Ethics for the Information Age 7th Edition by Michael J. Quinn – Test Bank

 

 

To Purchase this Complete Test Bank with Answers Click the link Below

 

https://tbzuiqe.com/product/ethics-for-the-information-age-7th-edition-by-michael-j-quinn-test-bank/

 

If face any problem or Further information contact us At tbzuiqe@gmail.com

 

 

Sample Test

Chapter 3

 

The volume of spam is increasing because

1.    companies have found it to be effective.

2.    it is 30,000 times less expensive than a traditional flyer sent via the U.S. mail.

3.    some people respond to spam advertisements.

4.    All of the above <

5.    None of the above

 

A Korean cybercafé where people play on-line, persistent games is called a

1.    coffee clubhouse.

2.    computer commons.

3.    PC bang. <

4.    Tenretni (Internet spelled backwards).

5.    virtual reality theater.

 

 

 

A wiki is

1.    An online encyclopedia.

2.    A personal journal kept on the Web.

3.    An electronic profile constructed automatically by a Web browser.

4.    A piece of software that allows ISPs to monitor who visits which Web sites.

5.    A Web site that allows multiple people to contribute and edit its content. <

 

A blog is

1.    a character in Lineage, a popular on-line game.

2.    a personal journal kept on the Web. <

3.    a person who assumes a false identity in a chat room.

4.    a special symbol visible on displays that show Unicode characters.

5.    the Web version of a “couch potato.”

 

Many people are now using the Web not simply to download content, but to build communities and upload and share content they have created. This trend has been given the name

1.    Persistent online reality

2.    Online networking

3.    Web 2.0 <

4.    Interactive hypermedia

5.    Virtual reality

 

Which of these is not an example of direct censorship?

1.    government monopolization

2.    self-censorship <

3.    pre-publication review

4.    licensing and registration

5.    All of the above are examples of direct censorship.

 

According to John Stuart Mill’s Principle of Harm, the only ground on which the government should intervene in the conduct of an individual is when

1.    the individual is breaking the law.

2.    it would clearly be to the benefit of the individual.

3.    the individual is under 18 or over 65.

4.    it would prevent harm to others. <

5.    According to Mill, the government should intervene if any of the above conditions are true.

 

In the United States, freedom of expression

1.    is a positive right.

2.    is not an absolute right. <

3.    is limited to political speech.

4.    has been abolished by decisions of the U.S. Supreme Court.

5.    is guaranteed by the Fourth Amendment to the U.S. Constitution.

 

A Web filter is a piece of software that

1.    keeps track of the pages your Web browser displays.

2.    sends Google information about your Web surfing habits.

3.    prevents certain Web pages from being displayed by your browser. <

4.    prevents unauthorized people from using your computer to surf the Web.

5.    A and B.

 

 

 

 

 

 

Which of the following laws was upheld as constitutional by the U.S. Supreme Court?

1.    Communications Decency Act

2.    Child Online Protection Act

3.    Child Internet Protection Act <

4.    All of these laws were upheld as constitutional by the U.S. Supreme Court.

5.    None of these laws were upheld as constitutional by the U.S. Supreme Court.

 

Sexting refers to

1.    sending text messages with nude or nearly nude photographs.

2.    sending emails with nude or nearly nude photographs.

3.    posting nude or nearly nude photographs to a Web site.

4.    A and B. <

5.    A, B, and C.

 

Sexting is causing a legal crisis because

1.    police and prosecutors refuse to get involved in sexting cases.

2.    police and prosecutors are treating sexting as a felony offense. <

3.    prisons are starting to fill up with people convicted of sexting.

4.    police have been charged with possession of child pornography.

5.    B and C.

 

How many Americans are victims of identity theft each year?

1.    About 10,000.

2.    About 100,000.

3.    About 1 million.

4.    About 10 million. <

5.    About 100 million.

 

What is one reason why college students are five times more likely than other adults to be victims of identity theft?

1.    Most college students use their parents’ credit cards.

2.    Most college students have at most one personal credit card.

3.    College students are particularly vulnerable to phishing attacks.

4.    Many students live in close proximity with others and do not do a good job securing checkbooks and financial documents. <

5.    All of the above.

 

How many people trust a business more after reading positive online reviews?

