Professional Documents
Culture Documents
True / False
1. Anonymous remailers both help protect freedom of speech by keeping communications anonymous and prevent people
from using email for illegal or unethical purposes.
a. True
b. False
ANSWER: False
RATIONALE: Internet users who want to remain anonymous can send email to an anonymous remailer service,
which uses a computer program to strip the originating header and/or IP number from the message. It
then forwards the message to its intended recipient—an individual, a chat room, or a newsgroup—
with either no IP address or a fake one, ensuring that the header information cannot be used to identify
the author. The use of a remailer keeps communications anonymous; what is communicated, and
whether it is ethical or legal, is up to the sender. The use of remailers by people committing unethical
or even illegal acts in some states or countries has spurred controversy.
FEEDBACK: Correct The use of a remailer keeps communications anonymous; what is communicated, and
whether it is ethical or legal, is up to the sender.
Incorrect The use of a remailer keeps communications anonymous; what is communicated, and
whether it is ethical or legal, is up to the sender.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Measures Protecting Freedom of Speech
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.11 - Discuss how the First Amendment and anonymous expression safeguard our freedom
CTIVES: of speech.
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 3:24 PM
3. Laws and regulations have thoroughly addressed concerns about privacy and data management in private organizations
and federal agencies.
a. True
b. False
ANSWER: False
RATIONALE: Many people object to the data collection policies of governments and businesses on the grounds that
they strip individuals of the power to control their own personal information. For these people, the
existing hodgepodge of privacy laws and practices fails to provide adequate protection. Instead, it
causes confusion that promotes distrust and skepticism, which are further fueled by additional
disclosures of threats to privacy.
FEEDBACK: Correct Many people object to the data collection policies of governments and businesses. For
these people, the existing hodgepodge of privacy laws and practices fails to provide
adequate protection.
Incorrect Many people object to the data collection policies of governments and businesses. For
these people, the existing hodgepodge of privacy laws and practices fails to provide
adequate protection.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Information Systems and Privacy
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.8 - Identify four measures you should take to protect your personal privacy.
CTIVES:
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 3:42 PM
4. The GDPR obligates organizations that operate in the European Union to obtain the consent of the people they collect
information about.
a. True
b. False
ANSWER: True
RATIONALE: The General Data Protection Regulation (GDPR) is a set of data privacy requirements that apply
across the European Union including non-EU organizations that market to or process information of
individuals in the European Union. In general, it increases the rights of individuals and gives them
5. In the U.S., there is some debate over privacy between those who favor data collection as a means to increase national
security and those who view such programs as a violation of rights guaranteed by the Constitution and the Bill of Rights.
a. True
b. False
ANSWER: True
RATIONALE: In recent years, new laws addressing government electronic surveillance have been added and old
laws amended in reaction to the development of new communication technologies and a heightened
awareness of potential terrorist threats. The net result is that the scope of government surveillance has
greatly expanded—going from collecting data on as few people as necessary to collecting as much
data as possible on as many people as possible. Many of the resulting surveillance activities are
viewed by some as an unconstitutional violation of the Fourth Amendment, which protects us from
illegal searches and seizures. As a result, there are frequent court challenges to these government
actions, as well as an ongoing public debate about whether such activities make Americans safer or
simply erode our rights to privacy.
FEEDBACK: Correct There are frequent court challenges to government surveillance activities, as well as an
ongoing public debate about whether such activities make Americans safer or simply erode
our rights to privacy.
Incorrect There are frequent court challenges to government surveillance activities, as well as an
ongoing public debate about whether such activities make Americans safer or simply erode
our rights to privacy.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Information Systems and Government Surveillance
QUESTION TYPE: True / False
HAS VARIABLES: False
Copyright Cengage Learning. Powered by Cognero. Page 3
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
LEARNING OBJE POIS.14e.3.9 - Discuss the tradeoffs between security and privacy.
CTIVES:
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 3:54 PM
6. Some organizations choose to practice a form of Internet censorship by installing Internet filters on their employees'
computers to prevent them from viewing sites containing pornography or other objectionable material.
a. True
b. False
ANSWER: True
RATIONALE: Some organizations choose to install filters on their employees’ computers to prevent them from
viewing sites that contain pornography or other objectionable material. Employees unwillingly
exposed to such material would have a strong case for sexual harassment. The use of filters can also
ensure that employees do not waste their time viewing nonbusiness-related Web sites.
FEEDBACK: Correct Some organizations choose to install filters on their employees’ computers to prevent them
from viewing sites that contain pornography or other objectionable material.
Incorrect Some organizations choose to install filters on their employees’ computers to prevent them
from viewing sites that contain pornography or other objectionable material.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Internet Censorship
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.12 - Describe the impact of censorship on the operation of Internet service providers.
CTIVES:
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 4:03 PM
7. Some non-health-care companies offer health and wellness programs that require employee participants to share
personal data. They are required to employ standardized electronic transactions, codes, and identifiers under HIPAA
regulations.
a. True
b. False
ANSWER: False
RATIONALE: The Health Insurance Portability and Accountability Act (HIPAA) requires health care organizations
to employ standardized electronic transactions, codes, and identifiers to enable them to fully digitize
medical records, thus making it possible to exchange medical data over the Internet. HIPPA assigns
responsibility to health care organizations for certifying that their business partners (billing agents,
insurers, debt collectors, research firms, government agencies, and charitable organizations) also
Copyright Cengage Learning. Powered by Cognero. Page 4
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
comply with HIPAA security and privacy rules.
FEEDBACK: Correct The Health Insurance Portability and Accountability Act (HIPAA) requires health care
organizations to employ standardized electronic transactions, codes, and identifiers and
assigns responsibility to health care organizations for certifying that their business partners
also comply with HIPAA security and privacy rules.
Incorrect The Health Insurance Portability and Accountability Act (HIPAA) requires health care
organizations to employ standardized electronic transactions, codes, and identifiers and
assigns responsibility to health care organizations for certifying that their business partners
also comply with HIPAA security and privacy rules.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Measures Protecting Personal Data
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.7 - Identify three subject areas where measures have been taken to protect personal data.
CTIVES:
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 4:20 PM
8. U.S. federal law permits employers to prevent viewing of pornography in the workplace by employees.
a. True
b. False
ANSWER: True
RATIONALE: If an employee sees a coworker viewing porn on a workplace computer, that employee may be able to
claim that the company has created a hostile work environment. Such a claim opens the organization
to a sexual harassment lawsuit that can cost hundreds of thousands of dollars and tie up managers and
executives in endless depositions and court appearances. Many companies believe that they have a
duty to stop the viewing of pornography in the workplace. As long as they can show that they took
reasonable steps and determined actions to prevent it, they have a valid defense if they become the
subject of a sexual harassment lawsuit.
FEEDBACK: Correct Many companies believe that they have a duty to stop the viewing of pornography in the
workplace. As long as they can show that they took reasonable steps and determined
actions to prevent it, they have a valid defense if they become the subject of a sexual
harassment lawsuit.
Incorrect Many companies believe that they have a duty to stop the viewing of pornography in the
workplace. As long as they can show that they took reasonable steps and determined
actions to prevent it, they have a valid defense if they become the subject of a sexual
harassment lawsuit.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Internet Censorship
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.13 - Identify measures taken to address defamation, hate speech, and pornography on the
Copyright Cengage Learning. Powered by Cognero. Page 5
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
CTIVES: Internet.
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 4:33 PM
9. Never send sensitive personal data such as credit card numbers, bank account numbers, or passwords via text or IM;
only send them through Web sites that don't begin with https or cause a padlock icon to appear in the Address bar or status
bar.
a. True
b. False
ANSWER: False
RATIONALE: Take extra care when purchasing anything from a Web site. Make sure that you safeguard your credit
card numbers, passwords, and personal information. Do not do business with a site unless you know
that it handles credit card information securely. (Look for a seal of approval from organizations such
as the Better Business Bureau Online or TRUSTe. When you open the Web page where you enter
credit card information or other personal data, make sure that the Web address begins with https and
check to see if a locked padlock icon appears in the Address bar or status bar.)
FEEDBACK: Correct When you open the Web page where you enter credit card information or other personal
data, make sure that the Web address begins with https and check to see if a locked
padlock icon appears in the Address bar or status bar.
Incorrect When you open the Web page where you enter credit card information or other personal
data, make sure that the Web address begins with https and check to see if a locked
padlock icon appears in the Address bar or status bar.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Individual Efforts to Protect Privacy
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.8 - Identify four measures you should take to protect your personal privacy.
CTIVES:
NATIONAL STAND United States - BUSPROG: Technology
ARDS:
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 4:43 PM
10. Amy is doing some online research for a term paper. She'd like to access some information on a particular Web site,
but the Web site is asking her to put in her email address before allowing her to view the information. She wonders what
the Web site owner will do with that information, but there is no way for her to know how data collected via a Web site
will be used.
a. True
b. False
ANSWER: False
11. It's safe for you to input personal data into your Facebook profile because Facebook is not allowed to share this
information with law enforcement officials or third parties for any reason.
a. True
b. False
ANSWER: False
RATIONALE: Downstream (formerly PRISM) is an NSA surveillance program that collects Internet data, such as
search histories; photos sent and received; and the contents of email, file transfers, and voice and
video chats from the servers of AOL, Apple, Facebook, Google, Microsoft, Paltalk, Skype, Yahoo,
and YouTube.
FEEDBACK: Correct Downstream (formerly PRISM) is an NSA surveillance program that collects Internet data,
such as search histories; photos sent and received; and the contents of email, file
transfers, and voice and video chats from the servers of AOL, Apple, Facebook, Google,
Microsoft, Paltalk, Skype, Yahoo, and YouTube.
Incorrect Downstream (formerly PRISM) is an NSA surveillance program that collects Internet data,
such as search histories; photos sent and received; and the contents of email, file
transfers, and voice and video chats from the servers of AOL, Apple, Facebook, Google,
Microsoft, Paltalk, Skype, Yahoo, and YouTube.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Information Systems and Government Surveillance
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.10 - Discuss how three U.S. federal statutes protect citizens from government surveillance
CTIVES: while at the same time authorize the government to collect data.
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:
KEYWORDS: Bloom's: Remember
Copyright Cengage Learning. Powered by Cognero. Page 7
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
DATE CREATED: 11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 4:57 PM
12. Software developers have created filtering software that blocks children from viewing inappropriate or harmful
Internet sites at home or school, but to date developers have been unsuccessful in creating a similar software for use in the
workplace.
a. True
b. False
ANSWER: False
RATIONALE: An Internet filter is software that can be used to block access to certain Web sites that contain material
deemed inappropriate or offensive. The best Internet filters use a combination of URL, keyword, and
dynamic content filtering. In an attempt to protect children from accessing pornography and other
explicit material online, Congress passed the Children’s Internet Protection Act (CIPA) in 2000. The
act required federally financed schools and libraries to use some form of technological protection
(such as an Internet filter) to block computer access to obscene material, pornography, and anything
else considered harmful to minors. Some organizations choose to install filters on their employees’
computers to prevent them from viewing sites that contain pornography or other objectionable
material.
FEEDBACK: Correct An Internet filter is software that can be used to block access to certain Web sites that
contain material deemed inappropriate or offensive. Some organizations choose to install
filters on their employees’ computers to prevent them from viewing sites that contain
pornography or other objectionable material.
Incorrect An Internet filter is software that can be used to block access to certain Web sites that
contain material deemed inappropriate or offensive. Some organizations choose to install
filters on their employees’ computers to prevent them from viewing sites that contain
pornography or other objectionable material.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Internet Censorship
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.13 - Identify measures taken to address defamation, hate speech, and pornography on the
CTIVES: Internet.
NATIONAL STAND United States - BUSPROG: Technology
ARDS:
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 5:07 PM
13. The U.S. Congress has made several attempts to pass and maintain legislation that limits children's exposure to online
pornography, but eventually each of these laws has been ruled out because they were unconstitutional.
a. True
b. False
ANSWER: False
RATIONALE: To date, only a few laws have been implemented to protect children online, and several of these have
been ruled unconstitutional under the First Amendment and its protection of freedom of expression.
Copyright Cengage Learning. Powered by Cognero. Page 8
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
Nonetheless, Congress passed the Children’s Internet Protection Act (CIPA) in 2000. The act required
federally financed schools and libraries to use some form of technological protection (such as an
Internet filter) to block computer access to obscene material, pornography, and anything else
considered harmful to minors.
FEEDBACK: Correct Congress passed the Children’s Internet Protection Act (CIPA) in 2000. The act required
federally financed schools and libraries to use some form of technological protection (such
as an Internet filter) to block computer access to obscene material, pornography, and
anything else considered harmful to minors.
Incorrect Congress passed the Children’s Internet Protection Act (CIPA) in 2000. The act required
federally financed schools and libraries to use some form of technological protection (such
as an Internet filter) to block computer access to obscene material, pornography, and
anything else considered harmful to minors.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Internet Censorship
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.13 - Identify measures taken to address defamation, hate speech, and pornography on the
CTIVES: Internet.
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 5:19 PM
14. The American Recovery and Reinvestment Act Title XIII helped establish the National Fraud Alert system to help
prevent identity theft.
a. True
b. False
ANSWER: False
RATIONALE: The Fair and Accurate Credit Transactions Act was passed in 2003 as an amendment to the Fair
Credit Reporting Act, and it allows consumers to request and obtain a free credit report once each
year from each of the three primary consumer credit reporting companies (Equifax, Experian, and
TransUnion). The act also helped establish the National Fraud Alert system to help prevent identity
theft.
