Ethics Answer Key
Ethics Answer Key
This involves arriving at moral standards that regulate right and wrong conduct. In a
sense, it is a search for an ideal litmus test of proper behavior
-Normative Ethics
Known as moral philosophy, seeks to address questions of morality: right vs. wrong,
good vs. bad, etc.
-ethics
This issue concerning the underlying mental basis of our moral judgments and
conduct
-psychological issues
-values
lo2
Orientation that requires that employees identify with and commit to specified
conduct.
-Compliance orientation
In what year did IEEE Code of Ethics adopted by the American Institute of Electrical
Engineers (AIEE)?
-1921
In what year did Board of Directors approved IEEE Code of Ethics for Engineers?
-1974
Software engineers shall ensure that their __________ and related modifications meet
the highest professional standards possible.
-Product
Software engineers shall act in a manner that is in the best interests of their
_________ consistent with the public interest.
These are formal statements of what an organization expects in the way of ethical
behavior.
-Code of Ethics
In what year did Board of Directors approved revision to the IEEE Code of Ethics?
-2006
Orientation that focuses more on an abstract core of ideals such as respect and
responsibility.
-Values Orientation
In what year did IEEE endorsed Canons of Ethics of Engineers after AIEE/IRE
merger?
-1963
May be decentralized (perhaps temporarily) so that top level managers can ensure
that ethical decisions are made.
-decentralized organization
It is a program that create firm's ethical climate and helps ensure that all employees
understand the organization's values and comply with the policies and codes of
conduct.
-Ethical Programs
In what year did Board of Directors approved simplified IEEE Code of Ethics?
-1974
lo3
Some common issues of computer ethics include intellectual property rights such as
copyrighted electronic content, privacy concerns, and how computers affect society.
-True
-Computer ethics
Branch of intellectual property which includes literary and artistic works such as
novels, poems and plays, films, musical works, artistic works such as drawings,
paintings, photographs, sculptures, and architectural designs.
-Copyright
It is usually divided into two branches, namely industrial property which broadly
speaking protects inventions and copyright, which protects literary and artistic
works.
-Intellectual property
Ethics, in the classical sense, refers to the rules and standards governing the
conduct of an individual with others.
-True
He was concerned by the unregulated copying of books and passed the Licensing of
the Press Act 1662 by Act of Parliament.
- Charles II of England
It is morally bad when someone reproduces a copy of the software and sells it for
profit, produces exactly the same or similar version without giving proper credit to
the original author, or simply produces it and distributes it to others.
-Software piracy
As technology and computers became more and more a part of our everyday lives,
and since the introduction of the World Wide Web, the definition of ethics has
evolved, too. A new type of ethics known as computer ethics has emerged.
-False
It is morally bad when it is intended for malicious purposes like to steal information
or destroying of data.
-Creation of worms and computer viruses
lo4
It is the ability to responsible, creatively, and effectively use appropriate technology
to improve and enhance learning in all subject areas and experiences.
-Technology Literacy
It refers to the gap between those that have (or lack) access to computers and the
Internet.
-Digital Divide
This is altering raw data just before a computer processes it and then changing it
back after the processing is completed.
-Data Diddling
The computer is flooded with more requests than it can handle which cause it to
crash. __________ attack is an example.
-Denial of Service
These are programs that attach themselves to a computer or a file and then
circulate themselves to other files and to other computers on a network.
-Viruses
In these kinds of offences the hacker gains access and control over the website of
another. He may even manipulate or change the information of the website. This
may be done for fulfilling political objectives or for money.
-Web Jacking
It refers to sending large numbers of mail to the victim, which may be an individual
or a company by ultimately resulting into crashing.
- Email Bombing
They do not need the host to attach themselves to. They merely make functional
copies of themselves and do this repeatedly till they eat up all the available space
on the computers memory.
-Worms
In software field this means an unauthorized program, which passively gains control
over anothers computer by representing itself as an authorized program.
-Trojan Attacks
Jeremy Benthams advice on pursuing pleasure is called _________.
-calculus
He believed no one would knowingly operate against their best interests, and those that did
were clearly ignorant of what their best interests were.
-plato
It includes things such as decorative clothing, exotic foods, etc.
-vain desire
Theory asserts that the empirical consequences of any given act have nothing to do with the
moral worth of the act.
-consequentialism
It is a theory of moral philosophy that is based on the principle that an action is morally
right if it produces a greater quantity of good or happiness than any other possible action.
-utilitarianism
He sought to rewrite utilitarianism in such a way that he would be able to demonstrate that
Shakespeare outranked push-pins.
-john stuart mil
It says that no act is good or bad in and of itself; rather it is good or bad only in terms of its
consequences.
-consequentialism
It breaks down even further into two subcategories: necessary (food, sleep, etc.) and
unnecessary (sexual desires, etc.)
-natural desire
It argues that every act is motivated by self-interest. Humanity doesnt have a choice we
simply operate this way. Psycho
He is concerned that a utilitarian might actually conclude that a game of push-pin really was
better than poetry.
-john stuart mil
He claimed that no act should be undertaken except for the pleasure which results, and no
act should be rejected but for the pain it produces.
-epicurus
It argues that every act ought to be motivated by self-interest. It concludes that acting in
self-interest is the best motivator.
-psychological
He is the father of utilitarianism.
-jeremy
He is a psychological egoist believing that egoism is merely a biological fact.
-thomas
Lo5
This is altering raw data just before a computer processes it and then changing it back after
the processing is completed.
-data diddling
It is the use of electronic messaging systems to send unsolicited bulk messages, especially
advertising, indiscriminately.
-spamming
It is an unlawful act wherein the computer is either a tool or a target or both.
-cybercrime
It refers to sending large numbers of mail to the victim, which may be an individual or a
company by ultimately resulting into crashing.
-email bombing
These are programs that attach themselves to a computer or a file and then
circulate themselves to other files and to other computers on a network.
-Viruses
It is the ability to responsible, creatively, and effectively use appropriate technology to
improve and enhance learning in all subject areas and experiences.
-technology letiracy
It focuses on how information and communication technology (ICT) affects individuals,
communities and countries. social
It refers to the gap between those that have (or lack) access to computers and the Internet.
-digital divide