You are on page 1of 28

better than poetry.

Select one:
a.
Thomas Hobbes

b.
Jeremy Bentham

c.
John Stuart Mill

d.
Plato
This is known as moral philosophy. It seeks to address questions of morality: right vs. wrong,
good vs. bad, etc.

Select one:
a.
Consequentialism

b.
Professionalism

c.
Ethics

d.
Egoism
Jeremy Bentham's advice on pursuing pleasure is called ______________.

Select one:
a.
Purity

b.
Propinquity

c.
Fecundity

d.
Calculus of Felicity
It breaks down even further into two subcategories: necessary (food, sleep, etc.) and
unnecessary (sexual desires, etc.)

Select one:
a.
Utilitarianism

b.
Vain Desire

c.
Natural Desire

d.
Hedonism
He is the father of utilitarianism.

Select one:
a.
Epicurus

b.
Thomas Hobbes

c.
Jeremy Bentham

d.
Plato
It argues that every act is motivated by self-interest. Humanity doesn’t have a choice – we
simply operate this way.

Select one:
a.
Plato's Egoism

b.
Moral Egoism

c.
Egoism

d.
Psychological Egoism
He sought to rewrite utilitarianism in such a way that he would be able to demonstrate that
Shakespeare outranked push-pins.

Select one:
a.
Plato

b.
John Stuart Mill
c.
Jeremy Bentham

d.
Thomas Hobbes
This theory asserts that the empirical consequences of any given act have nothing to do with
the moral worth of the act.

Select one:
a.
Consequentialism

b.
Ethics

c.
Egoism

d.
Non-consequentialist
It is a theory of moral philosophy that is based on the principle that an action is morally right
if it produces a greater quantity of good or happiness than any other possible action.

Select one:
a.
Natural Desire

b.
Hedonism

c.
Vain Desire

d.
Utilitarianism

He claimed that no act should be undertaken except for the pleasure which results, and no
act should be rejected but for the pain it produces.

Select one:
a.
Epicurus

b.
Jeremy Bentham

c.
Thomas Hobbes

d.
Plato
May be decentralized (perhaps temporarily) so that lower level managers can make more
decisions.

Select one:
a.
Ethical Performance

b.
Ethical Standards

c.
Centralized Organization

d.
Decentralized Organization
Orientation that focuses more on an abstract core of ideals such as respect and responsibility

Select one:
a.
Values Orientation

b.
Compliance Orientation

c.
Strong Ethics

d.
Ethical Programs

Software engineering managers and leaders shall subscribe to and promote an ethical
approach to the management of software development and maintenance.

Select one:
a.
judgment

b.
profession

c.
management

d.
colleagues
Software engineers shall act consistently with the ______________ interest.

Select one:
a.
public

b.
client and employer

c.
management

d.
product
May be centralized (perhaps temporarily) so that top level managers can ensure that ethical
decisions are made.

Select one:
a.
Centralized Organization

b.
Ethical Standards

c.
Ethical Performance

d.
Decentralized Organization
In what year did IEEE endorse “Canons of Ethics of Engineers” after AIEE/IRE merger?

Select one:
a.
1912

b.
1974

c.
1990

d.
1963
This represents employee ethics with formal statements that describe what an organization
expects of its employees.

Select one:
a.
Strong Ethics

b.
Codes of Conduct

c.
Statement of Values

d.
Codes of Ethics

In what year did the Board fo Directors approve the revision to the IEEE Code of Ethic?

Select one:
a.
2002

b.
1963

c.
1912

d.
2006
These are formal statements of what an organization expects in the way of ethical behavior.

Select one:
a.
Strong Ethics

b.
Codes of Conduct

c.
Statement of Values

d.
Codes of Ethics
In what year did the Board of Directors approve the simplified IEEE Code of Ethics?

Select one:
a.
1912

b.
1990

c.
1974

d.
1963
This theory asserts that the empirical consequences of any given act have nothing to do with
the moral worth of the act.