FEEDBACK: Correct The Fair and Accurate Credit Transactions Act helped establish the National Fraud Alert
system to help prevent identity theft.
Incorrect The Fair and Accurate Credit Transactions Act helped establish the National Fraud Alert
system to help prevent identity theft.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Measures Protecting Personal Data
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.7 - Identify three subject areas where measures have been taken to protect personal data.
CTIVES:
15. The term ethics refers to the set of principles about what is right and wrong that individuals use to make choices,
whereas the term law refers to a system of rules that tells us what we can and cannot do.
a. True
b. False
ANSWER: True
RATIONALE: Ethics is the set of principles about what is right and wrong that individuals use to make choices to
guide their decisions. Law is a system of rules that tells us what we can and cannot do.
FEEDBACK: Correct Ethics is the set of principles about what is right and wrong that individuals use to make
choices to guide their decisions. Law is a system of rules that tells us what we can and
cannot do.
Incorrect Ethics is the set of principles about what is right and wrong that individuals use to make
choices to guide their decisions. Law is a system of rules that tells us what we can and
cannot do.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Ethical Versus Legal
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.1 - Explain the difference between ethical and legal.
CTIVES:
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 5:36 PM
16. The pages on a university's website are maintained by individual departments and organizational units. It is a useful
policy to require that every change a user makes to his department pages be reviewed and approved.
a. True
b. False
ANSWER: True
RATIONALE: Reviewing changes made to department Web pages can help protect the university and its employees
from legal action. In a 1909 ruling (United States v. New York Central & Hudson River Railroad Co.),
the U.S. Supreme Court established that an employer can be held responsible for the acts of its
employees even if the employees act in a manner contrary to corporate policy and their employer’s
directions. The principle established is called respondeat superior, or “let the master answer.”
FEEDBACK: Correct Reviewing changes made to department Web pages can help protect the university and its
employees from legal action in light of the legal principle called respondeat superior, or “let
the master answer.”
Copyright Cengage Learning. Powered by Cognero. Page 10
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
Incorrect Reviewing changes made to department Web pages can help protect the university and its
employees from legal action in light of the legal principle called respondeat superior, or “let
the master answer.”
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: Fostering Corporate Social Responsibility and Good Business Ethics
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.2 - Identify five reasons for an organization to promote a work environment where
CTIVES: employees are encouraged to act ethically.
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 5:44 PM
17. If you use Google, the NSA can access your search history data without obtaining a court order.
a. True
b. False
ANSWER: True
RATIONALE: Downstream (formerly PRISM) is an NSA surveillance program that collects Internet data, such as
search histories; photos sent and received; and the contents of email, file transfers, and voice and
video chats from the servers of AOL, Apple, Facebook, Google, Microsoft, Paltalk, Skype, Yahoo,
and YouTube.
FEEDBACK: Correct Downstream (formerly PRISM) is an NSA surveillance program that collects Internet data,
such as search histories; photos sent and received; and the contents of email, file
transfers, and voice and video chats from the servers of AOL, Apple, Facebook, Google,
Microsoft, Paltalk, Skype, Yahoo, and YouTube.
Incorrect Downstream (formerly PRISM) is an NSA surveillance program that collects Internet data,
such as search histories; photos sent and received; and the contents of email, file
transfers, and voice and video chats from the servers of AOL, Apple, Facebook, Google,
Microsoft, Paltalk, Skype, Yahoo, and YouTube.
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: Information Systems and Government Surveillance
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.10 - Discuss how three U.S. federal statutes protect citizens from government surveillance
CTIVES: while at the same time authorize the government to collect data.
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 5:49 PM
18. _____ involves publishing an intentionally false written statement that is damaging to a person's or an organization's
reputation.
a. Vishing b. Slander
c. Libel d. Phishing
ANSWER: c
RATIONALE: Making either an oral or a written statement of alleged fact that is false and that harms another person
is defamation. The harm is often of a financial nature, in that it reduces a person’s ability to earn a
living, work in a profession, or run for an elected office, for example. An oral defamatory statement is
slander, and a written defamatory statement is libel.
FEEDBACK: a. Making a written statement of alleged fact that is false and that harms another person is a
form of defamation known as libel.
b. Making a written statement of alleged fact that is false and that harms another person is a
form of defamation known as libel.
c. Making a written statement of alleged fact that is false and that harms another person is a
form of defamation known as libel.
d. Making a written statement of alleged fact that is false and that harms another person is a
form of defamation known as libel.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Internet Censorship
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.13 - Identify measures taken to address defamation, hate speech, and pornography on the
CTIVES: Internet.
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/19/2019 5:54 PM
DATE MODIFIED: 1/3/2020 2:53 PM
19. The _____ requires telephone companies to hold customer telephone records and Internet metadata and to respond to
queries about from the National Security Agency if the agency can prove that the records are relevant to a terrorism
investigation.
a. Foreign Intelligence Surveillance Act b. Right to Financial Privacy Act
c. USA PATRIOT Act of 2001 d. USA Freedom Act of 2015
ANSWER: d
RATIONALE: The USA Freedom Act terminated the bulk collection of telephone records and Internet metadata by
the NSA. Instead, telecommunications providers are now required to hold the data and respond to
NSA queries on the data. The bill authorizes the government to collect from the phone companies up
to “two hops” of call records related to a target—provided the government can prove it has reasonable
suspicion that the target is linked to a terrorist organization.
FEEDBACK: a. The USA Freedom Act requires telecommunications providers to hold customer data and
respond to NSA queries on the data, providing up to “two hops” of call records related to
a target—provided the government can prove it has reasonable suspicion that the target
is linked to a terrorist organization.
20. A professional _____ states the principles and core values that an organization wishes to develop in its leaders and
members and therefore defines desired behavior in these individuals.
a. code of ethics b. code of conduct
c. code of civil procedure d. code of norms
ANSWER: a
RATIONALE: A professional code of ethics states the principles and core values that an organization wishes to
develop in its leaders and members. The primary intent of a code of ethics is to define desired
behavior.
FEEDBACK: a. A professional code of ethics states the principles and core values that an organization
wishes to develop in its leaders and members.
b. A professional code of ethics states the principles and core values that an organization
wishes to develop in its leaders and members.
c. A professional code of ethics states the principles and core values that an organization
wishes to develop in its leaders and members.
d. A professional code of ethics states the principles and core values that an organization
wishes to develop in its leaders and members.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Professional Code of Ethics
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.4 - Define the primary intent and two key elements of an effective code of ethics.
Copyright Cengage Learning. Powered by Cognero. Page 13
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
CTIVES:
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/19/2019 5:54 PM
DATE MODIFIED: 1/3/2020 3:23 PM
22. Harold is thinking about setting up profiles on Facebook and Twitter. Which of the following information should he
avoid sharing on these social media platforms?
a. his professional credentials b. his photograph
c. his favorite movies d. his place of birth
ANSWER: d
RATIONALE: Be careful when you share information about yourself. Keep personal information such as your birth
date, place of birth, home address, and phone number off social networks.
Copyright Cengage Learning. Powered by Cognero. Page 14
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
FEEDBACK: a. Keep personal information such as your birth date, place of birth, home address, and
phone number off social networks.
b. Keep personal information such as your birth date, place of birth, home address, and
phone number off social networks.
c. Keep personal information such as your birth date, place of birth, home address, and
phone number off social networks.
d. Keep personal information such as your birth date, place of birth, home address, and
phone number off social networks.
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: Individual Efforts to Protect Privacy
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.8 - Identify four measures you should take to protect your personal privacy.
CTIVES:
NATIONAL STAND United States - BUSPROG: Technology
ARDS:
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/19/2019 5:54 PM
DATE MODIFIED: 1/3/2020 3:44 PM
23. Anne and Jordan have two preteen sons and they're concerned about what their kids might see and share on the
Internet. They should probably invest in _______.
a. Internet licensing b. filtering software
c. security passwords d. privacy screening
ANSWER: b
RATIONALE: An Internet filter is software that can be used to block access to certain Web sites that contain material
deemed inappropriate or offensive. The best Internet filters use a combination of URL, keyword, and
dynamic content filtering.
FEEDBACK: a. An Internet filter is software that can be used to block access to certain Web sites that
contain material deemed inappropriate or offensive.
b. An Internet filter is software that can be used to block access to certain Web sites that
contain material deemed inappropriate or offensive.
c. An Internet filter is software that can be used to block access to certain Web sites that
contain material deemed inappropriate or offensive.
d. An Internet filter is software that can be used to block access to certain Web sites that
contain material deemed inappropriate or offensive.
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: Internet Censorship
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.13 - Identify measures taken to address defamation, hate speech, and pornography on the
CTIVES: Internet.
NATIONAL STAND United States - BUSPROG: Technology
ARDS:
Copyright Cengage Learning. Powered by Cognero. Page 15
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/19/2019 5:54 PM
DATE MODIFIED: 1/3/2020 3:55 PM
24. Although Roberta had signed a form preventing her doctor from sharing her personal medical records with the
company she worked for, she later discovered that the doctor's office had, in fact, shared her data with her health
insurance provider and her employer, which caused her to be terminated. Because the doctor's practice violated its own
privacy policy, she was able to file a lawsuit under the ________.
a. Health Insurance Portability and Accountability Act b. Health and Medical Records Privacy Act
c. Gramm-Leach-Bliley Act d. none of these answers
ANSWER: a
RATIONALE: The Health Insurance Portability and Accountability Act (HIPAA) requires health care organizations
to employ standardized electronic transactions, codes, and identifiers to enable them to fully digitize
medical records, thus making it possible to exchange medical data over the Internet. Under the
HIPAA provisions, health care providers must obtain written consent from patients prior to disclosing
any information in their medical records. In addition, health care providers are required to keep track
of everyone who receives information from a patient’s medical file.
FEEDBACK: a. Under Health Insurance Portability and Accountability Act (HIPAA) provisions, health care
providers must obtain written consent from patients prior to disclosing any information in
their medical records.
b. Under Health Insurance Portability and Accountability Act (HIPAA) provisions, health care
providers must obtain written consent from patients prior to disclosing any information in
their medical records.
c. Under Health Insurance Portability and Accountability Act (HIPAA) provisions, health care
providers must obtain written consent from patients prior to disclosing any information in
their medical records.
d. Under Health Insurance Portability and Accountability Act (HIPAA) provisions, health care
providers must obtain written consent from patients prior to disclosing any information in
their medical records.
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: Measures Protecting Personal Data
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.7 - Identify three subject areas where measures have been taken to protect personal data.
CTIVES:
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/19/2019 5:54 PM
DATE MODIFIED: 1/3/2020 4:01 PM
25. The Better Business Bureau recommends that an organization publish a privacy notice on its Web site that addresses
all of the following elements EXCEPT ________.
a. choice b. selling
c. access d. redress
FEEDBACK: a. The Better Business Bureau recommends that a privacy notice should be based on the
following five elements: notice, choice, access, security, and redress.
b. The Better Business Bureau recommends that a privacy notice should be based on the
following five elements: notice, choice, access, security, and redress.
c. The Better Business Bureau recommends that a privacy notice should be based on the
following five elements: notice, choice, access, security, and redress.
d. The Better Business Bureau recommends that a privacy notice should be based on the
following five elements: notice, choice, access, security, and redress.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Web Site Privacy Policy
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.7 - Identify three subject areas where measures have been taken to protect personal data.
CTIVES:
NATIONAL STAND United States - BUSPROG: Technology
ARDS:
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/19/2019 5:54 PM
DATE MODIFIED: 1/3/2020 4:11 PM
26. Graydon noticed Jack, his friend and classmate, cheating on a physics exam and now he is trying to decide what to do
about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics
requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend and probably
all of their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon?
a. gathering information b. developing a problem statement
c. identifying alternatives d. choosing an alternative
ANSWER: d
RATIONALE: Choose an alternative: Once a set of alternatives has been identified, the group must evaluate them
based on numerous criteria, such as effectiveness of addressing the issue, the extent of risk associated
with each alternative, cost, and time to implement. As part of the evaluation process, weigh various
laws, guidelines, and principles that may apply. You certainly do not want to violate a law that can
lead to a fine or imprisonment for yourself or others. Consider the likely consequences of each
alternative from several perspectives.
FEEDBACK: a. Choose an alternative. As part of the evaluation process, weigh various laws, guidelines,
and principles that may apply.
Copyright Cengage Learning. Powered by Cognero. Page 17
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
b. Choose an alternative. As part of the evaluation process, weigh various laws, guidelines,
and principles that may apply.
c. Choose an alternative. As part of the evaluation process, weigh various laws, guidelines,
and principles that may apply.
d. Choose an alternative. As part of the evaluation process, weigh various laws, guidelines,
and principles that may apply.
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: Including Ethical Considerations in Decision Making
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.3 - Outline a five-step ethical decision-making process.
CTIVES:
NATIONAL STAND United States - BUSPROG: Ethics
ARDS:
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/19/2019 5:54 PM
DATE MODIFIED: 1/3/2020 4:53 PM
27. While giving her students a physics exam, Professor Thompson noticed that Jack, one of her students who has been
struggling with the course material, appeared to be copying answers from Graydon, one of the best students in the class.