1.    A very small percentage of consumers.

2.    About one-third of consumers.

3.    About three-quarters of consumers. <

4.    Nearly 100% of consumers.

5.    No one has ever conducted such a study.

 

Cyberbullying is defined as inflicting psychological harm on another person using

1.    the phone system.

2.    the Internet.

3.    broadcast media such as radio or television.

4.    A and B. <

5.    A, B, and C.

 

 

 

 

 

Revenge porn is a special case of

1.    < 

2.    Internet addiction.

3.    child abuse.

4.    identity theft.

5.     

 

Which of the following is not a variant of Internet addiction, according to psychiatrist Jerald Block?

1.    excessive gaming

2.    sexual preoccupations

3.    cyberbullying <

4.    e-mail/text messaging

5.    Actually, all of the above are variants of Internet addiction, according to Block.

 

The Enlightenment view of addiction is that

1.    there is nothing wrong with addiction.

2.    addiction is not real.

3.    addiction can never be overcome by will-power alone.

4.    society is responsible for the bad choices people make.

5.    people are responsible for the choices they make. <

 

 

Chapter 4

 

Which philosopher argued in The Second Treatise of Government that people have a natural right to property?

1.    Jeremy Bentham

2.    Immanuel Kant

3.    John Locke <

4.    John Stuart Mill

5.    Jean-Jacques Rousseau

Intellectual property is a unique product of the human intellect that

1.    has commercial value. <

2.    can be reproduced digitally.

3.    has been produced on paper.

4.    can be performed in public.

5.    cannot be understood by anyone other than the creator.

The value of intellectual property is recognized

1.    in the Constitution of the United States.

2.    in the free market.

3.    in legislation passed by the U.S. Congress.

4.    through court decisions.

5.    All of the above <

The proper noun “Kleenex” is protected

1.    as a trade secret.

2.    with a trademark. <

3.    with a patent.

4.    with a copyright.

5.    All of the above

 

 

Which of the following rights is not a right of a copyright holder?

1.    The right to reproduce the copyrighted work.

2.    The right to distribute the work to the public.

3.    The right to perform the work in public.

4.    The right to prevent others from producing competitive works. <

5.    The right to produce new works derived from the copyrighted work.

 

Since the first Copyright Act was passed in 1790

1.    Congress has repeatedly increased the number of years of copyright protection.

2.    Congress has made more kinds of intellectual property protected under copyright.

3.    Congress has attempted to reconcile American copyright law with European copyright law.

4.    All of the above <

5.    None of the above

Sometimes it is legal to reproduce a copyrighted work without the permission of the copyright holder. These circumstances are called

1.    fair use. <

2.    noncommercial use.

3.     

4.    public domain.

5.     

 

The Audio Home Recording Act of 1992

1.    protects the right of consumers to make backup copies of CDs.

2.    requires manufacturers of digital audio records to incorporate the Serial Copyright Management System.

3.    requires manufacturers of digital audio recording devices and blank digital media to pay a royalty to songwriters and music publishers.

4.    All of the above <

5.    None of the above

The U.S. Supreme Court decision in Sony v. Universal City Studios established the concept of

1.    fair use.

2.    intellectual property protection for movies.

3.    licensing fees for videotapes.

4.    space shifting.

5.    time shifting. <

 

The decision by the U.S. Court of Appeals, Ninth Circuit in RIAA v. Diamond Multimedia Systems Inc. established the concept of

1.    fair use.

2.    intellectual property protection for movies.

3.    licensing fees for videotapes.

4.    space shifting. <

5.    time shifting.

 

The decision by the U.S. Court of Appeals, Ninth Circuit in Kelly v. Arriba Soft Corporation established that the display of thumbnail images by a search engine

1.    is a fair use of those images. <

2.    is not a fair use of those images.

3.    is an unfair use of network bandwidth.

4.    is an illegal attempt to circumvent Web filters.

5.    is legal, even when the original images are pornographic.