Select one:
a.
Ethics

b.
Consequentialism

c.
Non-consequentialist

d.
Egoism
May be centralized (perhaps temporarily) so that top level managers can ensure that ethical
decisions are made.

Select one:
a.
Ethical Performance

b.
Decentralized Organization

c.
Centralized Organization

d.
Ethical Standards

It includes things such as decorative clothing, exotic foods, etc.

Select one:
a.
Vain Desire

b.
Utilitarianism

c.
Hedonism

d.
Natural Desire

May be decentralized (perhaps temporarily) so that lower level managers can make more
decisions.

Select one:
a.
Decentralized Organization

b.
Ethical Standards

c.
Centralized Organization

d.
Ethical Performance
This serves the general public and addresses stakeholder interests.

Select one:
a.
Codes of Conduct

b.
Statement of Values

c.
Strong Ethics

d.
Codes of Ethics

This is known as moral philosophy. It seeks to address questions of morality: right vs. wrong,
good vs. bad, etc.

Select one:
a.
Professionalism

b.
Egoism

c.
Ethics
d.
Consequentialism
Software engineers shall act in a manner that is in the best interests of their _________
consistent with the public interest.

Select one:
a.
public

b.
product

c.
client and employer

d.
management
It breaks down even further into two subcategories: necessary (food, sleep, etc.) and
unnecessary (sexual desires, etc.)

Select one:
a.
Natural Desire

b.
Vain Desire

c.
Utilitarianism

d.
Hedonism
In what year did Board of Directors approve “IEEE Code of Ethics for Engineers”?

Select one:
a.
1963

b.
1912

c.
1974

d.
1990
Software engineering managers and leaders shall subscribe to and promote an ethical
approach to the management of software development and maintenance.

Select one:
a.
management

b.
profession

c.
judgment

d.
colleagues
These are often established by professional organizations to help guide members in
performing their job functions according to sound and consistent ethical principles.

Select one:
a.
Amateur Ethics

b.
Code of Ethics

c.
Immature Ethics

d.
Professional Ethics
Orientation that requires that employees identify with and commit to specified conduct.

Select one:
a.
Strong Ethics

b.
Compliance Orientation

c.
Values Orientation

d.
Ethical Programs

In what year was IEEE Code of Ethics adopted by the American Institute of Electrical
Engineers (AIEE)?
Select one:
a.
1974

b.
1912

c.
1963

d.
1990
This represents employee ethics with formal statements that describe what an organization
expects of its employees.

Select one:
a.
Strong Ethics

b.
Statement of Values

c.
Codes of Conduct

d.
Codes of Ethics

Orientation that focuses more on an abstract core of ideals such as respect and responsibility

Select one:
a.
Ethical Programs

b.
Strong Ethics

c.
Values Orientation

d.
Compliance Orientation
In what year did IEEE endorse “Canons of Ethics of Engineers” after AIEE/IRE merger?

Select one:
a.
1990
b.
1974

c.
1912

d.
1963
These are formal statements of what an organization expects in the way of ethical behavior.

Select one:
a.
Statement of Values

b.
Codes of Conduct

c.
Codes of Ethics

d.
Strong Ethics
He believed no one would knowingly operate against their best interests, and those that did
were clearly ignorant of what their best interests were.

Select one:
a.
Thomas Hobbes

b.
Plato

c.
Jeremy Bentham

d.
Epicurus

Jeremy Bentham's advice on pursuing pleasure is called ______________.

Select one:
a.
Propinquity

b.
Fecundity
c.
Calculus of Felicity

d.
Purity
Software engineers shall ensure that their __________ and related modifications meet the
highest professional standards possible.

Select one:
a.
client and employer

b.
management

c.
public

d.
product
He claimed that no act should be undertaken except for the pleasure which results, and no
act should be rejected but for the pain it produces.

Select one:
a.
Plato

b.
Thomas Hobbes

c.
Jeremy Bentham

d.
Epicurus
Software engineers shall maintain integrity and independence in their professional
__________.

