call records of tens of millions of Americans without a court order? a) Central Intelligence Agency b) Department of Homeland Security c) Federal Bureau of Investigation d) Federal Communications Commission e) National Security Agency According to records leaked to the Guardian newspaper, which of the following kinds of information were not released by Verizon to the National Security Agency? a) Date of the telephone call b) Duration of the telephone call c) Location of the telephone making the call d) Recording of the conversation e) Time of the telephone call The USA Freedom Act, passed in 2015, is significant because a) it put new restrictions on the government’s surveillance activities. b) it made permanent the surveillance activities begun under the USA PATRIOT Act. c) it authorized the National Security Agency to collect customer telephone call records in bulk. d) it authorized the National Security Agency to record telephone calls of all Americans. e) it prohibited any federal or state police agency from recording telephone calls made by members of Congress, even with a warrant. Which of the following precepts is not part of the Code of Fair Information Practices? a) There must be no personal data record-keeping systems whose very existence is secret. b) There must be a way for a person to find out what information about the person is in a record and how it is used. c) There must be a way for a person to correct or amend a record of identifiable information about the person. d) There must be a way for a person to collect damages for financial losses caused by incorrect information about that person stored in a data record-keeping system. e) There must be a way for a person to prevent information obtained for one purpose being used or made available for other purposes without the person’s consent. The Fair Credit Reporting Act a) gives consumers the right to request a free copy of their credit report every year. b) ensures that information about criminal convictions does not haunt a consumer’s credit report forever. c) is designed to promote the accuracy of credit reports. d) makes it possible for a consumer to declare bankruptcy without harming his or her credit rating. e) All of the above 24 The Fair and Accurate Credit Transactions Act a) gives consumers the right to request a free copy of their credit report every year. b) allows credit bureaus to sell personal financial information they have gathered. c) makes it possible for a consumer to declare bankruptcy without harming his or her credit rating. d) ensures that people with criminal convictions are still able to obtain credit. e) All of the above The Financial Services Modernization Act a) allows banks to offer insurance and stock brokerage services. b) requires banks to disclose their privacy policies to consumers. c) requires banks to inform consumers how they can “opt out” of having their confidential information released to other companies. d) Requires banks to develop policies that will prevent unauthorized access of customers’ confidential information. e) All of the above Which of the following statements about the REAL ID Act is not true? a) The REAL ID Act required states to issue new driver’s licenses with stronger verification of identities before licenses are issued. b) The driver’s licenses mandated by the REAL ID Act have security features designed to prevent tampering, counterfeiting, and duplication. c) Legislatures in about half the states passed laws or resolutions opposing the REAL ID Act. d) Between 70 and 80 percent of US drivers now hold licenses from states that meet the standards of the REAL ID Act. e) Congress repealed the REAL ID Act after many states refused to issue new driver’s licenses. The Family Education Rights and Privacy Act a) gives students 18 years of age and older the right to review their educational records. b) gives students 18 years of age and older the right to request corrections to errors in their educational records. c) gives students 18 years of age and older the right to prevent educational records from being released without their permission, except under certain circumstances. d) All of the above e) None of the above The Video Privacy Protection Act a) prohibits video stores from disclosing rental records without the written consent of the customer. b) prohibits DVD manufacturers from installing software that sends reports over the Internet every time a DVD is played. c) makes it legal to send “adult” DVDs through the mail without a warning label on the envelope. d) prohibits the government from prosecuting minors who play “adult” DVDs in their own home. e) All of the above . 25 The Health Insurance Portability and Accountability Act a) ensures that a consumer can keep the same health care provider even when he or she changes employers. b) attempts to limit the exchange of information among health care providers to that information necessary to care for the patient. c) ensures that a consumer can sue doctors and hospitals for medical malpractice. d) ensures that doctors and hospitals can counter sue patients who file frivolous medical malpractice claims. e) All of the above In Carpenter v. United States, the US Supreme Court ruled that it is a violation of the Fourth Amendment when police or prosecutors access what kind of information without a search warrant? a) Cell phone location information b) Lists of numbers called by a cell phone c) Lists of numbers that have called the cell phone d) Recordings of cell phone conversations e) All of the above Chapter 7 What happened when the FBI asked Apple to create a new version of the iOS operating system was would allow the FBI to gain access to the locked iPhone of