 

 

Google Books is

1.    an effort to scan millions of books and make all their words searchable. <

2.    an effort to gain copyrights on millions of books in the public domain.

3.    a book reader designed to compete with the Kindle.

4.    an online store competing with Amazon.com.

5.    None of the above

 

In Authors Guild v. Google, a US District Court judge ruled that Google’s project to scan millions of copyrighted books was a fair use of copyrighted books because

1.    it is an example of time shifting.

2.    it is an example of space shifting.

3.    Google pledged to give all of the profits to charity.

4.    the project represents a highly transformative use of the copyrighted material. <

5.    all of the copyrights will eventually expire, but the database will last for centuries.

 

In 2005 Sony BMG Music Entertainment made headlines by

1.    purchasing the publishing rights to the Beatles’ songs from Michael Jackson.

2.    purchasing the iTunes Store from Apple.

3.    announcing they would begin shipping CDs without digital rights management.

4.    shipping CDs that would only play on devices manufactured by Sony.

5.    shipping CDs that secretly installed a rootkit on Windows computers. <

After the RIAA sued Napster,

1.    the Supreme Court ruled in favor of Napster.

2.    Congress passed the Digital Millennium Copyright Act that legalized file sharing.

3.    Congress made peer-to-peer networks illegal.

4.    Napster renamed itself KaZaA.

5.    Napster went off-line. <

Suppose you buy a Microsoft game at the bookstore. Under current U.S. law, which of the following actions is illegal?

1.    Copying it onto a CD to give or sell to someone else.

2.    Preloading it onto the hard disk of a computer being sold.

3.    Distributing it over the Internet.

4.    All of the above are illegal. <

5.    None of the above is illegal.

The Digital Millennium Copyright Act is controversial, in part, because

1.    it lengthens copyright protection to 1,000 years.

2.    it makes it illegal for consumers to circumvent encryption placed on digital media. <

3.    it adds a new federal tax to all CDs and DVDs.

4.    it requires music streaming services to register with the US Copyright Office.

5.    All of the above

 

Apple’s digital rights management system called FairPlay prevented

1.    songs from being played on more than five computers.

2.    songs from being copied onto CDs more than seven times.

3.    music purchased from the iTunes Store from playing on non-Apple MP3 players.

4.    All of the above <

5.    None of the above

 

 

 

 

Compared with other peer-to-peer networks, BitTorrent takes advantage of the fact that broadband Internet connections

1.    continue to drop in price.

2.    are immune from surveillance by the police.

3.    provide higher speeds for downloading than for uploading. <

4.    have become the standard in most homes in the United States.

5.    All of the above.

The court’s ruling in Apple Computer v. Franklin Computer Corp. established that

1.    computer hardware can be patented.

2.    computer software can be copyrighted.

3.    object programs can be copyrighted. <

4.    the “look and feel” of a computer program can be patented.

5.    Apple Computer could not patent its desktop icons.

The so-called “smartphone patent wars” ended when

1.    Samsung agreed to stop copying Apple’s design features.

2.    Apple bought all of the patents owned by Samsung and Nokia.

3.    the smartphone makers agreed to stop patenting new inventions.

4.    the smartphone makers agreed to cross-license each other’s patents. <

5.    the U.S. Supreme Court ruled that “look and feel” could not be patented.

The Linux operating system is an example of

1.    free-market software.

2.    open-source software. <

3.    pirated software.

4.    proprietary software.

5.    unreliable software.

Chapter 3

Unsolicited, bulk, commercial email is commonly called spam.

Trying to create a list of valid email addresses by sending email to randomly generated addresses and seeing which ones are delivered is called a dictionary attack.

Every object on the World Wide Web has a unique address called the Uniform Resource Locator (URL).

A personal journal or diary kept on the Web is called a blog.

Mobile apps allow users of devices such as smartphones and tablets to access the Internet and download and upload data.

Web users have the ability to contribute content to the Web. This way of using the Web has been given the name Web 2.0.

An online method to get information or ideas from a large group of people is commonly known as crowdsourcing.

The Internet of Things refers to Internet-connected devices that can be controlled remotely.

Chinese “gold farmers” make a living by playing persistent online games and selling virtual objects such as gold and artifacts over the Internet.