Select one:
a.
judgment

b.
colleagues

c.
management
d.
profession
It argues that every act ought to be motivated by self-interest. It concludes that acting in
self-interest is the best motivator.

Select one:
a.
Moral Egoism

b.
Plato's Egoism

c.
Psychological Egoism

d.
Egoism
He is the father of utilitarianism.

Select one:
a.
Plato

b.
Jeremy Bentham

c.
Epicurus

d.
Thomas Hobbes
It is a theory of moral philosophy that is based on the principle that an action is morally right
if it produces a greater quantity of good or happiness than any other possible action.

Select one:
a.
Hedonism

b.
Vain Desire

c.
Utilitarianism

d.
Natural Desire
He is concerned that a utilitarian might actually conclude that a game of push-pin really was
better than poetry.

Select one:
a.
Jeremy Bentham

b.
Thomas Hobbes

c.
John Stuart Mill

d.
Plato
He sought to rewrite utilitarianism in such a way that he would be able to demonstrate that
Shakespeare outranked push-pins.

Select one:
a.
Jeremy Bentham

b.
Thomas Hobbes

c.
Plato

d.
John Stuart Mill
It argues that every act is motivated by self-interest. Humanity doesn’t have a choice – we
simply operate this way.

Select one:
a.
Plato's Egoism

b.
Egoism

c.
Psychological Egoism

d.
Moral Egoism
In what year did the Board of Directors approve the simplified IEEE Code of Ethics?

Select one:
a.
1990

b.
1963

c.
1974

d.
1912
It is a program that creates the firm's ethical climate and helps ensure that all employees
understand the organization's values and comply with the policies and codes of conduct.

Select one:
a.
Ethical Programs

b.
Values Orientation

c.
Compliance Orientation

d.
Strong Ethics
One of the responsibilities of a compliance officer is to suggest contents for the code of
ethics for approval of a higher official.

Select one:
True

False
The step in implementing a code wherein a procedure is conducted for managers and
supervisors regularly to state that they and their staff understand and apply the provisions of
the code.
affirmation
Answer:
Check

An area in the Code of Ethics that emphasizes the importance of customer satisfaction and
good faith in all agreements, quality, fair pricing and after-sales service.

Select one:
a.
Shareholders

b.
Assurance, reporting and reviews

c.
Society or the wider community

d.
Customer Relations
A statement that highlights an organization's key ethical issues and identifies the
outstretching values and principles that are important to the organization and its decision
making.
code of ethics
Answer:
Check

Ethics training must increase the percentage of employees reporting incidents of


misconduct.

Select one:
True

False
A copy of the code must be inserted in the Annual Report for the shareholders and the
public to know about the company's position regarding ethical matters.

Select one:
True

False
The Code of Ethics would be effective if distributed as an executive mandate.

Select one:
True

False
Check

A method wherein an organization reviews how well it is meeting its new goals for the
upcoming year.
social audit
Answer:
Check

This one provides an organization with vision and leadership in the area of business conduct.
corporate ethics officer
Answer:
Check
A step in implementing a Code of Ethics wherein employees and others need to be aware of
the consequences of breaching the code.
enforcement
Answer:
Check

This can be defined as the application of classical ethical principles to the use of computer
technology.
computer ethics
Answer:
Check

Anything you post online via social networks is temporary. You may delete it at any time and
any traces will be removed completely from the website.

Select one:
True

False
They possess great power in the corporate world. They have the ability to spy on fellow
employees as they can see the websites employees are visiting, monitor employee emails
and online chats, view data on personal computers connected to the corporate network and
much more.

Select one:
a.
Black hat hackers

b.
White hat hackers

c.
Auditor

d.
System administrator
When a patch is not aptly tested, problems arise.

