100% found this document useful (3 votes)
4K views10 pages

Ethics Answer Key

-Normative ethics seeks to address questions of morality: right vs. Wrong, good v. Bad, etc. -ethics Principle of honesty means does not deceive others. -psychological issues it can be defined as broad preferences concerning appropriate courses of action or outcomes -attitude lo2 orientation that requires that employees identify with and commit to specified conduct.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (3 votes)
4K views10 pages

Ethics Answer Key

-Normative ethics seeks to address questions of morality: right vs. Wrong, good v. Bad, etc. -ethics Principle of honesty means does not deceive others. -psychological issues it can be defined as broad preferences concerning appropriate courses of action or outcomes -attitude lo2 orientation that requires that employees identify with and commit to specified conduct.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

lo1

This issue concerning whether morality exists independently of humans


-metaphysical issues

This involves arriving at moral standards that regulate right and wrong conduct. In a
sense, it is a search for an ideal litmus test of proper behavior
-Normative Ethics

Known as moral philosophy, seeks to address questions of morality: right vs. wrong,
good vs. bad, etc.
-ethics

Principle of honesty means does not deceive others.


-true

It is the study of the origin and meaning of ethical concepts


-Metaethics

Principle of autonomy means acknowledge a person's freedom over his/her actions


or physical body.
-true

Three strategies of Normative Ethics are:-Virtue Theories,Nonconsequentialist ,Consequentialist Theories

This issue concerning the underlying mental basis of our moral judgments and
conduct
-psychological issues

It can be defined as broad preferences concerning appropriate courses of action or


outcomes

-values

This is an evaluation of an attitude object, ranging from extremely negative to


extremely positive
-attitude

lo2
Orientation that requires that employees identify with and commit to specified
conduct.
-Compliance orientation

These are often established by professional organizations to help guide members in


performing their job functions according to sound and consistent ethical principles.
-Professional Ethics

In what year did IEEE Code of Ethics adopted by the American Institute of Electrical
Engineers (AIEE)?
-1921

In what year did Board of Directors approved IEEE Code of Ethics for Engineers?
-1974

Corporate or business ethics with most comprehensive document and it consists of


general statements that serve as principles and the basis for the rules of conduct.
-Codes of ethics

Software engineers shall ensure that their __________ and related modifications meet
the highest professional standards possible.
-Product

Software engineers shall act in a manner that is in the best interests of their
_________ consistent with the public interest.

-Client and Employer

Software engineers shall act consistently with the __________ interest.


-public

Represents employee ethics with formal statements that describe what an


organization expects of its employees.
-Codes of conduct -

Serves the general public and addresses stakeholder interests.


-Statement of values

These are formal statements of what an organization expects in the way of ethical
behavior.
-Code of Ethics

In what year did Board of Directors approved revision to the IEEE Code of Ethics?
-2006

Software engineers shall maintain integrity and independence in their professional


__________.
-Judgment
May be centralized (perhaps temporarily) so that top level managers can ensure
that ethical decisions are made.
-decentralized organization

Orientation that focuses more on an abstract core of ideals such as respect and
responsibility.
-Values Orientation

In what year did IEEE endorsed Canons of Ethics of Engineers after AIEE/IRE
merger?

-1963

May be decentralized (perhaps temporarily) so that top level managers can ensure
that ethical decisions are made.
-decentralized organization

Software engineering managers and leaders shall subscribe to and promote an


ethical approach to the management of software development and maintenance.
-Management

It is a program that create firm's ethical climate and helps ensure that all employees
understand the organization's values and comply with the policies and codes of
conduct.
-Ethical Programs

In what year did Board of Directors approved simplified IEEE Code of Ethics?
-1974

lo3
Some common issues of computer ethics include intellectual property rights such as
copyrighted electronic content, privacy concerns, and how computers affect society.
-True

It is sending unsolicited bulk and/or commercial messages over the Internet.


-Spamming
It is a legal concept, enacted by most governments, giving the creator of original
work exclusive rights to it, usually for a limited time.
-Copyright

It is concerned with standards of conduct as they pertain to computers. It deals with


how computing professionals should make decisions regarding professional and
social conduct.

-Computer ethics

Branch of intellectual property which includes literary and artistic works such as
novels, poems and plays, films, musical works, artistic works such as drawings,
paintings, photographs, sculptures, and architectural designs.
-Copyright

While it may be possible to access someone's personal information on a computer


system, computer ethics would advise that such an action is ethical.
-False

It is usually divided into two branches, namely industrial property which broadly
speaking protects inventions and copyright, which protects literary and artistic
works.
-Intellectual property

Ethics, in the classical sense, refers to the rules and standards governing the
conduct of an individual with others.
-True

Any computer document produced either by an individual in his private home or in


his office should remain private.
-File Privacy

He was concerned by the unregulated copying of books and passed the Licensing of
the Press Act 1662 by Act of Parliament.
- Charles II of England

