Deck 17: Making Decisions About Computers, Information, and Society

Full screen (f)
exit full mode
Question
Although music sales on physicalmedia still account for slightly over half of the recording industry's revenue,39% now comes from digital sales and VoIP._________________________
Use Space or
up arrow
down arrow
to flip the card.
Question
The scholarly field of ethics has a long history ofstudying how to identify and resolve conflicts.
Question
All musicians are naturally opposed to music file sharing.
Question
____ is a technologythat encrypts a computer file so it can only be used according to the wishes of thecopyright holder.

A) Digital rights management
B) File sharing
C) Wiretapping
D) Peer-to-peer
Question
Using the utilitarians' criterion requires subjective judgments._________________________
Question
BitTorrent isthe most popular current peer-to-peer file sharing system and accounts for 7% of Internet traffic, putting it in
fourth place overall (after Netflix, YouTube, and HTTP traffic)._________________________
Question
By most accounts, the majority of music that Napster users "shared" was copyrighted, and most of the copyright holders objected to the copying of their music without royalty payments.
Question
Napster lost the case accusing it of copyright infringement but won subsequent appeals.
Question
VoIP stands for Voice over InternetProtocol._________________________
Question
Today, more than ____ U.S.households have no landline-basedphone, and that percentage is growing rapidly.

A) 10%
B) 15%
C) 25%
D) 40%
Question
The most well-known consequentialists are the neo-Luddites._________________________
Question
What would a careful utilitarian declare an act if HAPPINESS_AFTER = HAPPINESS_BEFORE?

A) good
B) evil
C) ethically neutral
D) not relevant
Question
An ethical dialectic usually has a clean stopping point.
Question
Some people view hackers as social gadflies, people who raise important, but irritating, questions about society.
Question
Music file copying has encouraged CD buying over the long term.
Question
The Napster software set up what's called ____ file sharing.

A) freeware
B) MP3
C) peer-to-peer
D) client-server
Question
Once Napster helpedusers find each other electronically, the file sharing took place through Napster.
Question
Most ethicists agree that since there are many more music publishers than listeners, MP3 copying is okay.
Question
"Sharing" of music and movies was rare prior to thepopularity of high-speed Internet.
Question
____ answer the question "Good for whom?" with a hearty, "Good for everyone!".

A) Deontologists
B) Consequentialists
C) Utilitarians
D) Intelligent agents
Question
The new way of thinking about making and sharing music will deemphasize the need for large ____ companies.

A) record
B) music
C) software
D) publishing
Question
The philosopher ____ was known to say "never treat a fellow human merely as a means to an end."

A) Descartes
B) Turing
C) Aristotle
D) Kant
Question
____ calls can be made from any place that the user can get an Internet connection.

A) FTP
B) VoIP
C) Linux
D) MP3
Question
Social ____ are people who raise important, but irritating, questions about society.

A) gadflies
B) gadabouts
C) hackers
D) dialectics
Question
The opponents of ____________________ hold that in the long run there may be far less music available because artists and publishers will have far less incentive to create and disseminate music.
Question
The "hacker ethic" makes the claim that ____.

A) all hacking is positive hacking
B) information sharing is a powerful positive good
C) hackers are ethically ok as long as they have fun
D) hacking is acceptable as long as it is a solitary activity
Question
A(n) ____ is someone who breaks into computer systems, launches Internet worms and viruses, or perpetrates other dubious computer-related vandalism.

A) encryption
B) PGP
C) utilitarian
D) hacker
Question
Perhaps the most famous ____ was the German philosopher Immanuel Kant, who was born in the eighteenth century.

A) utilitarian
B) Consequentualist
C) deontologist
D) hacktivist
Question
The final step of the paramedic method is to ____.

A) make a decision or revisit the steps
B) identify stakeholders
C) identify what is at stake
D) think of analogies
Question
The power of ____________________ is that it can transfer our understandings and intuitions about something well known to a situation or entity that is less well known.
Question
A fundamental question in ____________________ is what criteria to use when "measuring" the rightness or wrongness of a particular act.
Question
The word ____ is from the Greek and means "the study of duty."