Select one:
True

False
This involves controlling an integrated computer system and maximizing performance and
productivity of that system.
networking
Answer:
Check
The daily responsibilities of the administrator such as monitoring the system, managing
users and passwords, allocating system resources and installations.
system administration
Answer:
Check

They are responsible for finding vulnerabilities. They also have their own set of moral issues
to address when reversing engineering products for the protection purposes of discovering
vulnerabilities.

Select one:
a.
Auditor

b.
Black hat hackers

c.
System administrator

d.
White hat hackers

Disclosing referral fees to the client is up to the executive's decision.

Select one:
True

False
Performing shortcuts when implementing a new system is not always a good idea, but
unfortunately, sometimes it is necessary in order to meet aggressive time constraints.

Select one:
True

False
A crucial process for determining system integrity and business practice integrity.
audits
Answer:
Check

The process of broadly disseminating as much information as possible regarding product or


system vulnerabilities so that potential victims possess the same information as the potential
hackers.

Select one:
a.
Ethical duty to warn

b.
Full disclosure

c.
Nondisclosure policy

d.
Limited disclosure

Having this policy within a company means that whomever signs the nondisclosure
agreement agrees to keep the vulnerability information within that organization tightly
contained so that no one outside of the organization, especially the general public, ever
learns of the existence of product vulnerabilities.

Select one:
a.
Ethical duty to warn

b.
Full disclosure

c.
Nondisclosure policy

d.
Limited disclosure
In developing a code of ethics, always disregard anonymous reports.

Select one:
True

False
Performing shortcuts when implementing a new system is not always a good idea, but
unfortunately, sometimes it is necessary in order to meet aggressive time constraints.

Select one:
True

False
This one provides an organization with vision and leadership in the area of business conduct.
corporate ethics officer
Answer:
Check
This is one way which an organization can demonstrate its values in action and to make a
positive connection with its stakeholders. This is demonstrated by socially responsible
activities towards the community.
philanthropy
Answer:
Check

The daily responsibilities of the administrator such as monitoring the system, managing
users and passwords, allocating system resources and installations.
system administration
Answer:
Check

A step in implementing a Code where copies of the code are made available to business
partners including suppliers and customers and expect their compliance.
distribution
Answer:
Check

The step in implementing a code wherein a procedure is conducted for managers and
supervisors regularly to state that they and their staff understand and apply the provisions of
the code.
affirmation
Answer:
Check

A statement that highlights an organization's key ethical issues and identifies the
outstretching values and principles that are important to the organization and its decision
making.
code of ethics
Answer:
Check

This involves controlling an integrated computer system and maximizing performance and
productivity of that system.
networking
Answer:
Check

A crucial process for determining system integrity and business practice integrity.
audits
Answer:
Check

A method wherein an organization reviews how well it is meeting its new goals for the
upcoming year.
social audit
Answer:
Check

Ethics training must increase the percentage of employees reporting incidents of


misconduct.

Select one:
True

False
A key area in code of ethics that is the process by which the code is issued and a means to
obtain advice on potential breaches.
implementation
Answer:
Check

The Code of Ethics would be effective if distributed as an executive mandate.

Select one:
True

False
The process of broadly disseminating as much information as possible regarding product or
system vulnerabilities so that potential victims possess the same information as the potential
hackers.

Select one:
a.
Nondisclosure policy

b.
Ethical duty to warn

c.
Full disclosure

d.
Limited disclosure
One of the responsibilities of a compliance officer is to suggest contents for the code of
ethics for approval of a higher official.

Select one:
True

False
Having this policy within a company means that whomever signs the nondisclosure
agreement agrees to keep the vulnerability information within that organization tightly
contained so that no one outside of the organization, especially the general public, ever
learns of the existence of product vulnerabilities.

Select one:
a.
Limited disclosure

b.
Nondisclosure policy

c.
Ethical duty to warn

d.
Full disclosure
A copy of the code must be inserted in the Annual Report for the shareholders and the
public to know about the company's position regarding ethical matters.

Select one:
True

False
Check

When a patch is not aptly tested, problems arise.

