Ethics for the Information Age 7th Edition by Michael J. Quinn – Test Bank
To Purchase
this Complete Test Bank with Answers Click the link Below
https://tbzuiqe.com/product/ethics-for-the-information-age-7th-edition-by-michael-j-quinn-test-bank/
If face any problem or
Further information contact us At tbzuiqe@gmail.com
Sample
Test
Chapter 3
The volume of spam is increasing because
1. companies
have found it to be effective.
2. it is
30,000 times less expensive than a traditional flyer sent via the U.S. mail.
3. some
people respond to spam advertisements.
4. All
of the above <
5. None
of the above
A Korean cybercafé where people play on-line, persistent games
is called a
1. coffee
clubhouse.
2. computer
commons.
3. PC
bang. <
4. Tenretni
(Internet spelled backwards).
5. virtual
reality theater.
A wiki is
1. An
online encyclopedia.
2. A
personal journal kept on the Web.
3. An
electronic profile constructed automatically by a Web browser.
4. A
piece of software that allows ISPs to monitor who visits which Web sites.
5. A Web
site that allows multiple people to contribute and edit its content. <
A blog is
1. a
character in Lineage, a popular on-line game.
2. a
personal journal kept on the Web. <
3. a
person who assumes a false identity in a chat room.
4. a
special symbol visible on displays that show Unicode characters.
5. the
Web version of a “couch potato.”
Many people are now using the Web not simply to download
content, but to build communities and upload and share content they have
created. This trend has been given the name
1. Persistent
online reality
2. Online
networking
3. Web
2.0 <
4. Interactive
hypermedia
5. Virtual
reality
Which of these is not an example of direct censorship?
1. government
monopolization
2. self-censorship
<
3. pre-publication
review
4. licensing
and registration
5. All of
the above are examples of direct censorship.
According to John Stuart Mill’s Principle of Harm, the only
ground on which the government should intervene in the conduct of an individual
is when
1. the
individual is breaking the law.
2. it
would clearly be to the benefit of the individual.
3. the
individual is under 18 or over 65.
4. it
would prevent harm to others. <
5. According
to Mill, the government should intervene if any of the above conditions are
true.
In the United States, freedom of expression
1. is a
positive right.
2. is
not an absolute right. <
3. is
limited to political speech.
4. has
been abolished by decisions of the U.S. Supreme Court.
5. is
guaranteed by the Fourth Amendment to the U.S. Constitution.
A Web filter is a piece of software that
1. keeps
track of the pages your Web browser displays.
2. sends
Google information about your Web surfing habits.
3. prevents
certain Web pages from being displayed by your browser. <
4. prevents
unauthorized people from using your computer to surf the Web.
5. A and
B.
Which of the following laws was upheld as constitutional by the
U.S. Supreme Court?
1. Communications
Decency Act
2. Child
Online Protection Act
3. Child
Internet Protection Act <
4. All
of these laws were upheld as constitutional by the U.S. Supreme Court.
5. None
of these laws were upheld as constitutional by the U.S. Supreme Court.
Sexting refers to
1. sending
text messages with nude or nearly nude photographs.
2. sending
emails with nude or nearly nude photographs.
3. posting
nude or nearly nude photographs to a Web site.
4. A and
B. <
5. A, B,
and C.
Sexting is causing a legal crisis because
1. police
and prosecutors refuse to get involved in sexting cases.
2. police
and prosecutors are treating sexting as a felony offense. <
3. prisons
are starting to fill up with people convicted of sexting.
4. police
have been charged with possession of child pornography.
5. B and
C.
How many Americans are victims of identity theft each year?
1. About
10,000.
2. About
100,000.
3. About
1 million.
4. About
10 million. <
5. About
100 million.
What is one reason why college students are five times more
likely than other adults to be victims of identity theft?
1. Most
college students use their parents’ credit cards.
2. Most
college students have at most one personal credit card.
3. College
students are particularly vulnerable to phishing attacks.
4. Many
students live in close proximity with others and do not do a good job securing
checkbooks and financial documents. <
5. All
of the above.