A) encryption
B) hacker
C) deontology
D) modus ponens
Question
One of the challenges when using a(n) ____________________ argument in a dialectic about hacking is that it is sometimes difficult to predict consequences with any accuracy.
Question
Ideally, in a(n) ____________________, the ultimate goal is for both sides to "win" by moving closer to the truth from two different perspectives.
Question
Ethicists depend on what is called a(n) ____ to try to make better and better ethical decisions.

A) categorical imperative
B) dialectic
C) reductionist argument
D) deontology
Question
Kant came up with ____ that characterized the duties we humans have to each other.

A) ten laws
B) a mathematical formulation
C) categorical imperatives
D) an algorithm
Question
____ arguments focus on the duties of the person acting and the way the act impinges on the rights of others.

A) Utilitarian
B) Consequentialist
C) Hacker
D) Deontological
Question
The first step in the paramedic method is to ____.

A) ask what is at stake
B) identify stakeholders
C) identify duties and responsibilities
D) think of analogies
Question
A ____ focuses on the consequences of an act to determine if the act is good or bad.

A) consequentialist
B) universalist
C) PGP
D) dialectic
Question
In a(n) ____, we move back and forth between different viewpoints, criticizing each and trying to learn from each.

A) encryption scheme
B) dialectic
C) utilitarian scheme
D) PGP
Question
Define cyberbullying.
Question
Explain what WikiLeaks is, how it operates, and what its goal is.
Question
Using the VoIP case from thisChapter, walk through the interested parties and how the establishment of lawful intercepts affects the happiness of these parties.
Question
Explain what sexting is.
Question
What are two challenges associated with using a utilitarian argument in a dialectic about hacking?
Question
What are the components of the "hacker ethic" described in the text?
Question
Identify two of the major leaks in which WikiLeaks has been involved.
Question
What is impersonation, in the context of cyberbullying?
Question
What is Kant's second categorical imperative?
Question
What is Anonymous? What are its best-known actions?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 17: Making Decisions About Computers, Information, and Society
1
Although music sales on physicalmedia still account for slightly over half of the recording industry's revenue,39% now comes from digital sales and VoIP._________________________
False
- streaming
2
The scholarly field of ethics has a long history ofstudying how to identify and resolve conflicts.
True
3
All musicians are naturally opposed to music file sharing.
False
4
____ is a technologythat encrypts a computer file so it can only be used according to the wishes of thecopyright holder.

A) Digital rights management
B) File sharing
C) Wiretapping
D) Peer-to-peer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Using the utilitarians' criterion requires subjective judgments._________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
BitTorrent isthe most popular current peer-to-peer file sharing system and accounts for 7% of Internet traffic, putting it in
fourth place overall (after Netflix, YouTube, and HTTP traffic)._________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
By most accounts, the majority of music that Napster users "shared" was copyrighted, and most of the copyright holders objected to the copying of their music without royalty payments.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Napster lost the case accusing it of copyright infringement but won subsequent appeals.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
VoIP stands for Voice over InternetProtocol._________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Today, more than ____ U.S.households have no landline-basedphone, and that percentage is growing rapidly.

A) 10%
B) 15%
C) 25%
D) 40%
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
The most well-known consequentialists are the neo-Luddites._________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
What would a careful utilitarian declare an act if HAPPINESS_AFTER = HAPPINESS_BEFORE?

A) good
B) evil
C) ethically neutral
D) not relevant
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
An ethical dialectic usually has a clean stopping point.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Some people view hackers as social gadflies, people who raise important, but irritating, questions about society.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Music file copying has encouraged CD buying over the long term.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
The Napster software set up what's called ____ file sharing.