Select one:
True

False
Disclosing referral fees to the client is up to the executive's decision.

Select one:
True

False
Allowing the destruction of discoverable evidence is legal if approved by a higher official.

Select one:
True

False
A cyberattack wiped the data from hard drives of computers in banks in South Korea. The
attack came from an email mimicking a South Korean bank. What type of identity theft scam
did they do?

Select one:
a.
Con Artists and Email Questionnaires
b.
Account Verification or "Phisher" exams

c.
"Find Out Everything on Anyone" Scams
A teenager requests for money from random people because of an email he received
containing instructions on how to make cash in the next few weeks. This scam is done in the
form of _______________.

Select one:
a.
Monetary Gain

b.
Identity theft

c.
Chain Letter
This reveals surprisingly detailed information that is significantly private. It is suggested that
you keep this practice limited to authorized investigations and legitimate troubleshooting in
order to preserve the users' expectation of privacy, as defined by company policy.
traffic analysis
Answer:
Check

The main job of the postmaster is to retrieve an email from the legitimate sender to the
legitimate receiver.

Select one:
True

False
A key player in information technology who is responsible for all of the data within a
corporation.

Select one:
a.
Database Administrator

b.
Coder

c.
Social Audit

d.
Computer Programmer
hese are considered significant security risk, but not being able to get into an application is a
serious development issue when a problem arises.

Select one:
a.
Database Administrator

b.
Data Forecasting

c.
Data Modelling

d.
Using Back Doors
The process of stealing a domain name from another entity.

Select one:
a.
Trojan horses

b.
Domain hijacking

c.
Computer virus

d.
Cable modem hacking
What type of coding practice should be done when operating systems are upgraded?

Select one:
a.
Ethical Use of System Resources

b.
Staying Current with Coding Practices

c.
Correct Use of Memory

d.
Redoing Code Due to Management Changes
What type of coding practice emphasises the importance of the allocation and use of
memory for programmers?

Select one:
a.
Correct Use of Memory

b.
Ethical Use of System Resources

c.
Redoing Code Due to Management Changes

d.
Staying Current with Coding Practices

The process of using historical data to predict the future. This type of technology is used for
purchasing inventory, stock predictions, sales predictions and overall business assessments.

Select one:
a.
Domain Hijacking

b.
Data Modelling

c.
Using Back Doors

d.
Data Forecasting
This coding practice is done when the deadlines imposed on programmers force them to
find the best possible solution somewhere in the middle.

Select one:
a.
Ethical Use of System Resources

b.
Correct Use of Memory

c.
Staying Current with Coding Practices

d.
Pseudo Code
This type of coding is done to have minimum reworking to do at the testing phase.

Select one:
a.
Code Design

b.
Code Review

c.
Database Administrator

d.
Data Forecasting

This type of coding is done to have minimum reworking to do at the testing phase.

Select one:
a.
Code Design

b.
Code Review

c.
Database Administrator

d.
Data Forecasting

This process checks the basic vulnerabilities of the program. These tests probe and attempt
to penetrate the security of the program and system in which it is running.

Select one:
a.
Code Review

b.
Code Design

c.
Database Administrator

d.
Data Forecasting
This aims to check applications, databases, networks, remote computing resources, and any
other system connected to the business that is vulnerable.
penetration testing
Answer:
Check

The process of collecting data about a person using false pretenses.


pretexting
Answer:
Check

Write TRUE or FALSE in the space provided.


Employers should search an employee's personal effects for the purpose of searching for any
suspicious conversations and unnecessary use of social media.
false
Answer:
Check

Amazon enables users to set and manage parental controls connected to devices used by
children such as Kindle. For example, a parent may opt to set a PIN on Purchase to authorize
purchases and rentals. This is an example of what kind of ethical dilemma in privacy?
parental surveillance
Answer:
Check

Write TRUE or FALSE in the space provided.


National security and individual privacy are both critical and important to consider.
true
Answer:
Check

You might also like