Syed Rizwan Farook? a) Apple created the new version of iOS and gave the FBI a copy. b) Apple created the new version of iOS and made it publicly available, so not just the FBI would have a copy. c) Apple created the new version of iOS but required FBI to bring the iPhone to Apple’s headquarters in Cupertino to install it on the Farook’s iPhone. d) Apple denied the request and chose to fight the FBI in court. e) Apple threatened to move its headquarters to Vancouver, Canada, unless the US government dropped its unreasonable request. A piece of self-replicating code embedded within another program is called a f) hack. g) rogue. h) Trojan horse. i) virus. j) worm. A self-contained program that spreads through a computer network by exploiting security holes is called a a) hack. b) rogue. c) Trojan horse. d) virus. e) worm. A program with a benign capability that conceals another, sinister purpose is called a a) hack. b) rogue. c) Trojan horse. d) virus. e) worm. 26 You may find a virus a) on a hard disk. b) on a thumb drive. c) on a CD-ROM. d) in an email attachment. e) All of the above The Conficker worm is notable because a) it is Cuba’s first attempt at cyberwarfare. b) it is the fastest spreading worm of all time. c) it shut down the White House Web site for three days. d) it continues to infect computers many years after it was first discovered. e) All of the above. The Internet worm was released by a) John Barlow. b) Katie Hafner. c) John Markoff. d) Robert Morris, Jr. e) Bruce Sterling. A software program that responds to commands sent by a command-and-control program located on an external computer is called a a) bot. b) spoof. c) vampire. d) virus. e) worm. Manipulating someone within an organization to gain access to confidential information is called a) diving. b) hacking. c) phreaking. d) social engineering. e) trashing. An intentional action designed to prevent legitimate users from making use of a computer service over the Internet is called a) a bombing run. b) a curtain closer. c) a denial-of-service attack. d) an electronic overdose. e) phreaking. The Social Security numbers and other personal information from 22 million Americans were stolen by hackers from computers managed by the Office of Personnel Management, and the prime suspect was a group of hackers located in a) Afghanistan. b) China. c) Iran. d) North Korea. e) Russia. . 27 Anonymous is a) an activist group that promotes the interests of the Recording Industry Association of America. b) a loosely organized group of hacktivists that claimed responsibility for a DDoS attack on Church of Scientology Web sites. c) the name given to the People’s Liberation Army group that was responsible for more than 100 intrusions around the world. d) the name of the group that launched the Stuxnet worm. e) All of the above except c. Chapter 8 Which of these statements about the National Crime Information Center (NCIC) is true? a) The NCIC databases contain about 40 million records. b) Improper use of the NCIC has led to about 1 million false arrests. c) Local law enforcement agencies enter 99 percent of the information that is in the NCIC databases. d) The Department of Homeland Security is in charge of the NCIC. e) All of these statements are true. A computer used as a component of a larger system is called a) an embedded system. b) a mainframe computer. c) a network. d) an operating system. e) a personal computer . Computers that process data from sensors as events occur are called a) distributed computers. b) event-driven simulations. c) pseudo-sensory systems. d) real-time systems. e) time-activated systems. The Patriot missile system a) was designed to shoot down airplanes. b) failed to shoot down a Scud missile that killed 28 U.S. soldiers in the Gulf War. c) failed because it had been left running too long. d) failed because of a computer error. e) All of the above The Ariane 5 satellite launch vehicle failed because a) a faulty on-board computer caused the other computers in the network to crash repeatedly. b) a bad sensor fed faulty information into the flight control computer, causing it to fail. c) the rocket’s on-board computer sent back faulty information to ground control, causing the human controllers to destroy the rocket. d) code that worked correctly on the Ariane 4 failed on the Ariane 5. e) a software failure caused the rocket to self-destruct when in actuality the rocket’s flight was going perfectly. 28 The AT&T long-distance network did not collapse entirely on January 15, 1990, because a) the U.S. Secret Service arrested the culprits before they could do any further damage. b) AT&T technicians rapidly fixed the software bug in the routing switches. c) MCI loaned some equipment to AT&T. d) the faulty computers shut themselves off before they could do any further damage. e) not all the routing switches had been converted to the latest software. The Mars Climate Orbiter crashed on the surface of Mars because a) one program output thrust in terms of foot-pounds, and another program expected thrust to be expressed in terms of newtons. b) the probe lost contact with the Jet Propulsion Laboratory when it entered the Martian atmosphere. c) a bug in the computer program caused the vehicle to consume too much fuel on the way to Mars, leaving an inadequate supply for landing. d) the extreme cold of deep space caused the computer to crash. e) before programmers went on strike at subcontractor Lockheed Martin, one of them sabotaged the flight control software. Which of these problems was not encountered by BAE as it tried to install an automated baggage handling system at Denver International Airport? a) The system misrouted luggage carts. b) A key customer, United