DOC PREVIEW
Southern Miss CSC 309 - EXAM 1

This preview shows page 1-2 out of 5 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

309 Fall 03 Please put name onExam 1 back of last pageMiller1. If we do a perfect job of developing the skills for making perfect ethical decisions and we use these skills to perfectly analyze all of the situations where ethics plays a factor to arrive at a best course of action then for this to not be another totally useless academic exercise we need to ________________________________________________________________________________________________________________________2. We looked at the topic of Relativism and pointed out a number of problems with that approach, noting that even the ancient Greeks had problems with the notion that the claim that there was no best view about values, that was offered as a view of values, was a contradiction. Relativism has not gone away. We discussed four “sources for relativism”. You identify two (out of the four we mentioned).a. _________________________________________________________b. _________________________________________________________3. Mary, who sort of has a date for a party, ends up talking to a fellow who when he learns she is a computer science major, offers to get her a disk full of account name/ password pairs currently active on the USM computer named orca. He explains that he and some of his friends have control of the computer and that so far it looks like their break in has not been detected. Mary is not sure why she is being told all of this, although a couple thoughts have crossed her mind and she surely does not know for a fact that what she is being told is true. Oh, what to do? Fortunately Mary has just finished taking CSC309. Following a utilitarian approach to ethics she (a. reports what she has heard to a faculty member who she feels will protect her identity and who will have the claimchecked out, b. does not report the contents of this private communication to anyone else,)reasoning that _____________________________________________________________________________________________________________After reflecting on her answer to the first part of this question and again applying a utilitarian approach to ethics she, changes her mind about what she should do and (a. reports what she has heard to a faculty member who she feels will protect her identity and who will have the claim checked out, b. does not report the contents of this private communication to anyone else,)reasoning that_____________________________________________________________________________________________________________4. In altruism the emphasis is placed on ____________________________________ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _5. In class we discussed a number of informal guidelines for making ethical decisions. These guidelines, designated by names such as the Mom Test, the TVTest, and the Newspaper Test, all seemed to be variations on the thought that if____________ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _____________ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _6. There are a number of variations on the wording of the Golden Rule but allcontain the central thought that________________________________________________________________________________________________________________________7. While the U.S. Constitution does not explicitly use the word "privacy," several of its provisions protect different aspects of this fundamental right. The strongest protections arise from the ______ Amendment, which is theAmendment that __________________________________________________________________________________________________________8. When we give up total privacy from our government through constitutionally limited and approved surveillance of people and activities, one thing that we gain is ________________________________________________________________________________________________________________________9. Credit bureaus collect lots of data on each of us. On the surface, that appears to be a rather major invasion of personal privacy. But this turns out to beanother of those tradeoffs we keep talking about because when we give up this privacy protection we gain what in return?_____________________________________________________________________________________________________________________________________________________________________________________11. Before issuing a court order for a wiretap, a judge must review a lengthy affidavit that sets forth all the evidence and agree with the assertions contained there in. With regard to other investigative techniques the affidavit must also demonstrate that ____________________________________________________________________________________________________________12. AT&T had been selling a secure phone to the government but in 1992 decided to sell a version (TSD3600) to the public. The FBI had major problems with this because ___________________________________________13. When Phillip Zimmerman was notified that he was being investigated to determine if he had violated International Traffic in Arms regulations, it was because he had__________________________________________________________________________________________________________________________14. While there does seem to be considerable concern about the governments push for mandatory key escrow encryption there are good businessand personal reasons for using some sort of key escrow system. In fact it can be argued that every business that uses encryption needs key escrow because __________________________________________________________ ____________________________________________________________________________________________________________________15. The terms computer matching and computer profiling describe two different actions.Computer matching occurs when ________________________________________________________________________________________________Computer profiling ___________________________________________________________________________________________________________16. Describe a situation where a. You should be willing to reveal your social security number._____________________________________________________________ b. You should not be willing to reveal your social security number._____________________________________________________________17. Why is protection of your social security number more important now than it was 30 years


View Full Document

Southern Miss CSC 309 - EXAM 1

Download EXAM 1
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view EXAM 1 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view EXAM 1 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?