She decides that she should compare their answers when the class period is over before deciding what to do about the
situation. In which phase of the ethical decision-making process is Professor Thompson?
a. developing a problem statement b. implementing the decision
c. identifying alternatives d. choosing an alternative
ANSWER: a
RATIONALE: A problem statement is a clear, concise description of the issue that needs to be addressed. You must
gather and analyze facts to develop a good problem statement. Seek information and opinions from a
variety of people (include those who experience the problem first hand and those who will be affected
by any changes) to broaden your frame of reference. During this process, you must be extremely
careful not to make assumptions about the situation and carefully check key facts for validity.
FEEDBACK: a. You must gather and analyze facts to develop a good problem statement.
b. You must gather and analyze facts to develop a good problem statement.
c. You must gather and analyze facts to develop a good problem statement.
d. You must gather and analyze facts to develop a good problem statement.
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: Including Ethical Considerations in Decision Making
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.3 - Outline a five-step ethical decision-making process.
CTIVES:
NATIONAL STAND United States - BUSPROG: Ethics
ARDS:
KEYWORDS: Bloom's: Remember
Copyright Cengage Learning. Powered by Cognero. Page 18
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
DATE CREATED: 11/19/2019 5:54 PM
DATE MODIFIED: 1/4/2020 2:12 PM
28. Which of the following legislation is directed at Web sites catering to children and requires Web site owners to obtain
parental consent before they collect any personal information from children under 13 years old?
a. Children's Internet Protection Act
b. American Recovery and Reinvestment Act
c. Children's Online Privacy Protection Act
d. Family Educational Rights and Privacy Act
ANSWER: c
RATIONALE: According to Children’s Online Privacy Protection Act (COPPA), any Web site that caters to children
must offer comprehensive privacy policies, notify parents or guardians about its data collection
practices, and receive parental consent before collecting any personal information from children under
13 years of age. COPPA was implemented in 1998 to give parents more control over the collection,
use, and disclosure of their children’s personal information; it does not cover the dissemination of
information to children.
FEEDBACK: a. According to Children’s Online Privacy Protection Act (COPPA), any Web site that caters
to children must offer comprehensive privacy policies, notify parents or guardians about
its data collection practices, and receive parental consent before collecting any personal
information from children under 13 years of age.
b. According to Children’s Online Privacy Protection Act (COPPA), any Web site that caters
to children must offer comprehensive privacy policies, notify parents or guardians about
its data collection practices, and receive parental consent before collecting any personal
information from children under 13 years of age.
c. According to Children’s Online Privacy Protection Act (COPPA), any Web site that caters
to children must offer comprehensive privacy policies, notify parents or guardians about
its data collection practices, and receive parental consent before collecting any personal
information from children under 13 years of age.
d. According to Children’s Online Privacy Protection Act (COPPA), any Web site that caters
to children must offer comprehensive privacy policies, notify parents or guardians about
its data collection practices, and receive parental consent before collecting any personal
information from children under 13 years of age.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Measures Protecting Personal Data
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.7 - Identify three subject areas where measures have been taken to protect personal data.
CTIVES:
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/4/2020 2:38 PM
DATE MODIFIED: 1/4/2020 2:42 PM
29. Which of the following legislation protects Facebook, Twitter, and other social networking organizations from
defamation suits in connection with posts made by their users?
a. Section 230 of the Communications Decency Act
b. Children's Internet Protection Act
Copyright Cengage Learning. Powered by Cognero. Page 19
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
c. Network Enforcement Act
d. Fake News Censorship Act
ANSWER: a
RATIONALE: Title V of the Telecommunications Act was the Communications Decency Act (CDA), aimed at
protecting children from pornography. Section 230 of the CDA, which was not ruled unconstitutional,
provides immunity to an Internet service provider (ISP) that publishes user-generated content,
provided its actions do not rise to the level of a content provider. It states that “No provider or user of
an interactive computer service shall be treated as the publisher or speaker of any information
provided by another information content provider” (47 U.S.C. § 230). This portion of the CDA
protects social networking companies such as Facebook and Twitter from defamation suits in
connection with user postings that appear on their sites.
FEEDBACK: a. Section 230 of the CDA protects social networking companies such as Facebook and
Twitter from defamation suits in connection with user postings that appear on their sites.
b. Section 230 of the CDA protects social networking companies such as Facebook and
Twitter from defamation suits in connection with user postings that appear on their sites.
c. Section 230 of the CDA protects social networking companies such as Facebook and
Twitter from defamation suits in connection with user postings that appear on their sites.
d. Section 230 of the CDA protects social networking companies such as Facebook and
Twitter from defamation suits in connection with user postings that appear on their sites.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Internet Censorship
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.13 - Identify measures taken to address defamation, hate speech, and pornography on the
CTIVES: Internet.
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/4/2020 2:53 PM
DATE MODIFIED: 1/4/2020 2:58 PM
31. A candidate for political office makes a campaign promise that she will work to stop the unlawful storage of personal
data, eliminate the storage of inaccurate personal data, and prevent the abuse or unauthorized disclosure of such data. She
is promising to promote _____.
a. protection of safety-critical systems
b. corporate social responsibility
c. our First Amendment rights
d. fair information practices
ANSWER: d
RATIONALE: Fair information practices is a term for a set of guidelines that govern the collection and use of
personal data. Various organizations as well as countries have developed their own set of such
guidelines and call them by different names. The overall goal of such guidelines is to stop the
unlawful storage of personal data, eliminate the storage of inaccurate personal data, and prevent the
abuse or unauthorized disclosure of such data.
FEEDBACK: a. The overall goal of fair information practices guidelines is to stop the unlawful storage of
personal data, eliminate the storage of inaccurate personal data, and prevent the abuse
or unauthorized disclosure of such data.
b. The overall goal of fair information practices guidelines is to stop the unlawful storage of
personal data, eliminate the storage of inaccurate personal data, and prevent the abuse
or unauthorized disclosure of such data.
c. The overall goal of fair information practices guidelines is to stop the unlawful storage of
personal data, eliminate the storage of inaccurate personal data, and prevent the abuse
or unauthorized disclosure of such data.
d. The overall goal of fair information practices guidelines is to stop the unlawful storage of
personal data, eliminate the storage of inaccurate personal data, and prevent the abuse
or unauthorized disclosure of such data.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Measures Protecting Personal Data
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.6 - Summarize the differences between U.S. and EU fair information practices.
CTIVES:
KEYWORDS: Bloom's: Remember
32. How do fair information practices in the United States and the European Union differ?
a. Unlike the EU, the U.S. has no single, overarching national data privacy policy.
b. Unlike the U.S., the EU has implemented numerous data privacy laws.
c. Unlike the EU, the U.S. addresses potential abuses by private industry but not by the government.
d. Unlike the U.S., the EU divides their data privacy laws into three ares: financial, health related, and child
specific.
ANSWER: a
RATIONALE: The situation in regards to fair information practices in the United States is much different than in the
European Union. Although numerous laws have been implemented over time, no single, overarching
national data privacy policy has been developed in the United States. Nor is there an established
advisory agency that recommends acceptable privacy practices to businesses. Instead, there are laws
that address potential abuses by the government, with little restrictions for private industry.
Legislation that protects people from data privacy abuses by corporations is almost nonexistent. The
various major federal laws that govern data privacy can be divided into the following topics: financial
data, health information, and children’s personal data.
FEEDBACK: a. Although numerous laws have been implemented over time, no single, overarching
national data privacy policy has been developed in the United States.
b. Although numerous laws have been implemented over time, no single, overarching
national data privacy policy has been developed in the United States.
c. Although numerous laws have been implemented over time, no single, overarching
national data privacy policy has been developed in the United States.
d. Although numerous laws have been implemented over time, no single, overarching
national data privacy policy has been developed in the United States.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Measures Protecting Personal Data
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.6 - Summarize the differences between U.S. and EU fair information practices.
CTIVES:
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/4/2020 3:37 PM
DATE MODIFIED: 1/4/2020 3:47 PM
33. In the United States, legislation that protects people from data privacy abuses by corporations _____.
a. was passed only recently
b. is quite similar to the EU's General Data Protection Regulation
c. requires firms to respond within one month to data requests from individuals
d. is almost nonexistent
ANSWER: d
RATIONALE: The situation in regards to fair information practices in the United States is much different than in the
European Union. Although numerous laws have been implemented over time, no single, overarching
Copyright Cengage Learning. Powered by Cognero. Page 22
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
national data privacy policy has been developed in the United States. Nor is there an established
advisory agency that recommends acceptable privacy practices to businesses. Instead, there are laws
that address potential abuses by the government, with little restrictions for private industry.
Legislation that protects people from data privacy abuses by corporations is almost nonexistent. The
various major federal laws that govern data privacy can be divided into the following topics: financial
data, health information, and children’s personal data.
FEEDBACK: a. Legislation that protects people from data privacy abuses by corporations is almost
nonexistent.
b. Legislation that protects people from data privacy abuses by corporations is almost
nonexistent.
c. Legislation that protects people from data privacy abuses by corporations is almost
nonexistent.
d. Legislation that protects people from data privacy abuses by corporations is almost
nonexistent.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Measures Protecting Personal Data
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.6 - Summarize the differences between U.S. and EU fair information practices.
CTIVES:
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/4/2020 3:59 PM
DATE MODIFIED: 1/4/2020 4:07 PM
34. Vincent holds an executive position within an organization that processes individual customers' information. If those
customers live in the European Union, Vincent _____.
a. must audit and document his team's compliance with the Right to Financial Privacy Act
b. must ensure his team maintains data protection policies and employs a data protection officer
c. has fewer obligations related to fair information practices than if they lived in the United States
d. is not subject to an established advisory agency or legally defined acceptable privacy practices
ANSWER: b
RATIONALE: The General Data Protection Regulation (GDPR) is a set of data privacy requirements that apply
across the European Union including non-EU organizations that market to or process information of
individuals in the European Union. GDPR places obligations on organizations to obtain the consent of
people they collect information about and to better manage this data. This includes putting in place a
data protection officer and data protection policies, performing data protection assessments, providing
training for employees to ensure that they are aware of their responsibilities related to personal data,
and having written documentation explaining how data is processed. The situation in regards to fair
information practices in the United States is much different. Although numerous laws have been
implemented over time, no single, overarching national data privacy policy has been developed in the
United States. Nor is there an established advisory agency that recommends acceptable privacy
practices to businesses.
FEEDBACK: a. In the European Union, GDPR places obligations on organizations to obtain the consent
of people they collect information about and to better manage this data. This includes
putting in place a data protection officer and data protection policies.
b. In the European Union, GDPR places obligations on organizations to obtain the consent
of people they collect information about and to better manage this data. This includes
Copyright Cengage Learning. Powered by Cognero. Page 23
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
putting in place a data protection officer and data protection policies.
c. In the European Union, GDPR places obligations on organizations to obtain the consent
of people they collect information about and to better manage this data. This includes
putting in place a data protection officer and data protection policies.
d. In the European Union, GDPR places obligations on organizations to obtain the consent
of people they collect information about and to better manage this data. This includes
putting in place a data protection officer and data protection policies.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Measures Protecting Personal Data
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.6 - Summarize the differences between U.S. and EU fair information practices.
CTIVES:
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/4/2020 4:08 PM
DATE MODIFIED: 1/4/2020 4:22 PM
35. Which federal statute protects individuals against unreasonable searches and seizures by requiring warrants to be
issued only upon probable cause?
a. Foreign Intelligence Surveillance Act
b. First Amendment
c. Fourth Amendment
d. USA Freedom Act
ANSWER: c
RATIONALE: The Fourth Amendment reads as follows: "The right of the people to be secure in their persons,
houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no
Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly
describing the place to be searched, and the persons or things to be seized."
FEEDBACK: a. The Fourth Amendment reads as follows: "The right of the people to be secure in their
persons, houses, papers, and effects, against unreasonable searches and seizures, shall
not be violated, and no Warrants shall issue, but upon probable cause, supported by
Oath or affirmation, and particularly describing the place to be searched, and the persons
or things to be seized."
b. The Fourth Amendment reads as follows: "The right of the people to be secure in their
persons, houses, papers, and effects, against unreasonable searches and seizures, shall
not be violated, and no Warrants shall issue, but upon probable cause, supported by
Oath or affirmation, and particularly describing the place to be searched, and the persons
or things to be seized."
c. The Fourth Amendment reads as follows: "The right of the people to be secure in their
persons, houses, papers, and effects, against unreasonable searches and seizures, shall
not be violated, and no Warrants shall issue, but upon probable cause, supported by
Oath or affirmation, and particularly describing the place to be searched, and the persons
or things to be seized."
d. The Fourth Amendment reads as follows: "The right of the people to be secure in their
persons, houses, papers, and effects, against unreasonable searches and seizures, shall
not be violated, and no Warrants shall issue, but upon probable cause, supported by
Oath or affirmation, and particularly describing the place to be searched, and the persons
or things to be seized."
Copyright Cengage Learning. Powered by Cognero. Page 24
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Information Systems and Government Surveillance
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.10 - Discuss how three U.S. federal statutes protect citizens from government surveillance
CTIVES: while at the same time authorize the government to collect data.
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/4/2020 4:31 PM
DATE MODIFIED: 1/4/2020 4:33 PM
36. It is not against the law for Ethel to possess an automatic weapon, but she believes possessing one is the wrong thing
to do. For Ethel, possessing an automatic weapon is _____.
a. illegal but ethical
b. illegal and unethical
c. legal but unethical
d. legal and ethical
ANSWER: c
RATIONALE: Legal acts conform to the law. Ethical acts conform to what an individual believes to be the right
thing to do. Laws can proclaim an act as legal, although many people may consider the act unethical.
Examples of this include abortion or possession of an automatic weapon. Laws may also proclaim an
act as illegal, although many people may consider the act ethical. Examples of this include using
marijuana to relieve stress and nausea for people undergoing chemotherapy treatment for cancer.
FEEDBACK: a. Laws can proclaim an act as legal, although many people may consider the act unethical.
Examples of this include abortion or possession of an automatic weapon.
b. Laws can proclaim an act as legal, although many people may consider the act unethical.
Examples of this include abortion or possession of an automatic weapon.
c. Laws can proclaim an act as legal, although many people may consider the act unethical.
Examples of this include abortion or possession of an automatic weapon.
d. Laws can proclaim an act as legal, although many people may consider the act unethical.
Examples of this include abortion or possession of an automatic weapon.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Ethical Versus Legal
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.1 - Explain the difference between ethical and legal.
CTIVES:
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/5/2020 7:50 AM
DATE MODIFIED: 1/5/2020 7:56 AM
37. Robin Hood famously steals from the rich to give to the poor. Robin considers this his moral responsibility because he
believes it is unjust for a few wealthy people to live in luxury while many others struggle to meet their basic needs. Given
that it is against the law to steal, for Robin, his activities are _____.
Copyright Cengage Learning. Powered by Cognero. Page 25
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
a. illegal but ethical
b. illegal and unethical
c. legal but unethical
d. legal and ethical
ANSWER: a
RATIONALE: Legal acts conform to the law. Ethical acts conform to what an individual believes to be the right
thing to do. Laws can proclaim an act as legal, although many people may consider the act unethical.
Examples of this include abortion or possession of an automatic weapon. Laws may also proclaim an
act as illegal, although many people may consider the act ethical. Examples of this include using
marijuana to relieve stress and nausea for people undergoing chemotherapy treatment for cancer.
FEEDBACK: a. Legal acts conform to the law. Ethical acts conform to what an individual believes to be
the right thing to do.
b. Legal acts conform to the law. Ethical acts conform to what an individual believes to be
the right thing to do.
c. Legal acts conform to the law. Ethical acts conform to what an individual believes to be
the right thing to do.
d. Legal acts conform to the law. Ethical acts conform to what an individual believes to be
the right thing to do.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Ethical Versus Legal
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.1 - Explain the difference between ethical and legal.
CTIVES:
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/5/2020 7:57 AM
DATE MODIFIED: 1/5/2020 8:03 AM
39. Corporate social responsibility activities such as philanthropy benefit for-profit organizations because they _____.
a. improve consistency of operations
b. gain the goodwill of the community
c. foster good business practices
d. provide protection from legal action
ANSWER: b
RATIONALE: Although organizations exist primarily to earn profits or provide services to customers, they also have
some fundamental responsibilities to society. Companies often declare these responsibilities in
specific corporate social responsibility (CSR) goals. Philanthropy is one way in which an organization
can demonstrate its values in action and make a positive connection with its customers, employees,
suppliers, business partners, and other parties. The goodwill that CSR activities generate can make it
easier for corporations to conduct their business.
FEEDBACK: a. Philanthropy is one way in which an organization can demonstrate its values in action
and make a positive connection with its customers, employees, suppliers, business
partners, and other parties.
b. Philanthropy is one way in which an organization can demonstrate its values in action
and make a positive connection with its customers, employees, suppliers, business
partners, and other parties.
c. Philanthropy is one way in which an organization can demonstrate its values in action
and make a positive connection with its customers, employees, suppliers, business
partners, and other parties.
d. Philanthropy is one way in which an organization can demonstrate its values in action
and make a positive connection with its customers, employees, suppliers, business
partners, and other parties.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Fostering Corporate Social Responsibility and Good Business Ethics
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.2 - Identify five reasons for an organization to promote a work environment where
CTIVES: employees are encouraged to act ethically.
KEYWORDS: Bloom's: Remember
Copyright Cengage Learning. Powered by Cognero. Page 27
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
DATE CREATED: 1/5/2020 8:14 AM
DATE MODIFIED: 1/5/2020 8:20 AM
40. Using the values held by his organization, Don has defined an ethical approach for dealing with the needs of his team
members and their customers that he has implemented within his department. His team members know what is expected
of them, and their customers know what to expect from the organization. The primary benefit of this approach for Don's
department is _____.
a. avoiding publicity
b. consistent operation
c. protection from legal action
d. fostering good business practices
ANSWER: b
RATIONALE: Organizations develop and abide by values to create an organizational culture and to define a
consistent approach for dealing with the needs of their stakeholders. Stakeholders include
shareholders, employees, customers, suppliers, and the community. Such consistency ensures that
employees know what is expected of them and can employ the organization’s values to help them in
their decision making. Consistency also means that shareholders, customers, suppliers, and the
community know what they can expect of the organization.
FEEDBACK: a. Organizations develop and abide by values to define a consistent approach for dealing
with the needs of their stakeholders. Such consistency ensures that employees know
what is expected of them and shareholders, customers, suppliers, and the community
know what they can expect of the organization.
b. Organizations develop and abide by values to define a consistent approach for dealing
with the needs of their stakeholders. Such consistency ensures that employees know
what is expected of them and shareholders, customers, suppliers, and the community
know what they can expect of the organization.
c. Organizations develop and abide by values to define a consistent approach for dealing
with the needs of their stakeholders. Such consistency ensures that employees know
what is expected of them and shareholders, customers, suppliers, and the community
know what they can expect of the organization.
d. Organizations develop and abide by values to define a consistent approach for dealing
with the needs of their stakeholders. Such consistency ensures that employees know
what is expected of them and shareholders, customers, suppliers, and the community
know what they can expect of the organization.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Fostering Corporate Social Responsibility and Good Business Ethics
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.2 - Identify five reasons for an organization to promote a work environment where
CTIVES: employees are encouraged to act ethically.
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/6/2020 2:39 PM
DATE MODIFIED: 1/6/2020 3:45 PM
42. Felicity, who works at a bank, opens multiple credit card accounts for customers without their authorization in order to
improve her customer sales, and thus her apparent job performance. This behavior is explicitly forbidden by bank policies
and the instructions her manager gave her. Which statement is true in this situation?
a. The bank can be held responsible for Felicity's behavior despite its ethical policies.
b. The bank cannot be held responsible for Felicity's actions since they were contrary to bank policies.
c. This situation demonstrates how bad organizational ethics can lead to bad business results.
d. The principle called respondeat superior, meaning "let the master answer," does not apply.
ANSWER: a
RATIONALE: In a 1909 ruling (United States v. New York Central & Hudson River Railroad Co.), the U.S. Supreme
Court established that an employer can be held responsible for the acts of its employees even if the
employees act in a manner contrary to corporate policy and their employer’s directions. The principle
established is called respondeat superior, or “let the master answer.”
Copyright Cengage Learning. Powered by Cognero. Page 29
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
FEEDBACK: a. The U.S. Supreme Court established that an employer can be held responsible for the
acts of its employees even if the employees act in a manner contrary to corporate policy
and their employer’s directions.
b. The U.S. Supreme Court established that an employer can be held responsible for the
acts of its employees even if the employees act in a manner contrary to corporate policy
and their employer’s directions.
c. The U.S. Supreme Court established that an employer can be held responsible for the
acts of its employees even if the employees act in a manner contrary to corporate policy
and their employer’s directions.
d. The U.S. Supreme Court established that an employer can be held responsible for the
acts of its employees even if the employees act in a manner contrary to corporate policy
and their employer’s directions.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Fostering Corporate Social Responsibility and Good Business Ethics
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.2 - Identify five reasons for an organization to promote a work environment where
CTIVES: employees are encouraged to act ethically.
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/6/2020 3:58 PM
DATE MODIFIED: 1/6/2020 4:09 PM
43. A social networking service loses a lot of business from ad buyers and marketers after the media reveal that it has
published misleading statistics about the average viewing time of video ads on its platform. Building a strong ethics
program would have prevented this loss of sales by _____.
a. promoting consistent operations
b. gaining community goodwill
c. avoiding unfavorable publicity
d. fostering good business practices
ANSWER: c
RATIONALE: The public reputation of a company strongly influences the value of its stock, how consumers regard
its products and services, the degree of oversight it receives from government agencies, and the
amount of support and cooperation it receives from its business partners. Thus, many organizations
are motivated to build a strong ethics program to avoid negative publicity. If an organization is
perceived as operating ethically, customers, business partners, shareholders, consumer advocates,
financial institutions, and regulatory bodies will usually regard it more favorably. Prominent ad
buyers and marketers are angry with Facebook after finding out that the world’s largest online social
network service greatly exaggerated the average viewing time of video ads on its platform.
FEEDBACK: a. Many organizations are motivated to build a strong ethics program to avoid negative
publicity.
b. Many organizations are motivated to build a strong ethics program to avoid negative
publicity.
c. Many organizations are motivated to build a strong ethics program to avoid negative
publicity.
d. Many organizations are motivated to build a strong ethics program to avoid negative
publicity.
POINTS: 1
Copyright Cengage Learning. Powered by Cognero. Page 30
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
DIFFICULTY: Easy
REFERENCES: Fostering Corporate Social Responsibility and Good Business Ethics
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.2 - Identify five reasons for an organization to promote a work environment where
CTIVES: employees are encouraged to act ethically.
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/6/2020 4:10 PM
DATE MODIFIED: 1/6/2020 4:19 PM
44. Which of the following is a good problem statement with which to begin the ethical decision-making process?
a. Better systems for approving time off requests and assigning work tasks should be implemented to improve
employee morale.
b. Our employees require training to correct their misconceptions regarding the time off request and work
scheduling procedures.
c. Employee morale has declined by 15% based on survey data, and the reported cause is favoritism in granting
time off requests and assigning work tasks.
d. Employee morale seems worse lately.
ANSWER: c
RATIONALE: A problem statement is a clear, concise description of the issue that needs to be addressed. A good
problem statement answers the following questions: What do people observe that causes them to think
there is a problem? Who is directly affected by the problem? Is anyone else affected? How often does
the problem occur? What is the impact of the problem? How serious is the problem? You must gather
and analyze facts to develop a good problem statement. A possible solution is not a problem
statement.
FEEDBACK: a. A problem statement is a clear, concise description of the issue that needs to be
addressed. You must gather and analyze facts to develop a good problem statement. A
possible solution is not a problem statement.
b. A problem statement is a clear, concise description of the issue that needs to be
addressed. You must gather and analyze facts to develop a good problem statement. A
possible solution is not a problem statement.
c. A problem statement is a clear, concise description of the issue that needs to be
addressed. You must gather and analyze facts to develop a good problem statement. A
possible solution is not a problem statement.
d. A problem statement is a clear, concise description of the issue that needs to be
addressed. You must gather and analyze facts to develop a good problem statement. A
possible solution is not a problem statement.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Including Ethical Considerations in Decision Making
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.3 - Outline a five-step ethical decision-making process.
CTIVES:
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/6/2020 4:21 PM
45. In which step of the ethical decision-making process is it essential to communicate well with all stakeholders and have
someone they trust and respect explain why things are changing and how this will benefit them?
a. evaluate the results
b. implement the decision
c. choose an alternative
d. identify alternatives
ANSWER: b
RATIONALE: Once an alternative is selected, it should be implemented in an efficient, effective, and timely manner.
This is often much easier said than done, because people tend to resist change. In fact, the bigger the
change, the greater is the resistance to it. Communication is the key to helping people accept a
change. It is imperative that someone whom the stakeholders trust and respect answer the following
questions:
FEEDBACK: a. Communication is the key to helping people accept a change as a result of implementing
a decision. It is imperative that someone whom the stakeholders trust and respect answer
the following questions: Why are we doing this? What is wrong with the current way we
do things? How will the change benefit us?
b. Communication is the key to helping people accept a change as a result of implementing
a decision. It is imperative that someone whom the stakeholders trust and respect answer
the following questions: Why are we doing this? What is wrong with the current way we
do things? How will the change benefit us?
c. Communication is the key to helping people accept a change as a result of implementing
a decision. It is imperative that someone whom the stakeholders trust and respect answer
the following questions: Why are we doing this? What is wrong with the current way we
do things? How will the change benefit us?
d. Communication is the key to helping people accept a change as a result of implementing
a decision. It is imperative that someone whom the stakeholders trust and respect answer
the following questions: Why are we doing this? What is wrong with the current way we
do things? How will the change benefit us?
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Including Ethical Considerations in Decision Making
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.3 - Outline a five-step ethical decision-making process.
CTIVES:
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/6/2020 4:55 PM
DATE MODIFIED: 1/6/2020 5:05 PM
46. Which of the following outlines what an organization aspires to become and lists its rules and principles?
a. professional code of ethics
Copyright Cengage Learning. Powered by Cognero. Page 32
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
b. ethical decision-making process
c. fair information practices
d. corporate legal system
ANSWER: a
RATIONALE: A professional code of ethics states the principles and core values that an organization wishes to
develop in its leaders and members. Most codes of ethics created by professional organizations have
two main parts: The first outlines what the organization aspires to become, and the second typically
lists rules and principles by which members of the organization are expected to abide.