Airlines, kept changing the specifications of the system. c) The bar code printers didn’t print tags clearly enough to be read by the scanners. d) Workers painted over electric eyes installed in the underground tunnels. e) The automated baggage handlers shredded some of the luggage. Mizuho Securities lost $225 million when a) hackers broke into its trading system and raided the accounts of 10,000 of its most important customers. b) a bug in its billing system caused it to send out improper invoices to 10,000 of its most important customers. c) a bug in its currency trading system caused it to sell yen and purchase dollars when it should have purchased yen and sold dollars. d) it tried unsuccessfully to automate the Tokyo Stock Exchange. e) one of its employees mistyped a sell order, and a bug in the Tokyo Stock Exchange trading program made it impossible to cancel the order. Some computer experts have spoken out against the conversion to touch-screen voting machines because a) there is no evidence that there have been any problems with punched card systems. b) they are made in China, which does not even hold elections. c) a power failure could make it impossible for people to vote. d) they do not have a paper audit trail. e) All of the above By making the PDP 11 minicomputer an integral part of the Therac-25, AECL was able to a) reduce costs by replacing hardware safety features with software safety features. b) increase the stock price of its subsidiary Digital Equipment Corporation. c) shrink the size of the machine considerably. d) eliminate the need for lead shielding. e) All of the above . 29 Which mistake was not made by AECL, the manufacturer of the Therac-25? a) It did not include software or hardware devices to detect and report overdoses. b) It did not tell other hospitals about possible overdose incidents. c) It reused code without proper testing. d) It continued to sell the Therac-25 after the FDA declared it to be defective. e) AECL made all of these mistakes, and more. Which of the following statements about the fatal Tesla accident involving Joshua Brown is not true? a) The “autopilot” feature was engaged. b) The Tesla was speeding. c) Foggy conditions made visibility poor. d) Brown did not have his hands on the steering wheel. e) Autopilot’s radar mistook the tractor trailer for an overhead sign. Which of these events happened when Uber tested its self-driving car service in San Francisco? a) A self-driving Uber ran a red light. b) Two self-driving Ubers collided with each other. c) A self-driving Uber hit and killed a pedestrian. d) Uber removed all of its safety operators from its self-driving cars. e) All of the above Identifying a danger when in fact there is none is called a) a false negative. b) a false positive. c) the “boy cries wolf” phenomenon. d) having a “hair trigger” predisposition. e) None of the above Computer simulations can f) accurately predict the weather a month in advance. g) save automobile manufacturers time and money as they develop new cars. h) prove our planet is overpopulated. i) All of the above j) None of the above The process of determining if a model is an accurate representation of the real system is called a) the null hypothesis. b) software engineering. c) synthesis. d) validation. e) verification. The discipline focused on the production of software, as well as the development of tools, methodologies, and theories supporting software production, is most accurately called a) artificial intelligence. b) computer engineering. c) computer science. d) software simulation. e) software engineering. 30 Chapter 9 According to the textbook, which of the following careers is not an example of a mature profession? a) accountant b) doctor c) dentist d) lawyer e) software engineer Which of the following is not one of the characteristics of a mature profession? a) code of ethics b) licensing c) mandatory drug testing d) mandatory professional development e) continuing professional education The process giving someone the legal right to practice a profession is called a) certification. b) licensing. c) matriculation. d) professional ethics. e) professional development. Unlike most professionals, the typical software engineer a) does not have a college education. b) does not have expert knowledge. c) does not make more than minimum wage. d) does not work directly with individual clients. e) All of the above The Software Engineering Code of Ethics and Professional Practice was developed by a) Computer Professionals for Social Responsibility. b) the Association for Computing Machinery and the Institute for Electrical and Electronics Engineers. c) a consortium of computer science departments in the United States, Canada, and Mexico. d) Immanuel Kant. e) John Rawls. The Principles and Clauses in the Software Engineering Code of Ethics and Professional Practice a) address every ethical dilemma a software engineer may face. b) provide algebraic formulas for determining the best course of action. c) incorporate every relevant feature into the formulas. d) All of the above e) None of the above Whistle-blowers a) make an unauthorized discloser about a harmful situation or fraud. b) usually gain the respect and admiration of their colleagues. c) are usually financially rewarded by their organizations for their integrity. d) typically get promoted to management. e) All of the above . 