Deck 17: Making Decisions About Computers, Information, and Society
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 17: Making Decisions About Computers, Information, and Society
1
The more you compress music data, the more sound quality you gain. _________________________
False
lose
lose
2
An ethical dialectic usually has a clean stopping point.
False
3
All music artists are naturally opposed to MP3 copying.
False
4
The digital representation of audio information can produce massive and unwieldy data files, which can be reduced by using a compression algorithm such as FTP.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Using the utilitarians' criterion requires subjective judgments. _________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
A compression ratio of 12 to 1 has become popular, with the resulting sound quality almost comparable to a music CD that has not been compressed. _________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
____ answer the question "Good for whom?" with a hearty, "Good for everyone!".
A) Deontologists
B) Consequentialists
C) Utilitarians
D) Intelligent agents
A) Deontologists
B) Consequentialists
C) Utilitarians
D) Intelligent agents
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
The Napster software set up what's called ____ file sharing.
A) freeware
B) MP3
C) peer-to-peer
D) client-server
A) freeware
B) MP3
C) peer-to-peer
D) client-server
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
In 1997, Tomislav Uzelac, a software developer at Advanced Multimedia Products, created what is regarded as the first commercially viable WMF playback program. _________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
By most accounts, the majority of MP3 music that Napster users "shared" was copyrighted, and most of the copyright holders objected to the copying of their music without royalty payments.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
What would a careful utilitarian declare an act if HAPPINESS_AFTER = HAPPINESS_BEFORE?
A) good
B) evil
C) ethically neutral
D) none of the above
A) good
B) evil
C) ethically neutral
D) none of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
MP3 file copying has encouraged CD buying as a long term effect.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
In ____, the Fraunhofer Institute patented MP3 in Germany, and a few years later MP3 became an international standard.
A) 1989
B) 1999
C) 2000
D) 2002
A) 1989
B) 1999
C) 2000
D) 2002
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Most ethicists agree that since there are many more music publishers than listeners, MP3 copying is okay.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
The most well-known consequentialists are the neo-Luddites. _________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Some people view hackers as social gadflies, people who raise important, but irritating, questions about society.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Making critical decisions about computing technology is unavoidable.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
The MP3 protocol allows one level of compression.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Napster lost the case accusing it of copyright infringement but won subsequent appeals.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Apple's iTunes music store accounts for more than ____ of music sales in the United States.
A) 10%
B) 15%
C) 25%
D) 66%
A) 10%
B) 15%
C) 25%
D) 66%
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
The power of ____________________ is that it can transfer our understandings and intuitions about something well known to a situation or entity that is less well known.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Ethicists depend on what is called a(n) ____ to try to make better and better ethical decisions.
A) PGP
B) dialectic
C) MP3
D) deontology
A) PGP
B) dialectic
C) MP3
D) deontology
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
A(n) ____ is someone who breaks into computer systems, launches Internet worms and viruses, or perpetrates other dubious computer-related vandalism.
A) encryption
B) PGP
C) utilitarian
D) hacker
A) encryption
B) PGP
C) utilitarian
D) hacker
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
The opponents to ____________________ copying hold that in the long run there may be far less music available for copying because artists and publishers will have far less incentive to create and disseminate music.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
The "hacker ethic" makes the claim that ____.
A) all hacking is positive hacking
B) information sharing is a powerful positive good
C) hackers are ethically ok as long as they have fun
D) hacking is acceptable as long as it is a solitary activity
A) all hacking is positive hacking
B) information sharing is a powerful positive good
C) hackers are ethically ok as long as they have fun
D) hacking is acceptable as long as it is a solitary activity
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
A fundamental question in ____________________ is what criteria to use when "measuring" the rightness or wrongness of a particular act.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
The final step of the paramedic method is to ____.
A) make a decision or loop again
B) identify stakeholders
C) identify what is at stake
D) think of analogies
A) make a decision or loop again
B) identify stakeholders
C) identify what is at stake
D) think of analogies
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Perhaps the most famous deontologist was the German philosopher Immanuel Kant, who was born in the ____ century.
A) sixteenth
B) seventeenth
C) eighteenth
D) nineteenth
A) sixteenth
B) seventeenth
C) eighteenth
D) nineteenth
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
The new way of thinking about making and sharing music will deemphasize the need for large ____ companies.
A) record
B) music
C) software
D) publishing
A) record
B) music
C) software
D) publishing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
A ____ focus more on the duties of the person acting and the way the act impinges on the rights of others.
A) utilitarian
B) consequentialist
C) hacker
D) deontologist
A) utilitarian
B) consequentialist
C) hacker
D) deontologist
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
The philosopher ____ was known to say "never treat a fellow human merely as a means to an end."
A) Descartes
B) Turing
C) Aristotle
D) Kant
A) Descartes
B) Turing
C) Aristotle
D) Kant
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Ideally, in a(n) ____________________, the ultimate goal is for both sides to "win" by moving closer to the truth from two different perspectives.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
One of the challenges when using a(n) ____________________ argument in a dialectic about hacking is that it is sometimes difficult to predict consequences with any accuracy.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Social ____ are people who raise important, but irritating, questions about society.
A) gadflies
B) gadabouts
C) hackers
D) dialectics
A) gadflies
B) gadabouts
C) hackers
D) dialectics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
In a(n) ____, we move back and forth between different viewpoints, criticizing each and trying to learn from each.
A) encryption scheme
B) dialectic
C) utilitarian scheme
D) PGP
A) encryption scheme
B) dialectic
C) utilitarian scheme
D) PGP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Kant came up with ____ that characterized the duties we humans have to each other.
A) ten laws
B) a mathematical formulation
C) categorical imperatives
D) an algorithm
A) ten laws
B) a mathematical formulation
C) categorical imperatives
D) an algorithm
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
The first step in the paramedic method is to ____.
A) ask what is at stake
B) identify stakeholders
C) identify duties and responsibilities
D) think of analogies
A) ask what is at stake
B) identify stakeholders
C) identify duties and responsibilities
D) think of analogies
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
The word ____ is from the Greek and means "the study of duty."
A) encryption
B) hacker
C) deontology
D) modus ponens
A) encryption
B) hacker
C) deontology
D) modus ponens
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
____ calls can be made from any place that the user can get an Internet connection.
A) FTP
B) VoIP
C) Linux
D) MP3
A) FTP
B) VoIP
C) Linux
D) MP3
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
A ____ focuses on the consequences of an act to determine if the act is good or bad.
A) consequentialist
B) universalist
C) PGP
D) dialectic
A) consequentialist
B) universalist
C) PGP
D) dialectic
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Using the VoIP case from this chapter, walk through the interested parties and how the establishment of lawful intercepts affects the happiness of these parties.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What are the components of the "hacker ethic" described in the text?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Define cyberbullying.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
What is Anonymous? What are its best-known actions?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What are two of these major leaks in which WikiLeaks has been involved?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What is impersonation, in the context of cyberbullying?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Explain what sexting is.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Explain what WikiLeaks is, how it operates, and what its goal is.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
What is Kant's second categorical imperative?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What are two challenges associated with using a utilitarian argument in a dialectic about hacking?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck