DOC PREVIEW
Southern Miss CSC 309 - EXAm 1

This preview shows page 1-2 out of 7 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

309 Spring 03 Please put name onExam 1 back of last pageMiller1. If we do a perfect job of developing the skills for making perfect ethical decisions and we use these skills to perfectly analyze all of the situations where ethics plays a factor to arrive at a best course of action then for this to not be another totally useless academic exercise we need to ________________________________________________________________________________________________________________________2. In class we discussed a number of informal guidelines for making ethical decisions. These guidelines, designated by names such as the Mom Test, the TVTest, and the Newspaper Test, all seemed to be variations on the thought that if____________ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _____________ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _3. It can be argued that the Golden Rule, which contains the central thought that________________________________________________________________________________________________________________________is a fundamental moral principle because____________________________________________________________4. Give a brief definition of each of the following:Altruism _________________________________________________________________________________________________________________Egoism __________________________________________________________________________________________________________________5.0 Given a situation that calls for an evaluation of competing responses, whatwould you need to do to apply a utilitarian approach to arrive at your decision on what to do?____________ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _____________ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _____________ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _6. From Webster’s Dictionary we learn that ”Moral, Ethical, Virtuous, Righteous, and Noble mean conforming to a standard of what is right and good.(Ethical, Moral) implies conforming to established sanctioned codes are acceptednotions of right and wrong. (Ethical, Moral) may suggest the involvement of more difficult or subtle questions of rightness, fairness, or equity.7. While the U.S. Constitution does not explicitly use the word "privacy," several of its provisions protect different aspects of this fundamental right. The strongest protections arise from the ______ Amendment, which is the Amendment that ________________________________________________________________________(this one will probably get re-worded)8. When we give up total privacy from our government through constitutionally limited and approved surveillance of people and activities, one thing that we gain is ____________________________________________________________________________________________________________________________________________________________________9. Credit bureaus collect lots of data on each of us. On the surface, that appears to be a rather major invasion of personal privacy. But this turns out to beanother of those tradeoffs we keep talking about because when we give up this privacy protection we gain what in return?_____________________________________________________________________________________________________________________________________________________________________________________10. The Code of Fair Information Practices, produced by a Governmental Advisory Committee in 1973, has become the basis for privacy legislation aroundthe world. The set of five principles includes:a. __________________________________________________________________________________________________________________________b. __________________________________________________________________________________________________________________________c. __________________________________________________________________________________________________________(still a solid question)11. The terms computer matching and computer profiling describe two different actions.Computer matching occurs when ________________________________________________________________________________________________Computer profiling ________________________________________________________________________________________________________________________________________________________________________12. Before issuing a court order for a wiretap, a judge must review a lengthy affidavit that sets forth all the evidence and agree with the assertions contained there in. With regard to other investigative techniques the affidavit must also demonstrate that __________________________________________________________________________(this is a question that the rules might have changed on – homework for the prof)13. When Phillip Zimmerman was notified that he was being investigated to determine if he had violated International Traffic in Arms regulations, it was because he had_________________________________________________________________________________________________________________________14. While there does seem to be considerable concern about the governments push for mandatory key escrow encryption there are good businessand personal reasons for using some sort of key escrow system. In fact it can be argued that every business that uses encryption needs key escrow because __________________________________________________________ ____________________________________________________________________________________________________________________15. Describe a situation where a. You should be willing to reveal your social security number._____________________________________________________________ b. You should not be willing to reveal your social security number._____________________________________________________________16. E-mail privacy has become a real problem and there are lots of cases being reported of employers reading employees mail. As an employee you should find out what the company policy is on the use of e-mail and regardless ofwhat you find you should avoid (most say never) using e-mail to say anything that_______________________________________________________________________________________________________________________________________________________________________________________17. Why is protection of your social security number more important now than it was 30 years ago? (This is not a wiretap


View Full Document

Southern Miss CSC 309 - EXAm 1

Download EXAm 1
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view EXAm 1 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view EXAm 1 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?