FEEDBACK: a. Most codes of ethics created by professional organizations have two main parts: The first
outlines what the organization aspires to become, and the second typically lists rules and
principles by which members of the organization are expected to abide.
b. Most codes of ethics created by professional organizations have two main parts: The first
outlines what the organization aspires to become, and the second typically lists rules and
principles by which members of the organization are expected to abide.
c. Most codes of ethics created by professional organizations have two main parts: The first
outlines what the organization aspires to become, and the second typically lists rules and
principles by which members of the organization are expected to abide.
d. Most codes of ethics created by professional organizations have two main parts: The first
outlines what the organization aspires to become, and the second typically lists rules and
principles by which members of the organization are expected to abide.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Professional Code of Ethics
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.4 - Define the primary intent and two key elements of an effective code of ethics.
CTIVES:
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/6/2020 5:07 PM
DATE MODIFIED: 1/7/2020 7:32 AM
47. The 2,000-year-old Hippocratic oath, which medical schools offer as an affirmation to their graduating classes, is
considered an example of _____.
a. a professional code of ethics
b. a set of fair information practices
c. a safety-critical guideline
d. an ethical decision
ANSWER: a
RATIONALE: A professional code of ethics states the principles and core values that an organization wishes to
develop in its leaders and members. The primary intent of a code of ethics is to define desired
behavior. For example, doctors adhere to varying versions of the 2,000-year-old Hippocratic oath,
which medical schools offer as an affirmation to their graduating classes.
FEEDBACK: a. The primary intent of a code of ethics is to define desired behavior. For example, doctors
adhere to varying versions of the 2,000-year-old Hippocratic oath.
b. The primary intent of a code of ethics is to define desired behavior. For example, doctors
adhere to varying versions of the 2,000-year-old Hippocratic oath.
c. The primary intent of a code of ethics is to define desired behavior. For example, doctors
Copyright Cengage Learning. Powered by Cognero. Page 33
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
adhere to varying versions of the 2,000-year-old Hippocratic oath.
d. The primary intent of a code of ethics is to define desired behavior. For example, doctors
adhere to varying versions of the 2,000-year-old Hippocratic oath.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Professional Code of Ethics
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.4 - Define the primary intent and two key elements of an effective code of ethics.
CTIVES:
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/7/2020 7:34 AM
DATE MODIFIED: 1/7/2020 7:58 AM
48. Because Marigold wants to join CompTIA (the Computer Technology Industry Association), she agrees to adhere to
this organization's professional code of ethics. This means that she _____.
a. believes CompTIA has provided answers to every ethical dilemma she might face
b. has promised to behave in a way that CompTIA has defined as desirable
c. is prioritizing CompTIA's principles of right and wrong over her own
d. wants to rely on CompTIA's guidelines primarily to avoid violating the law
ANSWER: b
RATIONALE: A professional code of ethics states the principles and core values that an organization wishes to
develop in its leaders and members. The primary intent of a code of ethics is to define desired
behavior.
FEEDBACK: a. The primary intent of a code of ethics is to define desired behavior.
b. The primary intent of a code of ethics is to define desired behavior.
c. The primary intent of a code of ethics is to define desired behavior.
d. The primary intent of a code of ethics is to define desired behavior.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Professional Code of Ethics
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.4 - Define the primary intent and two key elements of an effective code of ethics.
CTIVES:
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/7/2020 7:42 AM
DATE MODIFIED: 1/7/2020 7:59 AM
50. Following a professional code of ethics can improve ethical decision making because _____.
a. it allows practitioners to compromise to meet day-to-day pressures
b. it guarantees trust and respect from the general public
c. it avoids the need for continual self-assessment among practitioners
d. it provides a common set of core values practitioners can use as a guideline
ANSWER: d
RATIONALE: Following a professional code of ethics can produce four key benefits for an individual, a profession,
and society as a whole. One is that it canimprove ethical decision making. Adherence to a
professional code of ethics means that practitioners use a common set of core values and beliefs as a
guideline for ethical decision making.
FEEDBACK: a. Following a professional code of ethics can improve ethical decision making. Adherence
to a professional code of ethics means that practitioners use a common set of core
values and beliefs as a guideline for ethical decision making.
b. Following a professional code of ethics can improve ethical decision making. Adherence
to a professional code of ethics means that practitioners use a common set of core
Copyright Cengage Learning. Powered by Cognero. Page 35
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
values and beliefs as a guideline for ethical decision making.
c. Following a professional code of ethics can improve ethical decision making. Adherence
to a professional code of ethics means that practitioners use a common set of core
values and beliefs as a guideline for ethical decision making.
d. Following a professional code of ethics can improve ethical decision making. Adherence
to a professional code of ethics means that practitioners use a common set of core
values and beliefs as a guideline for ethical decision making.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Professional Code of Ethics
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.5 - Identify four benefits of following a professional code of ethics.
CTIVES:
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/7/2020 8:18 AM
DATE MODIFIED: 1/7/2020 8:27 AM
51. Sean's boss tries to pressure him to cut corners to reduce development time and costs. Sean objects, stating that this
would be unethical and citing the code of ethics for the professional organization of which they are both members. Sean's
boss agrees with him and allows him to proceed as he was. Which benefit of following a professional code of ethics does
this best demonstrate?
a. improve ethical decision making
b. provide an evaluation benchmark
c. set high standards of practice and ethical behavior
d. engender trust and respect from the general public
ANSWER: c
RATIONALE: Following a professional code of ethics can produce four key benefits for an individual, a profession,
and society as a whole. One is that it sets high standards of practice and ethical behavior. Adherence
to a code of ethics reminds professionals of the responsibilities and duties that they may be tempted to
compromise to meet the pressures of day-to-day business. The code also defines acceptable and
unacceptable behaviors to guide professionals in their interactions with others.
FEEDBACK: a. Following a professional code of ethics sets high standards of practice and ethical
behavior. Adherence to a code of ethics reminds professionals of the responsibilities and
duties that they may be tempted to compromise to meet the pressures of day-to-day
business.
b. Following a professional code of ethics sets high standards of practice and ethical
behavior. Adherence to a code of ethics reminds professionals of the responsibilities and
duties that they may be tempted to compromise to meet the pressures of day-to-day
business.
c. Following a professional code of ethics sets high standards of practice and ethical
behavior. Adherence to a code of ethics reminds professionals of the responsibilities and
duties that they may be tempted to compromise to meet the pressures of day-to-day
business.
d. Following a professional code of ethics sets high standards of practice and ethical
behavior. Adherence to a code of ethics reminds professionals of the responsibilities and
duties that they may be tempted to compromise to meet the pressures of day-to-day
business.
52. Brown's Auto Repair Shop is the most popular business of its kind in the community thanks to good word of mouth
from past customers. The employees there follow a professional code of ethics that requires them to tell customers the
truth, including which less costly repair options are available, and warn them of any possible future issues associated with
each option. The popularity of Brown's best demonstrates how following a professional code of ethics _____.
a. improves ethical decision making
b. engenders trust and respect from the general public
c. sets high standards of practice and ethical behavior
d. provides an evaluation benchmark
ANSWER: b
RATIONALE: Following a professional code of ethics can produce four key benefits for an individual, a profession,
and society as a whole. One is that it engenders trust and respect from the general public. Public trust
is built on the expectation that a professional will behave ethically. People must often depend on the
integrity and good judgment of a professional to tell the truth, abstain from giving self-serving advice,
and offer warnings about the potential negative side effects of their actions. Thus, adherence to a code
of ethics enhances trust and respect for professionals and their profession.
FEEDBACK: a. Following a professional code of ethics engenders trust and respect from the general
public. Public trust is built on the expectation that a professional will behave ethically: tell
the truth, abstain from giving self-serving advice, and offer warnings about the potential
negative side effects of their actions.
b. Following a professional code of ethics engenders trust and respect from the general
public. Public trust is built on the expectation that a professional will behave ethically: tell
the truth, abstain from giving self-serving advice, and offer warnings about the potential
negative side effects of their actions.
c. Following a professional code of ethics engenders trust and respect from the general
public. Public trust is built on the expectation that a professional will behave ethically: tell
the truth, abstain from giving self-serving advice, and offer warnings about the potential
negative side effects of their actions.
d. Following a professional code of ethics engenders trust and respect from the general
public. Public trust is built on the expectation that a professional will behave ethically: tell
the truth, abstain from giving self-serving advice, and offer warnings about the potential
negative side effects of their actions.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Professional Code of Ethics
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
53. A code of professional ethics can be used to assess one's own performance or, more formally, to decide when an
organization should either reward or reprimand its members for their actions. This is because a code of ethics _____.
a. improves ethical decision making
b. sets high standards of practice and ethical behavior
c. engenders trust and respect from the general public
d. provides an evaluation benchmark
ANSWER: d
RATIONALE: Following a professional code of ethics can produce four key benefits for an individual, a profession,
and society as a whole. One is that it provides an evaluation benchmark that a professional can use as
a means of self-assessment. Peers of the professional can also use the code for recognition or censure.
FEEDBACK: a. Following a professional code of ethics provides an evaluation benchmark that a
professional can use as a means of self-assessment. Peers of the professional can also
use the code for recognition or censure.
b. Following a professional code of ethics provides an evaluation benchmark that a
professional can use as a means of self-assessment. Peers of the professional can also
use the code for recognition or censure.
c. Following a professional code of ethics provides an evaluation benchmark that a
professional can use as a means of self-assessment. Peers of the professional can also
use the code for recognition or censure.
d. Following a professional code of ethics provides an evaluation benchmark that a
professional can use as a means of self-assessment. Peers of the professional can also
use the code for recognition or censure.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Professional Code of Ethics
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.5 - Identify four benefits of following a professional code of ethics.
CTIVES:
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/7/2020 12:40 PM
DATE MODIFIED: 1/7/2020 12:46 PM
54. Which of the following statements about professional organizations for information systems professionals is true?
a. Many codes of ethics have been developed by IS professional organizations and can be accessed on their
Web sites.
b. The merged Computer Technology Industry Association and Association of Information Technology
Professionals has emerged as the preeminent IS professional organization.
c. There is a universal code of ethics that all IS professional organizations recommend.
55. What can you obtain for free once a year from three key agencies in order to find out what is stored about you in
existing databases?
a. privacy policy
b. credit report
c. credit score
Copyright Cengage Learning. Powered by Cognero. Page 39
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
d. Freedom of Information Act report
ANSWER: b
RATIONALE: Find out what is stored about you in existing databases. Call the major credit bureaus to get a copy of
your credit report. You are entitled to a free credit report every 12 months from each of the three
major consumer reporting agencies (Equifax, Experian, and TransUnion).
FEEDBACK: a. Find out what is stored about you in existing databases. You are entitled to a free credit
report every 12 months from each of the three major consumer reporting agencies
(Equifax, Experian, and TransUnion).
b. Find out what is stored about you in existing databases. You are entitled to a free credit
report every 12 months from each of the three major consumer reporting agencies
(Equifax, Experian, and TransUnion).
c. Find out what is stored about you in existing databases. You are entitled to a free credit
report every 12 months from each of the three major consumer reporting agencies
(Equifax, Experian, and TransUnion).
d. Find out what is stored about you in existing databases. You are entitled to a free credit
report every 12 months from each of the three major consumer reporting agencies
(Equifax, Experian, and TransUnion).
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Individual Efforts to Protect Privacy
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.8 - Identify four measures you should take to protect your personal privacy.
CTIVES:
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/7/2020 1:38 PM
DATE MODIFIED: 1/7/2020 1:45 PM
56. Which of the following actions will likely endanger rather than protect someone's personal privacy?
a. filling out a change-of-address form with the U.S. Postal Service
b. obtaining an unlisted phone number
c. shredding credit card statements before disposing of them
d. visiting the Direct Marketing Association Web site
ANSWER: a
RATIONALE: Be proactive in protecting your privacy. You can get an unlisted phone number and ask the phone
company to block caller ID systems from reading your phone number. If you change your address,
don’t fill out a change-of-address form with the U.S. Postal Service; you can notify the people and
companies that you want to have your new address. Destroy copies of your charge card bills and shred
monthly statements before disposing of them in the garbage. You can also cut down on the junk mail
and telemarketing calls you receive by visiting the Direct Marketing Association Web site
(www.thedma.org). Go to the site and look under Consumer Help-Remove Name from Lists.
FEEDBACK: a. If you change your address, don’t fill out a change-of-address form with the U.S. Postal
Service; you can notify the people and companies that you want to have your new
address.
b. If you change your address, don’t fill out a change-of-address form with the U.S. Postal
Service; you can notify the people and companies that you want to have your new
address.
57. MYSTIC, Downstream, Upstream, the Secure Flight Program, and Stingray are all examples of _____.
a. fair information practices
b. safety-critical systems
c. privacy-related legislation
d. government surveillance systems
ANSWER: d
RATIONALE: Government surveillance systems (listed in Table 3.1) include MYSTIC, Downstream, Upstream, the
Secure Flight Program, and Stingray.
FEEDBACK: a. Government surveillance systems include MYSTIC, Downstream, Upstream, the Secure
Flight Program, and Stingray.
b. Government surveillance systems include MYSTIC, Downstream, Upstream, the Secure
Flight Program, and Stingray.
c. Government surveillance systems include MYSTIC, Downstream, Upstream, the Secure
Flight Program, and Stingray.
d. Government surveillance systems include MYSTIC, Downstream, Upstream, the Secure
Flight Program, and Stingray.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Information Systems and Government Surveillance
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJEC POIS.14e.3.9 - Discuss the tradeoffs between security and privacy.
TIVES:
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/7/2020 2:04 PM
DATE MODIFIED: 1/7/2020 2:08 PM
58. In recent years, laws have been added or amended to expand the scope of government surveillance in reaction to
_____.
Copyright Cengage Learning. Powered by Cognero. Page 41
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
a. several U.S. Supreme Court rulings
b. the public debate regarding safety versus privacy
c. technological developments and potential terrorists threats
d. major data breaches and media revelations about surveillance
ANSWER: c
RATIONALE: In recent years, new laws addressing government electronic surveillance have been added and old
laws amended in reaction to the development of new communication technologies and a heightened
awareness of potential terrorist threats. The net result is that the scope of government surveillance has
greatly expanded—going from collecting data on as few people as necessary to collecting as much
data as possible on as many people as possible.
FEEDBACK: a. In recent years, new laws addressing government electronic surveillance have been
added and old laws amended in reaction to the development of new communication
technologies and a heightened awareness of potential terrorist threats.
b. In recent years, new laws addressing government electronic surveillance have been
added and old laws amended in reaction to the development of new communication
technologies and a heightened awareness of potential terrorist threats.
c. In recent years, new laws addressing government electronic surveillance have been
added and old laws amended in reaction to the development of new communication
technologies and a heightened awareness of potential terrorist threats.
d. In recent years, new laws addressing government electronic surveillance have been
added and old laws amended in reaction to the development of new communication
technologies and a heightened awareness of potential terrorist threats.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Information Systems and Government Surveillance
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.9 - Discuss the tradeoffs between security and privacy.
CTIVES:
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/7/2020 2:21 PM
DATE MODIFIED: 1/7/2020 2:35 PM
59. Some people believe that government electronic surveillance activities represent unreasonable searches and seizures,
meaning that they violate the _____.
a. USA PATRIOT Act
b. USA Freedom Act
c. First Amendment
d. Fourth Amendment
ANSWER: d
RATIONALE: Many of the recently-initiated government surveillance activities are viewed by some as an
unconstitutional violation of the Fourth Amendment, which protects us from illegal searches and
seizures.
FEEDBACK: a. Many of the recently-initiated government surveillance activities are viewed by some as
an unconstitutional violation of the Fourth Amendment, which protects us from illegal
searches and seizures.
b. Many of the recently-initiated government surveillance activities are viewed by some as
Copyright Cengage Learning. Powered by Cognero. Page 42
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
an unconstitutional violation of the Fourth Amendment, which protects us from illegal
searches and seizures.
c. Many of the recently-initiated government surveillance activities are viewed by some as
an unconstitutional violation of the Fourth Amendment, which protects us from illegal
searches and seizures.
d. Many of the recently-initiated government surveillance activities are viewed by some as
an unconstitutional violation of the Fourth Amendment, which protects us from illegal
searches and seizures.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Information Systems and Government Surveillance
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.9 - Discuss the tradeoffs between security and privacy.
CTIVES:
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/7/2020 2:38 PM
DATE MODIFIED: 1/7/2020 2:43 PM
60. Americans who are in favor of expanded government surveillance programs argue that _____.
a. the U.S. government is obligated to do all that it can to ensure citizens' security
b. the violation of any of the rights designed to protect citizens' privacy is unacceptable
c. even citizens who aren't doing anything "wrong" are negatively affected by it
d. they do not threaten anyone's privacy or freedom of expression and association
ANSWER: a
RATIONALE: Many Americans feel that the U.S. government is obligated to do all that it can do to provide for the
security of its citizens, even it means violating some of the rights designed to protect our privacy.
After all, they argue, if you are not doing anything “wrong” you should have no concerns.
FEEDBACK: a. Many Americans feel that the U.S. government is obligated to do all that it can do to
provide for the security of its citizens, even it means violating some of the rights designed
to protect our privacy.
b. Many Americans feel that the U.S. government is obligated to do all that it can do to
provide for the security of its citizens, even it means violating some of the rights designed
to protect our privacy.
c. Many Americans feel that the U.S. government is obligated to do all that it can do to
provide for the security of its citizens, even it means violating some of the rights designed
to protect our privacy.
d. Many Americans feel that the U.S. government is obligated to do all that it can do to
provide for the security of its citizens, even it means violating some of the rights designed
to protect our privacy.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Information Systems and Government Surveillance
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.9 - Discuss the tradeoffs between security and privacy.
CTIVES:
Copyright Cengage Learning. Powered by Cognero. Page 43
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/7/2020 2:46 PM
DATE MODIFIED: 1/7/2020 4:10 PM
61. Which statement about the Foreign Intelligence Surveillance Act (FISA) is true?
a. FISA does not allow any surveillance of communications to which a U.S. citizen is a party.
b. FISA allows U.S. intelligence to target U.S. citizens outside the U.S. without a court order.
c. FISA created a court that meets in secret to hear applications for surveillance orders in the U.S.
d. FISA prohibits the use of surveillance assistance from communications common carriers.
ANSWER: c
RATIONALE: FISA, passed by Congress in 1978, describes procedures for the electronic surveillance and collection
of foreign intelligence information in communications (e.g., phone calls, emails) between foreign
powers and the agents of foreign powers. The act allows surveillance, without court order, within the
United States for up to a year unless the “surveillance will acquire the contents of any communication
to which a U.S. person is a party.” If a U.S. citizen is involved, judicial authorization is required
within 72 hours after surveillance begins. The act also specifies that the U.S. attorney general may
request a specific communications common carrier (a company that provides communications
transmission services to the public) to furnish information, facilities, or technical assistance to
accomplish the electronic surveillance.
FISA requires the government to obtain an individualized court order before it can intentionally target
a U.S. person anywhere in the world to collect the content of his/her communications. The FISA act
also created the Foreign Intelligence Surveillance Act (FISA) court, which meets in secret to hear
applications for orders approving electronic surveillance anywhere within the United States.
FEEDBACK: a. The FISA act created the Foreign Intelligence Surveillance Act (FISA) court, which meets
in secret to hear applications for orders approving electronic surveillance anywhere within
the United States.
b. The FISA also created the Foreign Intelligence Surveillance Act (FISA) court, which
meets in secret to hear applications for orders approving electronic surveillance
anywhere within the United States.
c. The FISA act created the Foreign Intelligence Surveillance Act (FISA) court, which meets
in secret to hear applications for orders approving electronic surveillance anywhere within
the United States.
d. The FISA act created the Foreign Intelligence Surveillance Act (FISA) court, which meets
in secret to hear applications for orders approving electronic surveillance anywhere within
the United States.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Federal Statutes That Protect Citizens from Government Surveillance
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.10 - Discuss how three U.S. federal statutes protect citizens from government surveillance
CTIVES: while at the same time authorize the government to collect data.
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/7/2020 4:19 PM
DATE MODIFIED: 1/7/2020 4:35 PM
63. American's rights to freedom of religion, freedom of expression, and freedom to assemble peaceably are protected by
the _____.
a. Fourth Amendment
b. First Amendment
c. COPPA
d. HIPAA
ANSWER: b
RATIONALE: The First Amendment protects Americans’ rights to freedom of religion, freedom of expression, and
freedom to assemble peaceably.
FEEDBACK: a. The First Amendment protects Americans’ rights to freedom of religion, freedom of
expression, and freedom to assemble peaceably.
Copyright Cengage Learning. Powered by Cognero. Page 45
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
b. The First Amendment protects Americans’ rights to freedom of religion, freedom of
expression, and freedom to assemble peaceably.
c. The First Amendment protects Americans’ rights to freedom of religion, freedom of
expression, and freedom to assemble peaceably.
d. The First Amendment protects Americans’ rights to freedom of religion, freedom of
expression, and freedom to assemble peaceably.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Measures Protecting Freedom of Speech
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJEC POIS.14e.3.11 - Discuss how the First Amendment and anonymous expression safeguard our freedom
TIVES: of speech.
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/7/2020 4:52 PM
DATE MODIFIED: 1/7/2020 4:58 PM
64. The Bill of Rights protects many forms of expression, but the Supreme Court has ruled that it does NOT protect
_____.
a. sedition
b. flag burning
c. dance movements
d. hand gestures
ANSWER: a
RATIONALE: Numerous court decisions have broadened the definition of speech to include nonverbal, visual, and
symbolic forms of expression, such as flag burning, dance movements, and hand gestures. The
Supreme Court has held that the following types of speech are not protected by the First Amendment
and may be forbidden by the government: perjury, fraud, defamation, obscene speech, incitement of
panic, incitement to crime, “fighting words,” and sedition (incitement of discontent or rebellion
against a government).
FEEDBACK: a. Numerous court decisions have broadened the definition of speech to include nonverbal,
visual, and symbolic forms of expression, such as flag burning, dance movements, and
hand gestures.
b. Numerous court decisions have broadened the definition of speech to include nonverbal,
visual, and symbolic forms of expression, such as flag burning, dance movements, and
hand gestures.
c. Numerous court decisions have broadened the definition of speech to include nonverbal,
visual, and symbolic forms of expression, such as flag burning, dance movements, and
hand gestures.
d. Numerous court decisions have broadened the definition of speech to include nonverbal,
visual, and symbolic forms of expression, such as flag burning, dance movements, and
hand gestures.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Measures Protecting Freedom of Speech
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
Copyright Cengage Learning. Powered by Cognero. Page 46
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
LEARNING OBJE POIS.14e.3.11 - Discuss how the First Amendment and anonymous expression safeguard our freedom
CTIVES: of speech.
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/7/2020 5:00 PM
DATE MODIFIED: 1/7/2020 5:06 PM
65. During the early formation of the United States, many influential writings criticizing British rule were published
without the real names of their authors. These publications represented a form of _____.
a. slander
b. First Amendment expression
c. incitement to crime
d. anonymous expression
ANSWER: d
RATIONALE: Anonymous expression is the expression of opinions by people who do not reveal their identity.
Anonymous political expression played an important role in the early formation of the United States.
Before and during the American Revolution, patriots who dissented against British rule often used
anonymous pamphlets and leaflets to express their opinions. Thomas Paine was an influential writer,
philosopher, and statesman of the Revolutionary War era. He published a pamphlet called Common
Sense, in which he criticized the British monarchy and urged the colonies to become independent by
establishing a republican government of their own. Published anonymously in 1776, the pamphlet
sold more than 500,000 copies, at a time when the population of the colonies was estimated to have
been less than 4 million; it provided a stimulus to produce the Declaration of Independence six
months later.
FEEDBACK: a. Anonymous expression is the expression of opinions by people who do not reveal their
identity. Anonymous political expression played an important role in the early formation of
the United States.
b. Anonymous expression is the expression of opinions by people who do not reveal their
identity. Anonymous political expression played an important role in the early formation of
the United States.
c. Anonymous expression is the expression of opinions by people who do not reveal their
identity. Anonymous political expression played an important role in the early formation of
the United States.
d. Anonymous expression is the expression of opinions by people who do not reveal their
identity. Anonymous political expression played an important role in the early formation of
the United States.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Measures Protecting Freedom of Speech
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.11 - Discuss how the First Amendment and anonymous expression safeguard our freedom
CTIVES: of speech.
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/7/2020 5:07 PM
DATE MODIFIED: 1/7/2020 5:18 PM
68. Which intermediary in the process of speaking on the Internet often receives defamation or copyright infringement
claims from government authorities or copyright holders who demand that material be taken down?
a. Internet service provider
b. upstream Internet service provider
c. Web host server
d. domain name service
ANSWER: c
RATIONALE: Internet censorship is the control or suppression of the publishing or accessing of information on the
Internet. Speech on the Internet requires a series of intermediaries to reach its audience with each
intermediary vulnerable to some degree to pressure from those who want to silence the speaker. Web
hosting services are often the recipients of defamation or copyright infringement claims by
government authorities or copyright holders, demanding the immediate takedown of hosted material
that is deemed inappropriate or illegal.
FEEDBACK: a. Web hosting services are often the recipients of defamation or copyright infringement
claims by government authorities or copyright holders, demanding the immediate
takedown of hosted material that is deemed inappropriate or illegal.
b. Web hosting services are often the recipients of defamation or copyright infringement
claims by government authorities or copyright holders, demanding the immediate
takedown of hosted material that is deemed inappropriate or illegal.
c. Web hosting services are often the recipients of defamation or copyright infringement
claims by government authorities or copyright holders, demanding the immediate
takedown of hosted material that is deemed inappropriate or illegal.
d. Web hosting services are often the recipients of defamation or copyright infringement
claims by government authorities or copyright holders, demanding the immediate
takedown of hosted material that is deemed inappropriate or illegal.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Internet Censorship
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.12 - Describe the impact of censorship on the operation of Internet service providers.
Copyright Cengage Learning. Powered by Cognero. Page 49
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
CTIVES:
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/8/2020 9:39 AM
DATE MODIFIED: 1/8/2020 9:46 AM
70. In countries with "three strikes" laws, what action may Internet service providers be required to take?
a. terminate the Internet connections of users who have repeatedly been caught posting illegal content
Copyright Cengage Learning. Powered by Cognero. Page 50
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
b. pursue defamation or copyright infringement claims against their customers
c. require users to enter certain keywords in search engine searches
d. convert human-readable host and domain names into machine-readable, Internet Protocol addresses
ANSWER: a
RATIONALE: Several countries have enacted so-called three strikes laws that require ISPs to terminate a user’s
Internet connection once that user has received a number of notifications of posting of content deemed
inappropriate or illegal.
FEEDBACK: a. Several countries have enacted so-called three strikes laws that require ISPs to terminate
a user’s Internet connection once that user has received a number of notifications of
posting of content deemed inappropriate or illegal.
b. Several countries have enacted so-called three strikes laws that require ISPs to terminate
a user’s Internet connection once that user has received a number of notifications of
posting of content deemed inappropriate or illegal.
c. Several countries have enacted so-called three strikes laws that require ISPs to terminate
a user’s Internet connection once that user has received a number of notifications of
posting of content deemed inappropriate or illegal.
d. Several countries have enacted so-called three strikes laws that require ISPs to terminate
a user’s Internet connection once that user has received a number of notifications of
posting of content deemed inappropriate or illegal.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Internet Censorship
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.12 - Describe the impact of censorship on the operation of Internet service providers.
CTIVES:
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/8/2020 11:18 AM
DATE MODIFIED: 1/8/2020 11:24 AM
71. Which country has both the largest online population and probably the most rigorous Internet censorship in the world?
a. China
b. India
c. United States
d. Brazil
ANSWER: a
RATIONALE: China has the largest online population in the world, with over 772 million Internet users (see Table
3.2, which depicts the top 12 countries in terms of number of Internet users). Note, however, that
Internet censorship in China is perhaps the most rigorous in the world. The Chinese government
blocks access to Web sites that discuss any of a long list of topics that are considered objectionable.
FEEDBACK: a. China has the largest online population in the world, yet Internet censorship in China is
perhaps the most rigorous in the world.
b. China has the largest online population in the world, yet Internet censorship in China is
perhaps the most rigorous in the world.
c. China has the largest online population in the world, yet Internet censorship in China is
perhaps the most rigorous in the world.
d. China has the largest online population in the world, yet Internet censorship in China is
Copyright Cengage Learning. Powered by Cognero. Page 51
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
perhaps the most rigorous in the world.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Internet Censorship
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.12 - Describe the impact of censorship on the operation of Internet service providers.
CTIVES:
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/8/2020 11:26 AM
DATE MODIFIED: 1/8/2020 11:36 AM
74. Which of the following will prevent a product from being rated as a high-quality software system?
a. thorough testing
b. slow development
c. high cost
d. software defects
ANSWER: d
RATIONALE: High-quality software systems are systems that are easy to learn and use because they perform quickly
and efficiently; they meet their users’ needs; and they operate safely and reliably so that system
downtime is kept to a minimum. A software defect is any error that, if not removed, could cause a
software system to fail to meet its users’ needs or provide an open door for a cyberattacker.
FEEDBACK: a. A software defect is any error that, if not removed, could cause a software system to fail
to meet its users’ needs and therefore not quality as high-quality software.
b. A software defect is any error that, if not removed, could cause a software system to fail
to meet its users’ needs and therefore not quality as high-quality software.
c. A software defect is any error that, if not removed, could cause a software system to fail
to meet its users’ needs and therefore not quality as high-quality software.
d. A software defect is any error that, if not removed, could cause a software system to fail
to meet its users’ needs and therefore not quality as high-quality software.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Ethical Issues in Developing Quality Software
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
Copyright Cengage Learning. Powered by Cognero. Page 53
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
LEARNING OBJE POIS.14e.3.14 - Distinguish between a high-quality software system and safety-critical system.
CTIVES:
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/8/2020 2:18 PM
DATE MODIFIED: 1/8/2020 2:26 PM
75. Fiat Chrysler recalled over a million trucks due to a software defect related to at least one fatality. This software defect
was found in a _____.
a. safety-critical software system
b. high-quality software system
c. pre-market software evaluation
d. cybersecurity assessment
ANSWER: a
RATIONALE: A software defect is any error that, if not removed, could cause a software system to fail to meet its
users’ needs or provide an open door for a cyberattacker. A safety-critical system is one whose failure
may cause human injury or death.
FEEDBACK: a. A safety-critical system is one whose failure may cause human injury or death.
b. A safety-critical system is one whose failure may cause human injury or death.
c. A safety-critical system is one whose failure may cause human injury or death.
d. A safety-critical system is one whose failure may cause human injury or death.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Ethical Issues in Developing Quality Software
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.14 - Distinguish between a high-quality software system and safety-critical system.
CTIVES:
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/8/2020 2:27 PM
DATE MODIFIED: 1/8/2020 2:31 PM
77. JoAnn is a developer hired to help code the software that will control a nuclear power plant reactor. Compared with
her previous project, which involved software for sophisticated video games for PCs and home game consoles, JoAnn's
current project will most likely _____.
a. have a much smaller budget and a much shorter development schedule
b. have a much larger budget and a much shorter development schedule
c. have a much smaller budget and a much longer development schedule
d. have a much larger budget and a much longer development schedule
ANSWER: d
RATIONALE: A safety-critical system is one whose failure may cause human injury or death. The safe operation of
many safety-critical systems relies on the performance of software. Such systems control an ever-
increasing array of products and applications, including antilock brakes, adaptive cruise control
functionality, and a myriad of other safety-related features found in automobiles; nuclear power plant
reactors; aircraft flight control; military weapons; and a wide range of medical devices. The process of
building software for safety critical systems takes much longer and is much more expensive than for
high-quality systems.
FEEDBACK: a. The process of building software for safety critical systems takes much longer and is
much more expensive than for high-quality systems.
b. The process of building software for safety critical systems takes much longer and is
much more expensive than for high-quality systems.
c. The process of building software for safety critical systems takes much longer and is
much more expensive than for high-quality systems.
d. The process of building software for safety critical systems takes much longer and is
much more expensive than for high-quality systems.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Safety-Critical Systems
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.15 - Give three reasons why developing a safety-critical system takes longer and is more
CTIVES: expensive.
KEYWORDS: Bloom's: Remember
Copyright Cengage Learning. Powered by Cognero. Page 55
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
DATE CREATED: 1/9/2020 10:59 AM
DATE MODIFIED: 1/9/2020 11:10 AM
78. Why do software developers assigned to write code for a safety-critical system need to work closely with safety and
systems engineers?
a. Such systems typically include little hardware or other equipment.
b. Software is typically only one of many components in such a system.
c. Developers working on such systems must be experienced professionals.
d. The software is often less essential than other components of such a system.
ANSWER: b
RATIONALE: The process of building software for safety-critical systems takes much longer and is much more
expensive than for high-quality systems. One reason is that software developers working on a safety-
critical system must be highly trained and experienced professionals who recognize that the software
is only one component of the system; other components typically include system users or operators,
hardware, and other equipment. Software developers need to work closely with safety and systems
engineers to ensure that the entire system, not just the software, operates in a safe manner.
FEEDBACK: a. Software developers working on a safety-critical system must be highly trained and
experienced professionals who recognize that the software is only one component of the
system; other components typically include system users or operators, hardware, and
other equipment.
b. Software developers working on a safety-critical system must be highly trained and
experienced professionals who recognize that the software is only one component of the
system; other components typically include system users or operators, hardware, and
other equipment.
c. Software developers working on a safety-critical system must be highly trained and
experienced professionals who recognize that the software is only one component of the
system; other components typically include system users or operators, hardware, and
other equipment.
d. Software developers working on a safety-critical system must be highly trained and
experienced professionals who recognize that the software is only one component of the
system; other components typically include system users or operators, hardware, and
other equipment.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Safety-Critical Systems
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.15 - Give three reasons why developing a safety-critical system takes longer and is more
CTIVES: expensive.
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/9/2020 11:11 AM
DATE MODIFIED: 1/9/2020 11:20 AM
79. Developing safety-critical systems is more expensive than developing high-quality systems because _____.
a. more thorough documentation is required for high-quality systems
b. less extreme measures are taken to remove software defects from high-quality systems
c. the tasks involved in developing high-quality systems require additional steps
Copyright Cengage Learning. Powered by Cognero. Page 56
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
d. high-quality systems usually involve more non-software components
ANSWER: b
RATIONALE: The process of building software for safety-critical systems takes much longer and is much more
expensive than for high-quality systems. One reason is that extreme measures must be taken to
identify and remove software defects from safety-critical systems starting at the very earliest stages of
software development—requirements definition and all the way through final testing. All tasks—
including requirements definition, systems analysis, design, coding, fault analysis, testing,
implementation, and change control—require additional steps, more thorough documentation, and
vigilant checking and rechecking.
FEEDBACK: a. Extreme measures must be taken to identify and remove software defects from safety-
critical systems starting at the very earliest stages of software development—
requirements definition and all the way through final testing. All tasks—including
requirements definition, systems analysis, design, coding, fault analysis, testing,
implementation, and change control—require additional steps, more thorough
documentation, and vigilant checking and rechecking.
b. Extreme measures must be taken to identify and remove software defects from safety-
critical systems starting at the very earliest stages of software development—
requirements definition and all the way through final testing. All tasks—including
requirements definition, systems analysis, design, coding, fault analysis, testing,
implementation, and change control—require additional steps, more thorough
documentation, and vigilant checking and rechecking.
c. Extreme measures must be taken to identify and remove software defects from safety-
critical systems starting at the very earliest stages of software development—
requirements definition and all the way through final testing. All tasks—including
requirements definition, systems analysis, design, coding, fault analysis, testing,
implementation, and change control—require additional steps, more thorough
documentation, and vigilant checking and rechecking.
d. Extreme measures must be taken to identify and remove software defects from safety-
critical systems starting at the very earliest stages of software development—
requirements definition and all the way through final testing. All tasks—including
requirements definition, systems analysis, design, coding, fault analysis, testing,
implementation, and change control—require additional steps, more thorough
documentation, and vigilant checking and rechecking.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Safety-Critical Systems
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.15 - Give three reasons why developing a safety-critical system takes longer and is more
CTIVES: expensive.
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/9/2020 11:20 AM
DATE MODIFIED: 1/9/2020 11:33 AM
81. What feature of the creation of safety-critical software often draws developers into ethical dilemmas?
a. level of experience required
b. nature of industries involved
c. increased time and expense
d. coordination with other teams
ANSWER: c
RATIONALE: The increased time and expense of completing safety-critical software can draw developers into
ethical dilemmas.
FEEDBACK: a. The increased time and expense of completing safety-critical software can draw
developers into ethical dilemmas.
b. The increased time and expense of completing safety-critical software can draw
developers into ethical dilemmas.
c. The increased time and expense of completing safety-critical software can draw
developers into ethical dilemmas.
d. The increased time and expense of completing safety-critical software can draw
developers into ethical dilemmas.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Safety-Critical Systems
Copyright Cengage Learning. Powered by Cognero. Page 58
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECT POIS.14e.3.16 - Identify two ethical dilemmas that software developers face when building high-
IVES: quality or safety-critical systems.
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/9/2020 11:59 AM
DATE MODIFIED: 1/9/2020 12:07 PM
82. One example of an ethical dilemma related to safety-critical systems is whether to risk making the product more
expensive, and potentially less appealing to customers, by _____.
a. including hardware mechanisms to back up or verify software functions
b. reducing redundancy in hardware and software components
c. increasing its ease of operation
d. copying a competitor's product
ANSWER: a
RATIONALE: The increased time and expense of completing safety-critical software can draw developers into
ethical dilemmas. They must carefully weigh cost and ease of use issues in developing a system that is
safe and that also appeals to customers. For example, the use of hardware mechanisms or redundant
software to back up or verify critical software functions can help ensure safe operation. However,
such hardware or redundancy may make the final product more expensive to manufacture or harder
for the user to operate—potentially making the product less attractive than a competitor’s.
FEEDBACK: a. The use of hardware mechanisms or redundant software to back up or verify critical
software functions can help ensure safe operation but may make the final product more
expensive to manufacture, potentially making the product less attractive than a
competitor’s.
b. The use of hardware mechanisms or redundant software to back up or verify critical
software functions can help ensure safe operation but may make the final product more
expensive to manufacture, potentially making the product less attractive than a
competitor’s.
c. The use of hardware mechanisms or redundant software to back up or verify critical
software functions can help ensure safe operation but may make the final product more
expensive to manufacture, potentially making the product less attractive than a
competitor’s.
d. The use of hardware mechanisms or redundant software to back up or verify critical
software functions can help ensure safe operation but may make the final product more
expensive to manufacture, potentially making the product less attractive than a
competitor’s.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Safety-Critical Systems
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.16 - Identify two ethical dilemmas that software developers face when building high-
CTIVES: quality or safety-critical systems.
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/9/2020 12:08 PM
DATE MODIFIED: 1/9/2020 12:15 PM
Copyright Cengage Learning. Powered by Cognero. Page 59
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
83. One example of a common and significant ethical dilemma related to safety-critical systems is deciding _____.
a. how much software testing is sufficient
b. how much skill users can be assumed to have
c. how much documentation is necessary
d. how many software engineers are needed
ANSWER: a
RATIONALE: The increased time and expense of completing safety-critical software can draw developers into
ethical dilemmas. One key issue is deciding when sufficient software testing has been performed.
How much testing is enough when you are building a product whose failure could cause loss of
human life? At some point, software developers must determine that they have completed sufficient
testing and then sign off to indicate their approval to release the product. Determining how much
testing is sufficient demands careful decision making.
FEEDBACK: a. One key issue when developing safety-critical software is deciding when sufficient
software testing has been performed.
b. One key issue when developing safety-critical software is deciding when sufficient
software testing has been performed.
c. One key issue when developing safety-critical software is deciding when sufficient
software testing has been performed.
d. One key issue when developing safety-critical software is deciding when sufficient
software testing has been performed.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Safety-Critical Systems
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.16 - Identify two ethical dilemmas that software developers face when building high-
CTIVES: quality or safety-critical systems.
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/9/2020 12:17 PM
DATE MODIFIED: 1/9/2020 12:24 PM
84. A key ethical question related specifically to safety-critical software development is:
a. What is the impact on you, your organization, other stakeholders, and the environment?
b. Do any corporate policies or guidelines apply?
c. What is wrong with the current way we do things?
d. How much testing is enough when you are building a product whose failure could cause loss of human life?
ANSWER: d
RATIONALE: The increased time and expense of completing safety-critical software can draw developers into
ethical dilemmas. One key issue is deciding when sufficient software testing has been performed.
How much testing is enough when you are building a product whose failure could cause loss of
human life? At some point, software developers must determine that they have completed sufficient
testing and then sign off to indicate their approval to release the product. Determining how much
testing is sufficient demands careful decision making.
FEEDBACK: a. One key issue when developing safety-critical software is deciding when sufficient
software testing has been performed.
b. One key issue when developing safety-critical software is deciding when sufficient
Copyright Cengage Learning. Powered by Cognero. Page 60
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
software testing has been performed.
c. One key issue when developing safety-critical software is deciding when sufficient
software testing has been performed.
d. One key issue when developing safety-critical software is deciding when sufficient
software testing has been performed.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Safety-Critical Systems
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.16 - Identify two ethical dilemmas that software developers face when building high-
CTIVES: quality or safety-critical systems.
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/9/2020 12:24 PM
DATE MODIFIED: 1/9/2020 12:31 PM
85. Walter is a developer and part of a team that develops safety-critical systems. He often finds it an ethical challenge to
_____.
a. make the final product more expensive to manufacture or harder to use
b. choose between hardware mechanisms or redundant software to back up critical functions
c. identify what can go wrong and the likelihood and consequences of such occurrences
d. weigh cost and ease of use issues while keeping the system safe and appealing
ANSWER: d
RATIONALE: The increased time and expense of completing safety-critical software can draw developers into
ethical dilemmas. They must carefully weigh cost and ease of use issues in developing a system that is
safe and that also appeals to customers. For example, the use of hardware mechanisms or redundant
software to back up or verify critical software functions can help ensure safe operation. However,
such hardware or redundancy may make the final product more expensive to manufacture or harder
for the user to operate—potentially making the product less attractive than a competitor’s.
FEEDBACK: a. Developers working on safety-critical software must carefully weigh cost and ease of use
issues in developing a system that is safe and that also appeals to customers.
b. Developers working on safety-critical software must carefully weigh cost and ease of use
issues in developing a system that is safe and that also appeals to customers.
c. Developers working on safety-critical software must carefully weigh cost and ease of use
issues in developing a system that is safe and that also appeals to customers.
d. Developers working on safety-critical software must carefully weigh cost and ease of use
issues in developing a system that is safe and that also appeals to customers.
POINTS: 1
DIFFICULTY: Easy
REFERENCES: Safety-Critical Systems
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJE POIS.14e.3.16 - Identify two ethical dilemmas that software developers face when building high-
CTIVES: quality or safety-critical systems.
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/9/2020 12:31 PM
Copyright Cengage Learning. Powered by Cognero. Page 61
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
DATE MODIFIED: 1/9/2020 12:41 PM
Essay
86. Imagine that you are faced with an ethical dilemma at work, and you must determine the "right," or ethical, course of
action. List the five steps you will go through to make this decision, including some of the questions you'll ask yourself at
each step in the process.
ANSWER: Most of us have developed a decision-making process that we execute automatically, without thinking
about the steps we go through. For many of us, the process generally follows these steps: (1) develop
problem statement, (2) identify alternatives, (3) choose an alternative, (4) implement the decision, and
(5) evaluate the results.
(1) Develop a Problem Statement
A problem statement is a clear, concise description of the issue that needs to be addressed. A good
problem statement answers the following questions: What do people observe that causes them to think
there is a problem? Who is directly affected by the problem? Is anyone else affected? How often does
the problem occur? What is the impact of the problem? How serious is the problem?
(2) Identify Alternatives
During this stage of decision making, it is ideal to enlist the help of others to identify several
alternative solutions to the problem. You will especially want to enlist the help of those with first-
hand knowledge of the situation or those who will be affected by the decision. Brainstorming with
others will increase your chances of identifying a broad range of alternatives and determining the best
solution.
(3) Choose an Alternative
Once a set of alternatives has been identified, you must evaluate them based on numerous criteria,
such as effectiveness of addressing the issue, the extent of risk associated with each alternative, cost,
and time to implement.
As part of the evaluation process, weigh various laws, guidelines, and principles that may apply. You
certainly do not want to violate a law that can lead to a fine or imprisonment for yourself or others. Do
any corporate policies or guidelines apply? Does the organizational code of ethics offer guidance? Do
any of your own ethics apply?
Consider the likely consequences of each alternative from several perspectives: What is the impact on
you, your organization, other stakeholders (including your suppliers and customers), and the
environment? Does this alternative do less harm than other alternatives?
(4) Implement the Decision
Once an alternative is selected, it should be implemented in an efficient, effective, and timely manner.
This is often much easier said than done, because people tend to resist change. In fact, the bigger the
change, the greater is the resistance to it. Communication is the key to helping people accept a
change. It is imperative that someone whom the stakeholders trust and respect answer the following
questions: Why are we doing this? What is wrong with the current way we do things? How will the
change benefit us?
(5) Evaluate the Results
After the solution to the problem has been implemented, monitor the results to see if the desired effect
was achieved, and observe its impact on the organization and the various stakeholders. Were the
success criteria fully met? Were there any unintended consequences? Was the implementation poorly
87. Define Internet censorship and explain how it can be imposed at several different points between the speaker and his
or her audience.
ANSWER: Internet censorship is the control or suppression of the publishing or accessing of information on the
Internet. Speech on the Internet requires a series of intermediaries to reach its audience with each
intermediary vulnerable to some degree to pressure from those who want to silence the speaker. Web
hosting services are often the recipients of defamation or copyright infringement claims by
government authorities or copyright holders, demanding the immediate takedown of hosted material
that is deemed inappropriate or illegal. Government entities may pressure “upstream” Internet service
providers to limit access to certain Web sites, allow access to only some content or modified content
at certain Web sites, reject the use of certain keywords in search engine searches, and track and
monitor the Internet activities of individuals.
Several countries have enacted so called three strikes laws that require ISPs to terminate a user’s
Internet connection once that user has received a number of notifications of posting of content deemed
inappropriate or illegal. Censorship efforts may also focus on Domain Name System (DNS) servers,
which convert human-readable host and domain names into the machine-readable, numeric Internet
Protocol (IP) addresses that are used to point computers and other devices toward the correct servers
on the Internet. Where authorities have control over DNS servers, officials can “deregister” a domain
that hosts content that is deemed inappropriate or illegal so that the Web site is effectively invisible to
users seeking access to the site.
RATIONALE: Internet censorship is the control or suppression of the publishing or accessing of information on the
Internet. Speech on the Internet requires a series of intermediaries to reach its audience with each
intermediary vulnerable to some degree to pressure from those who want to silence the speaker. Web
hosting services are often the recipients of defamation or copyright infringement claims by
government authorities or copyright holders, demanding the immediate takedown of hosted material
that is deemed inappropriate or illegal. Government entities may pressure “upstream” Internet service
providers to limit access to certain Web sites, allow access to only some content or modified content
at certain Web sites, reject the use of certain keywords in search engine searches, and track and
monitor the Internet activities of individuals.
Several countries have enacted so called three strikes laws that require ISPs to terminate a user’s
Internet connection once that user has received a number of notifications of posting of content deemed
inappropriate or illegal. Censorship efforts may also focus on Domain Name System (DNS) servers,
which convert human-readable host and domain names into the machine-readable, numeric Internet
Protocol (IP) addresses that are used to point computers and other devices toward the correct servers
Copyright Cengage Learning. Powered by Cognero. Page 64
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
on the Internet. Where authorities have control over DNS servers, officials can “deregister” a domain
that hosts content that is deemed inappropriate or illegal so that the Web site is effectively invisible to
users seeking access to the site.
POINTS: 1
RUBRIC: 0 1 2 3 4
Criteria
Failure Below Expectations Developing Competent Mastery
Defines Internet
censorship
Names the
intermediaries
involved in Internet
speech (Web host
server, upstream ISP,
DNS, and ISP)
Provides examples of
how censorship is
imposed through
each of these
intermediaries
DIFFICULTY: Moderate
REFERENCES: Internet Censorship
QUESTION TYPE: Essay
HAS VARIABLES: False
STUDENT ENTRY Basic
MODE:
LEARNING OBJE POIS.14e.3.12 - Describe the impact of censorship on the operation of Internet service providers.
CTIVES:
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/8/2020 11:38 AM
DATE MODIFIED: 1/8/2020 11:42 AM
88. Define the terms high-quality software system and safety-critical system. How are these types of software related?
ANSWER: A high-quality software system is a system that is easy to learn and use because it performs quickly
and efficiently; it meets its users’ needs; and it operates safely and reliably so that system downtime is
kept to a minimum. A safety-critical system is one whose failure may cause human injury or
death. The safe operation of many safety-critical systems relies on the performance of software.
They are related in that it is essential that safety-critical software systems be free of software defects--
meaning that they should be high-quality software systems. A software defect is any error that, if not
removed, could cause a software system to fail to meet its users’ needs or provide an open door for a
cyberattacker.
RATIONALE: A high-quality software system is a system that is easy to learn and use because it performs quickly
and efficiently; it meets its users’ needs; and it operates safely and reliably so that system downtime is
kept to a minimum. A safety-critical system is one whose failure may cause human injury or
death. The safe operation of many safety-critical systems relies on the performance of software.
They are related in that it is essential that safety-critical software systems be free of software defects--
meaning that they should be high-quality software systems. A software defect is any error that, if
not removed, could cause a software system to fail to meet its users’ needs or provide an open door
for a cyberattacker.
POINTS: 1
DIFFICULTY: Moderate
REFERENCES: Ethical Issues in Developing Quality Software
QUESTION TYPE: Essay
HAS VARIABLES: False
STUDENT ENTRY Basic
MODE:
LEARNING OBJE POIS.14e.3.14 - Distinguish between a high-quality software system and safety-critical system.
CTIVES:
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/8/2020 2:32 PM
DATE MODIFIED: 1/8/2020 2:39 PM
89. Why does the process of building software for safety-critical systems take much longer and cost much more than
building software for high-quality systems?
ANSWER: The process of building software for safety-critical systems takes much longer and is much more
expensive than for high-quality systems for the following reasons:
RATIONALE: The process of building software for safety-critical systems takes much longer and is much more
expensive than for high-quality systems for the following reasons:
POINTS: 1
RUBRIC: 0 1 2 3 4
Criteria
Failure Below Expectations Developing Competent Mastery
Describes three
reasons why safety-
critical systems take
longer and are more
expensive to build
DIFFICULTY: Moderate
REFERENCES: Safety-Critical Systems
QUESTION TYPE: Essay
HAS VARIABLES: False
STUDENT ENTRY Basic
MODE:
LEARNING OBJE POIS.14e.3.15 - Give three reasons why developing a safety-critical system takes longer and is more
CTIVES: expensive.
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/9/2020 11:45 AM
DATE MODIFIED: 1/9/2020 11:48 AM
90. Describe two ethical dilemmas that often confront developers working on safety-critical software.
ANSWER: The increased time and expense of completing safety-critical software can draw developers into
ethical dilemmas. They must carefully weigh cost and ease of use issues in developing a system that is
safe and that also appeals to customers. For example, the use of hardware mechanisms or redundant
software to back up or verify critical software functions can help ensure safe operation. However,
such hardware or redundancy may make the final product more expensive to manufacture or harder
for the user to operate—potentially making the product less attractive than a competitor’s.
Another key issue is deciding when sufficient software testing has been performed. How much testing
is enough when you are building a product whose failure could cause loss of human life? At some
point, software developers must determine that they have completed sufficient testing and then sign
off to indicate their approval to release the product. Determining how much testing is sufficient
demands careful decision making.
RATIONALE: The increased time and expense of completing safety-critical software can draw developers into
ethical dilemmas. They must carefully weigh cost and ease of use issues in developing a system that is
safe and that also appeals to customers. For example, the use of hardware mechanisms or redundant
software to back up or verify critical software functions can help ensure safe operation. However,
such hardware or redundancy may make the final product more expensive to manufacture or harder
for the user to operate—potentially making the product less attractive than a competitor’s.
Another key issue is deciding when sufficient software testing has been performed. How much testing
Copyright Cengage Learning. Powered by Cognero. Page 67
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
is enough when you are building a product whose failure could cause loss of human life? At some
point, software developers must determine that they have completed sufficient testing and then sign
off to indicate their approval to release the product. Determining how much testing is sufficient
demands careful decision making.
POINTS: 1
RUBRIC: 0 1 2 3 4
Criteria
Failure Below Expectations Developing Competent Mastery
Describes two ethical
dilemmas specific to
safety-critical
software
development
DIFFICULTY: Moderate
REFERENCES: Safety-Critical Systems
QUESTION TYPE: Essay
HAS VARIABLES: False
STUDENT ENTRY Basic
MODE:
LEARNING OBJE POIS.14e.3.16 - Identify two ethical dilemmas that software developers face when building high-
CTIVES: quality or safety-critical systems.
KEYWORDS: Bloom's: Remember
DATE CREATED: 1/9/2020 12:42 PM
DATE MODIFIED: 1/9/2020 12:44 PM