How many people trust a business more after reading positive
online reviews?
1. A very
small percentage of consumers.
2. About
one-third of consumers.
3. About
three-quarters of consumers. <
4. Nearly
100% of consumers.
5. No
one has ever conducted such a study.
Cyberbullying is defined as inflicting psychological harm on
another person using
1. the
phone system.
2. the
Internet.
3. broadcast
media such as radio or television.
4. A and
B. <
5. A, B,
and C.
Revenge porn is a special case of
1. <
2. Internet
addiction.
3. child
abuse.
4. identity
theft.
5.
Which of the following is not a variant of Internet addiction,
according to psychiatrist Jerald Block?
1. excessive
gaming
2. sexual
preoccupations
3. cyberbullying
<
4. e-mail/text
messaging
5. Actually,
all of the above are variants
of Internet addiction, according to Block.
The Enlightenment view of addiction is that
1. there
is nothing wrong with addiction.
2. addiction
is not real.
3. addiction
can never be overcome by will-power alone.
4. society
is responsible for the bad choices people make.
5. people
are responsible for the choices they make. <
Chapter 4
Which philosopher argued in The Second Treatise of Government
that people have a natural right to property?
1. Jeremy
Bentham
2. Immanuel
Kant
3. John
Locke <
4. John
Stuart Mill
5. Jean-Jacques
Rousseau
Intellectual property is a unique product of the human intellect
that
1. has
commercial value. <
2. can
be reproduced digitally.
3. has
been produced on paper.
4. can
be performed in public.
5. cannot
be understood by anyone other than the creator.
The value of intellectual property is recognized
1. in
the Constitution of the United States.
2. in
the free market.
3. in
legislation passed by the U.S. Congress.
4. through
court decisions.
5. All
of the above <
The proper noun “Kleenex” is protected
1. as a
trade secret.
2. with
a trademark. <
3. with
a patent.
4. with
a copyright.
5. All
of the above
Which of the following rights is not a right of a copyright
holder?
1. The
right to reproduce the copyrighted work.
2. The
right to distribute the work to the public.
3. The
right to perform the work in public.
4. The
right to prevent others from producing competitive works. <
5. The
right to produce new works derived from the copyrighted work.
Since the first Copyright Act was passed in 1790
1. Congress
has repeatedly increased the number of years of copyright protection.
2. Congress
has made more kinds of intellectual property protected under copyright.
3. Congress
has attempted to reconcile American copyright law with European copyright law.
4. All
of the above <
5. None
of the above
Sometimes it is legal to reproduce a copyrighted work without
the permission of the copyright holder. These circumstances are called
1. fair
use. <
2. noncommercial
use.
3.
4. public
domain.
5.
The Audio Home Recording Act of 1992
1. protects
the right of consumers to make backup copies of CDs.
2. requires
manufacturers of digital audio records to incorporate the Serial Copyright
Management System.
3. requires
manufacturers of digital audio recording devices and blank digital media to pay
a royalty to songwriters and music publishers.
4. All
of the above <
5. None
of the above
The U.S. Supreme Court decision in Sony v. Universal City
Studios established the concept of
1. fair
use.
2. intellectual
property protection for movies.
3. licensing
fees for videotapes.
4. space
shifting.
5. time
shifting. <
The decision by the U.S. Court of Appeals, Ninth Circuit in RIAA
v. Diamond Multimedia Systems Inc. established the concept of
1. fair
use.
2. intellectual
property protection for movies.
3. licensing
fees for videotapes.
4. space
shifting. <
5. time
shifting.
The decision by the U.S. Court of Appeals, Ninth Circuit in
Kelly v. Arriba Soft Corporation established that the display of thumbnail
images by a search engine
1. is a
fair use of those images. <
2. is
not a fair use of those images.
3. is an
unfair use of network bandwidth.
4. is an
illegal attempt to circumvent Web filters.
5. is
legal, even when the original images are pornographic.
Google Books is
1. an
effort to scan millions of books and make all their words searchable. <
2. an
effort to gain copyrights on millions of books in the public domain.