31 A principal factor contributing to the loss of the space shuttle Challenger was that a) its payload was too heavy. b) there were no experienced astronauts on board. c) the weather in Florida was unusually cold. d) it was hit by lightning. e) NASA was experimenting with a new type of fuel. According to Michael McFarland, a team of engineers a) has more moral accountability than any of its members. b) has less moral accountability than any of its members. c) has the same amount of moral accountability as its members. d) should always designate a single person to be the ethical “watchdog.” e) should always defer to management when ethical evaluations are being made. Chapter 10 Manufacturing employment in the United States peaked a) during World War II. b) in 1959. c) in 1979. d) in 1999. e) None of the above. Manufacturing employment in the United States continues to increase. One way automation can lead to the creation of new jobs is by a) producing products quicker, thus shortening the work week. b) reducing the price of a product, thus increasing people’s real income. c) consuming fewer resources, thus improving the environment. d) All of the above e) None of the above is true. Automation always causes a net loss of jobs. Productivity in the United States doubled between 1948 and 1990. However, the work week didn’t get shorter. As a result, a) income taxes were raised. b) the standard of living increased. c) corporate downsizing reduced the number of people in the workforce. d) the pay of CEOs skyrocketed. e) health care benefits of workers more than doubled between 1948 and 1990. In medieval England, when wages went up, a) more children joined the labor force. b) more women joined the labor force. c) students dropped out of school to take up jobs. d) workers put in fewer hours. e) A, B, and C. According to sociologist Max Weber, the growth of capitalism was stimulated by a new attitude toward work brought about by a) the Industrial Revolution. b) the Protestant Reformation. c) the English Civil War. d) the Lisbon earthquake of 1755. e) the American Revolution. 32 Artificial intelligence is the field of computer science and engineering that focuses on ways to get machines to exhibit a) consciousness. b) ethical behavior. c) intelligent behavior. d) philosophical insights. e) scientific breakthroughs. According to the Encyclopedia of Computer Science, a “programmable machine that either in performance or appearance imitates human activities” is called a a) computer. b) deltoid. c) mechano. d) robot. e) transformer. In 1997 IBM supercomputer Deep Blue a) defeated world chess champion Gary Kasparov in a six-game match. b) proved the existence of God. c) drove a minivan across the United States. d) designed the Pentium chip. e) replaced John O’Leary as Chief Financial Officer of IBM. In 2011 a program named Watson running on an IBM supercomputer a) decoded the human genome for the first time. b) became the first computer program to take the job of a software engineer. c) won the World Crossword Puzzle Championship sponsored by The New York Times. d) defeated the two most successful human Jeopardy! champions in a three-game match. e) passed the Turing Test in a competition sponsored by the Association for Computing Machinery. A personal AI is a) an intelligent machine inexpensive enough for an individual to purchase it. b) an intelligent machine devoted to serving an individual human being. c) a computer capable of beating human beings at games such as chess. d) a software program, not an actual physical object. e) a machine conscious of its own existence. Supply-chain automation a) streamlines organizations by eliminating transactional middlemen. b) is one way Dell Computer keeps its costs low. c) links computers at different companies. d) All of the above e) None of the above Gig workers are like employees in the sense that people in both groups a) have control over the hours they work. b) are guaranteed a minimum wage. c) are eligibile for unemployment insurance. d) are dependent upon the employer for how much money they make. e) All of the above . 33 Gig workers are like independent contractors in the sense that people in both groups a) have control over the hours they work. b) are guaranteed a minimum wage. c) are eligible for unemployment insurance. d) are dependent upon the employer for how much money they make. e) All of the above Globalization is a) the creation of international computer networks. b) the process of creating a worldwide network of businesses and markets. c) the adoption of global Internet standards. d) the adoption of English as the language of business. e) the way that stock exchanges stay open 24 hours a day. The phrase “digital divide” refers to the situation where a) some people have access to information technology and others do not. b) users of Macintosh computers are at a disadvantage compared to users of Windows computers. c) only stockholders in high-tech companies can get rich in the new economy. d) the U.S. government prevents information technology from being exported to “unfriendly” countries. e) the prices of computers are kept artificially high in order to keep them out of the hands of people in Third World countries. The process by which a new technology is assimilated into a society is called a) cultural relativism. b) globalization. c) IT leverage. d) social receptivity index. e) technological diffusion. In some markets a few top performers receive a disproportionate share of the rewards. Frank and Cook call this phenomenon a) capitalism. b) inevitable. c) liberalism. d) socialism. e) the winner-take-all effect. When one store stays open late to gain an advantage, its competitors begin to stay open late, too. At this point the first store is no better off than it was before, but now every store has additional expenses. This illustration is an example of what Frank and Cook call a a) capitalistic marathon. b) market economy. c) positional arms race. d) struggle for parity. e) virtual conflict.

