You are on page 1of 6

Social and Professional Issues

The course aims to provide an in-depth understanding and analysis of the importance of
ethics as it applies to the use of Information Technology. Topics include professional
ethics in computing, computer and internet crime, privacy, intellectual property and
ethics of IT organizations.

The decision-making process is developed that individuals


tend to execute automatically without thinking about the Identify
steps that go through. The step that involves others in Alternatives
brainstorming is __________.
widely shared
social
Which of the following does not describe the word ethics? conventions
about right and
wrong
It is when laws are used to resolve interpersonal conflicts in Conflict
a society. Resolution
It is an unwritten law that holds our rights of self-
Natural Law
preservation
The primary purpose of professional code of ethics is to
promote the public image of the profession by specifying
True
and enforcing the ethical behavior expected from its
members
One of the contributing factors in the cause of violations is
when consumers lack the knowledge of how what they
True
consider a little bit of information can turn into a big invasion
of privacy
Legal acts conform to what an individual believes to be the
True
right thing to do
Rules that guides individual actions such as not taking the
Directives
possessions of others are called
A man who did something to help others but it is against his
will is not considered good. This is an example of Deontology
_________.
The two kinds of rules of conduct; Directives which involves
the macroethical level and Social policies that involves the False
microethical level.
The danger with information matching is that everyone
knows who will use the built profiles from the matched False
information and where it will be used
For formal education to be effective in teaching and
enforcing the pillars of professionalism it must be Incremental
_________
Showing an act of kindness in exchange to an equal act of
Bronze Rule
kindness is an example what culture-free moral codes?
Individuals whose data are mined can become identified
True
with or linked to certain newly created groups.
According to this theory actions are judged according on the
results. For example, a person kills one person to prevent Consequentialism
the deaths of others.
It comes from an enforceable part of the moral code that
Conventional Law
differs with each society and culture.
This is another term for large commercial databases Data Warehouses
Since the
beginning, there
is an emphasis
on intellectual
Which is not true about the word profession? capabilities for
membership in a
group as it is
deemed
important
It takes part in building character traits in people. Morality
A provider of service should first inquire the customer Responsibility
before an action of service should be done. This statement
shows _______.
The moral concept of whistle-blowing is good when the
activities involved pose serious danger and harm to human False
life
These are guidelines that state the dos and dont's of a
Professional
professional that protects individual members and their
Code
image
Professional Codes of Conduct addresses the following Confidentiality
except and Commitment
It is the core of human dignity and autonomy Privacy
It is when ethical reasoning remained the same even with
Emotivism
the evolution of ethical discipline.
It is a system created by and for human beings usually in
public deliberations like a council of elders or Conventional Law
representatives in national legislatures.
Which is true about Licensing Authorities. I. Before a
license is issued an individual must be tested. II. Violation of
the rules from the licensing authority may lead to recalling of I, II, & III
the license III. After the test, the licensing authority may
deny issuing the license
It is the application of data mining techniques to discover
Web Mining
patterns from the Web
It is an act of seeking public attention to what is considered
Whistle-Blowing
an illegal or mismanaged act
If the codes of conduct focuses on rules and guidelines,
balance
autonomy focuses on
Listening in to other people's conversations is an example
of what privacy violation?
Interception of
Information
It involves the indirect gathering of personal information
Data Mining
through an analysis of implicit patterns discoverable in data.
There are different strands of information to be protected, Employment
which does not belong to a group: Information
This theory states that ethical statements cannot be proven
Emotivism
and are really only statements about how someone feels.
It is when an action is right if the consequences of that Altruism
action are favorable to all except the actor
Even with long years of experience, skills based on shallow
True
knowledge of the field could be damaging to the profession
It prevents harm
and suffering, a
As humans tend to follow a life script, an individual's moral system
reaction to certain rules of conduct is always intentional. aims at
promoting human
flourishing
With the relationship between the provider and receiver of
the service/product present, a power play may sometimes True
be in favor of the provider not the receiver
In order for professions and trades to uphold essential
requirements, integrity, commitment, and professional False
codes of conduct must be met.
It is developed over a period of time based on either the
Community Code
religion or culture of the indigenous people in the area.
It is an invasion of privacy by wrongful entry, seizing, or
Intrusion
acquiring possession of the property of others
It is an interpretation is done based on a system that uses a
process of argumentation consisting of a mixture of Ethical Theories
inductions and deductions
Ethical decision making is the process of making a decision
which may result in one or more moral conflicts while ethical
True
reasoning is when ethical principles is integrated in the
reasoning process
when information
Under what condition can data collections become an is used for
invasion of privacy? unauthorized
purposes
Determinative Laws fixes ways of acting in accordance with
True
natural law
Ethics is defined as a field of inquiry whose subject is
Human Conduct
human actions and these human actions are called
It is a human cognitive process of looking for ways to
Reasoning
generate or affirm a proposition
Harassment is a form of discrimination and it mainly True
involves making decisions that negatively affect an
individual.
Morality is enforced by the authority that enacted them and
False
security forces
Conflict Resolution
The decision-making process is developed that individuals
tend to execute automatically without thinking about the Identify
steps that go through. The step that involves others in Alternatives
brainstorming is __________.
Listening in to other people's conversations is an example Interception of
of what privacy violation? Information
It prevents harm
and suffering, a
moral system
Which is true about Morality?
aims at
promoting human
flourishing
There are different strands of information to be protected, Employment
which does not belong to a group: Information
It is a system created by and for human beings usually in
public deliberations like a council of elders or Conventional Law
representatives in national legislatures.
According to this theory actions are judged according on the
results. For example, a person kills one person to prevent Consequentialism
the deaths of others.
It is when ethical reasoning remained the same even with
Emotivism
the evolution of ethical discipline.
These are guidelines that state the dos and dont's of a
Professional
professional that protects individual members and their
Code
image.
It is when an action is right if the consequences of that
Altruism
action are favorable to all except the actor
A man who did something to help others but it is against his
will is not considered good. This is an example of Deontology
_________.
It is developed over a period of time based on either the
Community Code
religion or culture of the indigenous people in the area.
Under what condition can data collections become an when information
is used for
invasion of privacy? unauthorized
purposes
It involves the indirect gathering of personal information
Data Mining
through an analysis of implicit patterns discoverable in data.
A provider of service should first inquire the customer
before an action of service should be done. This statement Responsibility
shows _______.
Which is true about Licensing Authorities. I. Before a
license is issued an individual must be tested. II. Violation of
the rules from the licensing authority may lead to recalling of I, II, & III
the license III. After the test, the licensing authority may
deny issuing the license
Since the
beginning, there
is an emphasis
on intellectual
Which is not true about the word profession? capabilities for
membership in a
group as it is
deemed
important
Professional Codes of Conduct addresses the following Confidentiality
except: and Commitment
widely shared
social
Which of the following does not describe the word ethics? conventions
about right and
wrong
For formal education to be effective in teaching and
Incremental
enforcing the pillars of professionalism it must be
at November 04, 2020 
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest

You might also like