Branch of intellectual property which includes inventions (patents), trademarks,


industrial designs, commercial names, designations and geographic indications
(location specific brands) etc.
-Industrial property

It is about proper ways in which to use a network and to determine whether


information is reliable, while emphasizing four important points given in next slides.
-Netiquette

It is morally bad when someone reproduces a copy of the software and sells it for
profit, produces exactly the same or similar version without giving proper credit to
the original author, or simply produces it and distributes it to others.
-Software piracy

As technology and computers became more and more a part of our everyday lives,
and since the introduction of the World Wide Web, the definition of ethics has
evolved, too. A new type of ethics known as computer ethics has emerged.
-False

It is morally bad when it is intended for malicious purposes like to steal information
or destroying of data.
-Creation of worms and computer viruses

lo4
It is the ability to responsible, creatively, and effectively use appropriate technology
to improve and enhance learning in all subject areas and experiences.
-Technology Literacy

It is a phrase used to describe the use of Internet based attacks in terrorist


activities, including acts of deliberate, large-scale disruption of computer networks,
especially of personal computers attached to the Internet, by the means of tools
such as computer viruses.
-Cyber Terrorism

It refers to the gap between those that have (or lack) access to computers and the
Internet.
-Digital Divide
This is altering raw data just before a computer processes it and then changing it
back after the processing is completed.

-Data Diddling

It focuses on how information and communication technology (ICT) affects


individuals, communities and countries.
- Digital inclusion

The computer is flooded with more requests than it can handle which cause it to
crash. __________ attack is an example.
-Denial of Service

It is an unlawful act wherein the computer is either a tool or a target or both.


- Cybercrime

It refers to the receipt of unsolicited emails by customers of Financial Institutions,


requesting them to enter their Username, Password or other personal information to
access their Account for some reasons.
- Phishing

These are programs that attach themselves to a computer or a file and then
circulate themselves to other files and to other computers on a network.
-Viruses

Unauthorized access to any computer systems or networks is known as __________.


That is accessing the information of others without proper authorization.
-Hacking

It is the use of electronic messaging systems to send unsolicited bulk messages,


especially advertising, indiscriminately.
-Spamming

In these kinds of offences the hacker gains access and control over the website of
another. He may even manipulate or change the information of the website. This
may be done for fulfilling political objectives or for money.

-Web Jacking

It refers to sending large numbers of mail to the victim, which may be an individual
or a company by ultimately resulting into crashing.
- Email Bombing
They do not need the host to attach themselves to. They merely make functional
copies of themselves and do this repeatedly till they eat up all the available space
on the computers memory.
-Worms

In software field this means an unauthorized program, which passively gains control
over anothers computer by representing itself as an authorized program.
-Trojan Attacks
Jeremy Benthams advice on pursuing pleasure is called _________.

-calculus
He believed no one would knowingly operate against their best interests, and those that did
were clearly ignorant of what their best interests were.
-plato
It includes things such as decorative clothing, exotic foods, etc.
-vain desire
Theory asserts that the empirical consequences of any given act have nothing to do with the
moral worth of the act.
-consequentialism
It is a theory of moral philosophy that is based on the principle that an action is morally
right if it produces a greater quantity of good or happiness than any other possible action.
-utilitarianism
He sought to rewrite utilitarianism in such a way that he would be able to demonstrate that
Shakespeare outranked push-pins.
-john stuart mil
It says that no act is good or bad in and of itself; rather it is good or bad only in terms of its
consequences.
-consequentialism
It breaks down even further into two subcategories: necessary (food, sleep, etc.) and
unnecessary (sexual desires, etc.)

-natural desire
It argues that every act is motivated by self-interest. Humanity doesnt have a choice we
simply operate this way. Psycho
He is concerned that a utilitarian might actually conclude that a game of push-pin really was
better than poetry.
-john stuart mil
He claimed that no act should be undertaken except for the pleasure which results, and no
act should be rejected but for the pain it produces.
-epicurus
It argues that every act ought to be motivated by self-interest. It concludes that acting in
self-interest is the best motivator.
-psychological
He is the father of utilitarianism.
-jeremy
He is a psychological egoist believing that egoism is merely a biological fact.
-thomas
Lo5
This is altering raw data just before a computer processes it and then changing it back after
the processing is completed.
-data diddling
It is the use of electronic messaging systems to send unsolicited bulk messages, especially
advertising, indiscriminately.
-spamming
It is an unlawful act wherein the computer is either a tool or a target or both.
-cybercrime
It refers to sending large numbers of mail to the victim, which may be an individual or a
company by ultimately resulting into crashing.
-email bombing

These are programs that attach themselves to a computer or a file and then
circulate themselves to other files and to other computers on a network.
-Viruses
It is the ability to responsible, creatively, and effectively use appropriate technology to
improve and enhance learning in all subject areas and experiences.

-technology letiracy
It focuses on how information and communication technology (ICT) affects individuals,
communities and countries. social
It refers to the gap between those that have (or lack) access to computers and the Internet.
-digital divide

You might also like