Show more Read less
Institution
Ethics For The Information
Course
Ethics for the Information











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Ethics for the Information
Course
Ethics for the Information

Document information

Uploaded on
January 4, 2023
Number of pages
49
Written in
2022/2023
Type
Other
Person
Unknown

Subjects

Content preview

, Multiple-choice Questions

For each of the following questions, choose the letter of the one best response.

Chapter 1

The two principal catalysts for the Information Age have been
a) books and pamphlets.
b) computers and communication networks. <
c) radio and television.
d) newspapers and magazines.
e) telephones and television networks.

Which statement best supports the conclusion that society can control whether to adopt a new
technology?
a) No new nuclear power plants were built in the United States for 25 years after the accident
at Three Mile Island. <
b) About half of all email messages are spam.
c) Despite decades of research, fusion power is an elusive goal.
d) People do not have to listen to Rush Limbaugh if they do not want to.
e) Some new technologies are simply too expensive to even consider adopting.

Tablets, abacuses, and manual tables
a) are no longer used, because of the proliferation of calculators and computers.
b) are examples of aids to manual calculating. <
c) were developed in Western Europe in the late Middle Ages.
d) replaced Hindu-Arabic numerals as the preferred way to do calculations.
e) All of the above.

The mechanical adding machines of Pascal and Leibniz were not widely adopted because
a) they were too expensive.
b) there were unreliable. <
c) they were too difficult to program.
d) they could not handle fractions.
e) bookkeepers successfully lobbied the King, and he made the machines illegal.