3. a
book reader designed to compete with the Kindle.
4. an
online store competing with Amazon.com.
5. None
of the above
In Authors Guild v. Google, a US District Court judge ruled that
Google’s project to scan millions of copyrighted books was a fair use of
copyrighted books because
1. it is
an example of time shifting.
2. it is
an example of space shifting.
3. Google
pledged to give all of the profits to charity.
4. the
project represents a highly transformative use of the copyrighted material.
<
5. all
of the copyrights will eventually expire, but the database will last for
centuries.
In 2005 Sony BMG Music Entertainment made headlines by
1. purchasing
the publishing rights to the Beatles’ songs from Michael Jackson.
2. purchasing
the iTunes Store from Apple.
3. announcing
they would begin shipping CDs without digital rights management.
4. shipping
CDs that would only play on devices manufactured by Sony.
5. shipping
CDs that secretly installed a rootkit on Windows computers. <
After the RIAA sued Napster,
1. the
Supreme Court ruled in favor of Napster.
2. Congress
passed the Digital Millennium Copyright Act that legalized file sharing.
3. Congress
made peer-to-peer networks illegal.
4. Napster
renamed itself KaZaA.
5. Napster
went off-line. <
Suppose you buy a Microsoft game at the bookstore. Under current
U.S. law, which of the following actions is illegal?
1. Copying
it onto a CD to give or sell to someone else.
2. Preloading
it onto the hard disk of a computer being sold.
3. Distributing
it over the Internet.
4. All
of the above are illegal. <
5. None
of the above is illegal.
The Digital Millennium Copyright Act is controversial, in part,
because
1. it
lengthens copyright protection to 1,000 years.
2. it
makes it illegal for consumers to circumvent encryption placed on digital
media. <
3. it
adds a new federal tax to all CDs and DVDs.
4. it
requires music streaming services to register with the US Copyright Office.
5. All
of the above
Apple’s digital rights management system called FairPlay
prevented
1. songs
from being played on more than five computers.
2. songs
from being copied onto CDs more than seven times.
3. music
purchased from the iTunes Store from playing on non-Apple MP3 players.
4. All
of the above <
5. None
of the above
Compared with other peer-to-peer networks, BitTorrent takes
advantage of the fact that broadband Internet connections
1. continue
to drop in price.
2. are
immune from surveillance by the police.
3. provide
higher speeds for downloading than for uploading. <
4. have
become the standard in most homes in the United States.
5. All
of the above.
The court’s ruling in Apple Computer v. Franklin Computer Corp.
established that
1. computer
hardware can be patented.
2. computer
software can be copyrighted.
3. object
programs can be copyrighted. <
4. the
“look and feel” of a computer program can be patented.
5. Apple
Computer could not patent its desktop icons.
The so-called “smartphone patent wars” ended when
1. Samsung
agreed to stop copying Apple’s design features.
2. Apple
bought all of the patents owned by Samsung and Nokia.
3. the
smartphone makers agreed to stop patenting new inventions.
4. the
smartphone makers agreed to cross-license each other’s patents. <
5. the
U.S. Supreme Court ruled that “look and feel” could not be patented.
The Linux operating system is an example of
1. free-market
software.
2. open-source
software. <
3. pirated
software.
4. proprietary
software.
5. unreliable
software.
Chapter 3
Unsolicited, bulk, commercial email is commonly called spam.
Trying to create a list of valid email addresses by sending
email to randomly generated addresses and seeing which ones are delivered is
called a dictionary attack.
Every object on the World Wide Web has a unique address called
the Uniform Resource Locator (URL).
A personal journal or diary kept on the Web is called a blog.
Mobile apps allow users of devices such as smartphones
and tablets to access the Internet and download and upload data.
Web users have the ability to contribute content to the Web.
This way of using the Web has been given the name Web 2.0.
An online method to get information or ideas from a large group
of people is commonly known as crowdsourcing.
The Internet of Things refers to Internet-connected
devices that can be controlled remotely.