Saudi Arabians have access to the Internet through a control center outside Riyadh which blocks (filters out) pornography sites, gambling sites, and sites offensive to Islam.

In 2003, the U.S. Supreme Court ruled that the Child Internet Protection Act was constitutional.

The attempt to suppress or regulate public access to material considered offensive or harmful is called censorship.

The three forms of direct censorship are government monopolypre-publication review, and licensing and registration.

John Stuart Mill held that an institution to intervene in the conduct of an individual only when the intervention is needed to prevent harm to others. This is called the Principle of Harm.

In 18th century America, there were no prior restraints on publication. This meant that colonists had the freedom to publish without a license.

The First Amendment to the Constitution guarantees freedom of speech and freedom of the press.

The act of assuming someone else’s electronic identity is called identity theft.

From the point of view of Kant or Mill, the responsibility for excessive Internet use lies with the individual user.

Responding to concerns about excessive Internet use by its youth, the government of South Korea passed a law prohibiting children under 16 from playing online games between midnight and 6 a.m., and the government of China issued a regulation requiring Internet providers to implement an
“anti-online game addiction system.”

Chapter 4

In The Second Treatise of Government, John Locke makes a case for a natural right to property.

The U.S. Congress addresses the tension between society’s desire for inventions to be in the public domain and the inventor’s expectation of profit by giving inventors exclusive rights to their discoveries for a limited period of time.

Merchandise 7X, the formula for Coca-Cola® syrup, is a famous example of a type of intellectual property known as a trade secret.

A company’s logo is an example of a type of intellectual property that can be protected by a trademark.

Kodak had to pay Polaroid $925 million for violating seven of Polaroid’s patents for instant photography.

In 1991 a U.S. District Court judge ordered Kinko’s to pay $510,000 to a group of eight book publishers for violating their copyrights by producing photocopied packets of reading materials for college students.

Since the first Copyright Act was passed in 1790, both the length of copyright protection and the kinds of intellectual properties that can be copyrighted have increased significantly.

Under some circumstances it is legal to reproduce a copyrighted work without permission. These circumstances are called fair use.

In Sony v. Universal City Studios, the U.S. Supreme Court ruled that time shifting is legal.

In RIAA v. Diamond Multimedia Systems, Inc., the U.S. Court of Appeals ruled that space shifting is legal.

Arriba Soft Corporation was sued for copyright infringement because its Web search engine returned thumbnail images of photos. A court later ruled this was a fair use.

In December 2004 Google announced a plan to scan millions of books held by several of the world’s largest libraries.

Sony BMG Music Entertainment’s Extended Copy Protection system provoked controversy because it secretly installed a rootkit on Windows computers.

FairPlay was the name of Apple’s digital rights management / DRM system.

Microsoft changed course after its proposed cloud-based gaming experience for the Xbox One received negative feedback from customers. Three features of the licensing agreement were most controversial: disc owners could share a disc only once, freedom to buy and sell used discs was restricted, and Xbox consoles would have to check in online once every 24 hours.

peer-to-peer network allows computers running the same networking program to connect with each other and access files stored on each other’s hard drives.

BitTorrent makes file downloading faster by allowing different pieces of a file to be downloaded simultaneously from different computers.

In September 2003 the RIAA sued 261 individuals for distributing copyrighted music over the Internet.

The legal case Apple Computer, Inc. v. Franklin Computer Corp. established that object programs are copyrightable.

“clean room” software development strategy helps ensure a company’s software program does not duplicate any code in another company’s product.

The “smartphone patent wars” ended when smartphone makers agreed to cross-license each other’s patents.

Thanks to the work of Stanford law professor Lawrence Lessig and his collaborators, you can use a Creative Commons license to retain the copyright while allowing some uses of your intellectual property under certain circumstances.

 

Comments

Popular posts from this blog

Business and Administrative Communication A Locker 12th Edition – Test Bank

Crafting and Executing Strategy The Quest for Competitive Advantage Concepts Arthur Thompson 22nd Edition- Test Bank

Experience Human Development 13Th Edition By Diane Papalia – Test Bank