The calculating machine of Georg and Edvard Sheutz
a) computed the values of polynomial functions.
b) typeset the results of its computations.
c) performed calculations faster than they could be done manually.
d) performed calculations more reliably than they could be done manually.
e) All of the above. <

Which of the following phrases does not describe the Gilded Age in America?
a) rapid industrialization
b) economic expansion
c) widespread electrification <
d) concentration of corporate power
e) corporate mergers




Ethics for the Information Age, Eighth Edition. Copyright © 2018 by Pearson Education Inc. All rights reserved. 2

,Which of the following was not a result of the adoption of mechanical calculators?
a) Less demand for “superstars” who could rapidly compute sums by hand
b) Higher productivity of bookkeepers
c) Higher salaries of bookkeepers <
d) Proliferation of companies making calculators
e) Feminization of bookkeeping

Which of the following was not a feature of cash registers in the early 1900s?
a) Ability to compute total of purchases
b) Ability to print itemized receipts for customers
c) Ability to print log of transactions for owners
d) Ability to compute amount of change to give customer <
e) Ability to ring a bell every time cash drawer is opened

Punched card tabulation was invented by Herman Hollerith when he was an employee of
a) the Pennsylvania Railroad.
b) the Census Bureau. <
c) the Pennsylvania Steel Company.
d) the Burroughs Adding Machine Company.
e) IBM.

Which of the following phrases best describes a machine that inputs data, performs one or more
calculations, and produces output data?
a) manual calculator
b) digital computer
c) data-processing system <
d) difference engine
e) cash register

The first commercial electronic digital computers were produced just after
a) the Spanish-American War.
b) World War I.
c) World War II. <
d) the Korean War.
e) the Vietnam War.

Programming languages were developed in order to
a) make it possible to program computers in English.
b) make programming faster and less error-prone. <
c) speed translations between English and Russian during the Cold War.
d) improve the computation speed of computers, which were very expensive.
e) All of the above.

Programming languages FORTRAN and COBOL became international standards, meaning
a) they were approved by the United Nations.
b) the United States and other members of NATO agreed to share the designs.
c) the United States and the Soviet Union agreed to share the designs.
d) they were supported by every computer manufacturer. <
e) they were based on the metric system.




Ethics for the Information Age, Seventh Edition. Copyright © 2016 by Pearson Education Inc. All rights reserved. 3

, Software that allows multiple users to edit and run their programs simultaneously on the same
computer is called
a) a data-processing system.
b) an intranet.
c) a microprocessor.
d) a programming language.
e) a time-sharing system. <

A semiconductor device containing transistors, capacitors, and resistors is called
a) a difference engine.
b) a diode.
c) an integrated circuit. <
d) a radio.
e) a transformer.

Which Cold War program played an important role in advancing integrated circuit technology?
a) B-52 bomber
b) Hydrogen bomb
c) Mark 37 torpedo
d) Minuteman II ballistic missile <
e) NORAD radar network

Which company produced the System/360, a family of 19 compatible mainframe computers?
a) Fujitsu
b) Hewlett-Packard
c) IBM <
d) Intel
e) Texas Instruments

The company that invented the microprocessor is
a) Fujitsu
b) Hewlett-Packard
c) IBM
d) Intel <
e) Texas Instruments

Which of the following was not an activity of the People’s Computer Company, a not-for-profit
corporation in the San Francisco area?
a) Publishing a newspaper containing the source code to programs
b) Allowing people to rent time on a time-shared computer
c) Hosting Friday-evening game-playing sessions
d) Promoting a culture in which computer enthusiasts freely shared software
e) Developing the world’s first graphical user interface <

Who wrote “An Open Letter to Hobbyists,” complaining about software theft?
a) Stewart Brand
b) Bob Frankston
c) Bill Gates <
d) Steve Jobs
e) Steve Wozniak




Ethics for the Information Age, Eighth Edition. Copyright © 2018 by Pearson Education Inc. All rights reserved. 4

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
AcademiContent Aalborg University
View profile
Follow You need to be logged in order to follow users or courses
Sold
3059
Member since
6 year
Number of followers
2132
Documents
1236
Last sold
2 days ago

4.0

386 reviews

5
203
4
84
3
38
2
17
1
44

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions