Ethics Chapter 5 – Flashcards with Answers
Unlock all answers in this set
Unlock answersquestion
81. In 1890 Harvard-trained lawyers _____ wrote a highly influential article in the Harvard Law Review stating that people in modern society have a right to privacy and that this right ought to be respected.
answer
Samuel Warren and Louis Brandeis
question
______ suggested that we do not have to define privacy rights because every "privacy right" violation is a violation of another right as well
answer
82. Judith Jarvis Thomson
question
83. A _______contains information about an incident or action reported to a government agency for the purpose of informing the public
answer
public record
question
84. With enhanced 911 service, cell phone providers are able to ______ of active cell phone users.
answer
determine the location
question
1. Manufacturers are replacing bar codes with ______tags because they give more information about the product and are easier to scan.
answer
RFIDs / RFID
question
86. A _____ is a file containing information about your visits to a Web site that is placed on your computer's hard drive by a Web server
answer
cookie
question
87. The process of searching through one or more databases, looking for patterns or relationships, is called ______
answer
data mining.
question
88. When information collected for one purpose is put to another purpose, that is called a ______ of the data.
answer
secondary use
question
89. Thanks to the _______/ credit reports, you can get a credit card from a bank or store with which you have never done business.
answer
national credit bureau system
question
101. The Third Amendment to the U.S. Constitution has to do with a) freedom of speech and religion. b) search warrants. c) the right to bear arms. d) quartering of soldiers in private homes. e) self-incrimination
answer
d) quartering of soldiers in private homes.
question
102. Who wrote an influential paper in the 1890s urging that privacy rights be enacted into law? a) Benn and Brandeis b) Benn and Thomson c) Levine and Benn d) Thomson and Warren e) Warren and Brandeis
answer
e) Warren and Brandeis
question
103. Who wrote that every violation of a "privacy right" is also a violation of another right? a) Stanley Benn b) Louis Brandeis c) Morton Levine d) Judith Jarvis Thomson e) Samuel Warren
answer
d) Judith Jarvis Thomson
question
104. Most commentators cite the benefits of privacy as a reason why people ought to have some privacy rights. A right that benefits society is called a a) Constitutional right. b) legal right. c) natural right. d) prudential right. e) social right.
answer
d) prudential right.
question
105. A public record contains information about an incident or action reported to a government agency for the purpose of a) enhancing public safety. b) informing the public. c) protecting the innocent. d) regulating the economy. e) upholding the law.
answer
b) informing the public.
question
106. An example of a public record is a) a birth certificate. b) a marriage license. c) a deed to a house. d) a record of a criminal conviction. e) All of the above
answer
e) All of the above
question
107. An RFID is a) a magnetic bar code. b) a microscopic bar code. c) a wireless transmitter. d) a biometric identification device. e) a random field interferometry device
answer
c) a wireless transmitter.
question
108. The OnStar system allows a) a vehicle owner to initiate a conversation with an OnStar representative. b) the vehicle to automatically send a message to an OnStar representative after an accident. c) an OnStar representative to disable the gas pedal of the vehicle without the driver's permission. d) a and b e) a, b, and c
answer
e) a, b, and c
question
109. Flash cookies are controversial, in part, because a) they are commonly used by identify thieves to steal credit card numbers. b) they consume huge amounts of hard disk space. c) they allow online retailers such as Amazon.com to track online shopping on other Web sites. d) they are not controlled by the privacy controls of most Web browsers. e) All of the above
answer
d) they are not controlled by the privacy controls of most Web browsers.
question
110. The process of searching through many records in one or more databases looking for patterns or relationships is called a) credit reporting. b) data mining. c) information gathering. d) microtargeting. e) pattern matching.
answer
b) data mining.
question
111. When information is put to another purpose, that is called a a) backdoor exploit. b) collaborative filter. c) cookie. d) data leveraging opportunity. e) secondary use of the data.
answer
e) secondary use of the data.
question
112. A policy that requires the consumer to explicitly give permission before an organization can share information with another organization is called a) fair use. b) full disclosure. c) nondisclosure. d) opt-in. e) opt-out.
answer
d) opt-in.