Chinese “gold farmers” make a living by playing persistent
online games and selling virtual objects such as gold and artifacts
over the Internet.
Saudi Arabians have access to the Internet through a control
center outside Riyadh which blocks (filters out) pornography
sites, gambling sites, and sites offensive to Islam.
In 2003, the U.S. Supreme Court ruled that the Child Internet
Protection Act was constitutional.
The attempt to suppress or regulate public access to material
considered offensive or harmful is called censorship.
The three forms of direct censorship are government
monopoly, pre-publication review, and licensing and
registration.
John Stuart Mill held that an institution to intervene in the
conduct of an individual only when the intervention is needed to prevent harm
to others. This is called the Principle of Harm.
In 18th century America, there were no prior restraints on
publication. This meant that colonists had the freedom to publish
without a license.
The First Amendment to the Constitution
guarantees freedom of speech and freedom of the press.
The act of assuming someone else’s electronic identity is
called identity theft.
From the point of view of Kant or Mill, the responsibility for
excessive Internet use lies with the individual user.
Responding to concerns about excessive Internet use by its
youth, the government of South Korea passed a law prohibiting
children under 16 from playing online games between midnight and 6 a.m., and
the government of China issued a regulation requiring Internet
providers to implement an
“anti-online game addiction system.”
Chapter 4
In The Second Treatise of Government, John Locke makes
a case for a natural right to property.
The U.S. Congress addresses the tension between society’s desire
for inventions to be in the public domain and the inventor’s expectation of
profit by giving inventors exclusive rights to their discoveries for a
limited period of time.
Merchandise 7X, the formula for Coca-Cola® syrup,
is a famous example of a type of intellectual property known as a trade
secret.
A company’s logo is an example of a type of intellectual
property that can be protected by a trademark.
Kodak had to pay Polaroid $925 million for violating seven of
Polaroid’s patents for instant photography.
In 1991 a U.S. District Court judge ordered Kinko’s to
pay $510,000 to a group of eight book publishers for violating their copyrights
by producing photocopied packets of reading materials for college students.
Since the first Copyright Act was passed in 1790, both the
length of copyright protection and the kinds of intellectual properties that
can be copyrighted have increased significantly.
Under some circumstances it is legal to reproduce a copyrighted
work without permission. These circumstances are called fair use.
In Sony v. Universal City Studios, the U.S. Supreme Court ruled
that time shifting is legal.
In RIAA v. Diamond Multimedia Systems, Inc., the U.S. Court of Appeals
ruled that space shifting is legal.
Arriba Soft Corporation was sued for copyright infringement
because its Web search engine returned thumbnail images of photos.
A court later ruled this was a fair use.
In December 2004 Google announced a plan to scan
millions of books held by several of the world’s largest libraries.
Sony BMG Music Entertainment’s Extended Copy Protection system
provoked controversy because it secretly installed a rootkit on Windows
computers.
FairPlay was the name of Apple’s digital rights
management / DRM system.
Microsoft changed course after its proposed cloud-based gaming
experience for the Xbox One received negative feedback from customers. Three
features of the licensing agreement were most controversial: disc owners could
share a disc only once, freedom to buy and sell used discs was restricted,
and Xbox consoles would have to check in online once every 24 hours.
A peer-to-peer network allows computers running
the same networking program to connect with each other and access files stored
on each other’s hard drives.
BitTorrent makes file downloading faster by allowing
different pieces of a file to be downloaded simultaneously from different
computers.
In September 2003 the RIAA sued 261 individuals for distributing
copyrighted music over the Internet.
The legal case Apple Computer, Inc. v. Franklin Computer Corp.
established that object programs are copyrightable.
A “clean room” software development strategy
helps ensure a company’s software program does not duplicate any code in
another company’s product.
The “smartphone patent wars” ended when smartphone
makers agreed to cross-license each other’s patents.
Thanks to the work of Stanford law professor Lawrence Lessig and
his collaborators, you can use a Creative Commons license to
retain the copyright while allowing some uses of your intellectual property
under certain circumstances.
Comments
Post a Comment