A) freeware
B) MP3
C) peer-to-peer
D) client-server
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Once Napster helpedusers find each other electronically, the file sharing took place through Napster.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Most ethicists agree that since there are many more music publishers than listeners, MP3 copying is okay.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
"Sharing" of music and movies was rare prior to thepopularity of high-speed Internet.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
____ answer the question "Good for whom?" with a hearty, "Good for everyone!".

A) Deontologists
B) Consequentialists
C) Utilitarians
D) Intelligent agents
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
The new way of thinking about making and sharing music will deemphasize the need for large ____ companies.

A) record
B) music
C) software
D) publishing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
The philosopher ____ was known to say "never treat a fellow human merely as a means to an end."

A) Descartes
B) Turing
C) Aristotle
D) Kant
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
____ calls can be made from any place that the user can get an Internet connection.

A) FTP
B) VoIP
C) Linux
D) MP3
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Social ____ are people who raise important, but irritating, questions about society.

A) gadflies
B) gadabouts
C) hackers
D) dialectics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
The opponents of ____________________ hold that in the long run there may be far less music available because artists and publishers will have far less incentive to create and disseminate music.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
The "hacker ethic" makes the claim that ____.

A) all hacking is positive hacking
B) information sharing is a powerful positive good
C) hackers are ethically ok as long as they have fun
D) hacking is acceptable as long as it is a solitary activity
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
A(n) ____ is someone who breaks into computer systems, launches Internet worms and viruses, or perpetrates other dubious computer-related vandalism.

A) encryption
B) PGP
C) utilitarian
D) hacker
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Perhaps the most famous ____ was the German philosopher Immanuel Kant, who was born in the eighteenth century.

A) utilitarian
B) Consequentualist
C) deontologist
D) hacktivist
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
The final step of the paramedic method is to ____.

A) make a decision or revisit the steps
B) identify stakeholders
C) identify what is at stake
D) think of analogies
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
The power of ____________________ is that it can transfer our understandings and intuitions about something well known to a situation or entity that is less well known.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
A fundamental question in ____________________ is what criteria to use when "measuring" the rightness or wrongness of a particular act.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
The word ____ is from the Greek and means "the study of duty."

A) encryption
B) hacker
C) deontology
D) modus ponens
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
One of the challenges when using a(n) ____________________ argument in a dialectic about hacking is that it is sometimes difficult to predict consequences with any accuracy.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Ideally, in a(n) ____________________, the ultimate goal is for both sides to "win" by moving closer to the truth from two different perspectives.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Ethicists depend on what is called a(n) ____ to try to make better and better ethical decisions.

A) categorical imperative
B) dialectic
C) reductionist argument
D) deontology
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Kant came up with ____ that characterized the duties we humans have to each other.

A) ten laws
B) a mathematical formulation
C) categorical imperatives
D) an algorithm
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
____ arguments focus on the duties of the person acting and the way the act impinges on the rights of others.

A) Utilitarian
B) Consequentialist
C) Hacker
D) Deontological
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
The first step in the paramedic method is to ____.

A) ask what is at stake
B) identify stakeholders
C) identify duties and responsibilities
D) think of analogies
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
A ____ focuses on the consequences of an act to determine if the act is good or bad.

A) consequentialist
B) universalist
C) PGP
D) dialectic
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
In a(n) ____, we move back and forth between different viewpoints, criticizing each and trying to learn from each.

A) encryption scheme
B) dialectic
C) utilitarian scheme
D) PGP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Define cyberbullying.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Explain what WikiLeaks is, how it operates, and what its goal is.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Using the VoIP case from thisChapter, walk through the interested parties and how the establishment of lawful intercepts affects the happiness of these parties.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Explain what sexting is.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What are two challenges associated with using a utilitarian argument in a dialectic about hacking?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What are the components of the "hacker ethic" described in the text?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Identify two of the major leaks in which WikiLeaks has been involved.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What is impersonation, in the context of cyberbullying?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
What is Kant's second categorical imperative?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What is Anonymous? What are its best-known actions?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.