Вы находитесь на странице: 1из 6

Which of the following is NOT a concern pertaining to cyber ethics?

SPAM S1-01: MP3 distribution Hacking security software None of the above Your answer was Correct. _______ refers to a range of electronic and communications devices such as personal computers, laptops, Global Positioning System (GPS) devices, networks (LAN and WAN), and even the Internet. Ethic technology S1-02: Cyber technology Computer ethics Cyber ethics Your answer was Correct. Which of the following statements is false? Instrumental values are valued because they help us achieve things of intrinsic value. S1-03: Computers, vehicles, money, and jobs are instrumental values. We have no other reason to value intrinsic objects, except that we just do because of what they are. None of the above, all of the statements are True. Your answer was Incorrect. Which of the following statements is True? The law considers what is morally acceptable to society to be right, while ethics considers what is a legal act to be right. The law considers what is a legal act to be right, while ethics considers what is S1-04: morally acceptable to society to be right. Both law and ethics considers what is a legal act to always be right. None of the above Your answer was Correct. What embraces the concept that an action is acceptable if it produces the greatest good for the greatest number of people whom the action affects? S1-05: Deontology Consequentialism Rule Utilitarianism

Act Utilitarianism Your answer was Correct. It is important for a company to best meet the interests of its ______. partners S1-06: stakeholders CEO policies Your answer was Correct. Which of the following is NOT acceptable under the categorical imperative? Finishing a project late Excuses for tardiness S1-07: Lying to others All of the above None of the above Your answer was Incorrect. Which of the following statements is True about the normative approach? Normative ethical perspectives would tell us that we should not illegally share software, data files, or music files without permission. Normative ethics would report to us the number of people who are sharing illegal S1-08: copies of software, or illegally downloading mp3s without permission. The normative approach helps us analyze ethical issues for improving or evaluating social status. All of the above Your answer was Incorrect. Which of the following statements is false? Sometimes laws are morally wrong. S1-09: Software piracy can be considered unethical in philosophical ethics simply because it is wrong to steal another person's property. It is simple to apply religion as a moral system for society because America's society contains many types of beliefs in divine authorities. All of the above. Your answer was Incorrect. Policies can range from _________. S1-10: laws to informal guidelines.

judicial laws to formal guidelines. informal guidelines to suggestions. suggestions to family traditions. Your answer was Incorrect. Which of the following is True? If an act is unethical, it is always against the law. S1-11: If an act is legal, then it is always ethical and considerate. An act may be ethical and against the law. If an act is against the law, then it is always unethical. Your answer was Correct. Which of the following statements is NOT a tip that helps establish an ethical work environment? Make sure everyone is aware of penalties for violations of the code of ethics. S1-12: Hold regular annual training to ensure the code's principles are being enforced. Value employee happiness above the business strategy. Supply the code to all employees and have them sign a document stating that they read and understand the code of ethics. Your answer was Correct. S1-13:
cyber

ethics deals with ethical issues exclusively involving the Internet.

Your answer was Incorrect. Which of the following is a step in an approach to ethical decision making? Identify stakeholders and their positions. S1-14: Create guidelines that meet the needs of the stakeholders. Define a Code of Ethics. None of the above Your answer was Incorrect. Conceptual muddles occur when law and/or philosophy have been outpaced by technology, creating vacuums. One main conceptual muddle in cyber technology is to answer the question: S1-15: What is computer technology? Who creates cyber technology? What is computer software? What is cyber technology?

Your answer was Incorrect. Which of the following best describes avoiding unfavorable publicity? Growing strong employee relations. S1-16: Operating ethically in order to generate good customer relations. A company understanding its strengths and weaknesses, having a commitment to the law, and ethical actions using their core beliefs as an organization. None of the above Your answer was Incorrect. ________ reports what is the case with respect to morally right and wrong behavior. Professional ethics S1-17: Virtue ethics Descriptive ethics Philosophical ethics Your answer was Correct. _______ address(es) practical ethical issues and analyze specific ethical and moral dilemmas. Analytical ethics S1-18: Simplified ethics Applied ethics Ethical law Your answer was Incorrect. At its core are rules of conduct for guiding action. This term is known as: morality S1-19: guideline criteria virtue Your answer was Correct. Under the _______ theory, a person should strive to be an ethical person, not just make ethical decisions or study ethical rules or social policies. deontology S1-20: categorical imperative consequentialism virtue ethics

Your answer was Correct. "The actions performed with cyber technology do not make the technology itself good or bad" is a statement that defines cyber technology as: fair S1-21: neutral considerate moderate Your answer was Correct. Under the professional ethics perspective, cyber ethics_______. includes broader concerns - social policies as well as individual behavior - that affect virtually anyone in society. can best be understood as identifying and analyzing issues of ethical responsibility S1-22: for computer professionals. reports what is the case with respect to morally right and wrong behavior. None of the above Your answer was Incorrect. An action is good as long as it has good consequences or results is a concept in an S1-23: consequentialism ethical theory known as . Your answer was Correct. ______________ are philosophical frameworks for guiding decisions about whether directives, actions, or social policies are right or wrong. Deontologists S1-24: Virtues Ethical theories Laws Your answer was Correct. With which of the issues below must we use ethical theories to guide our analysis? A person might feel that it is important to stop law enforcement from being able to search people in an airport. One may feel like it is okay to share an artist's music (mp3 sharing) without his or S1-25: her consent or giving them compensation. Using the Golden Rule, do unto others as you would have them do unto you. All of the above. Your answer was Incorrect. S1-26: Under the _______ perspective, cyber ethics includes broader concerns - social policies

as well as individual behavior - that affect virtually anyone in society. professional ethics virtue ethics philosophical ethics descriptive ethics Your answer was Correct.

Вам также может понравиться