Cyberethics (Ethics for the information age) Comprehensive Exam || With Questions & Solutions (Expert Rated A+)
5 views 0 purchase
Course
Cyberethics
Institution
Cyberethics
Cyberethics (Ethics for the information age) Comprehensive Exam || With Questions & Solutions (Expert Rated A+)
Cyberethics (Ethics for the information age) Comprehensive Exam || With Questions & Solutions (Expert Rated A+)
According to the author, why is there good reason to say we are living ...
,Cyberethics (Ethics for the information
age) Comprehensive Exam || With
Questions & Solutions (Expert Rated A+)
1. According to the author, why is there good reason to say we are living in the
Information
Age? - ANSWER - According to the author, there is good reason to say we are living
in the Information
Age because computer and communication technologies have made it easy to
collect,
store, manipulate, and distribute vast amounts of information.
4. Why did commercial mechanical calculators become practical in the nineteenth
century? - ANSWER - Commercial mechanical calculators became practical in the
late nineteenth century
because advances in machine tools and mass-production methods made it possible
to
manufacture reliable devices at a reasonable price
6. What factors helped the Burroughs Adding Machine Company to surpass a large
number
of competitors to become the most successful calculator company by the 1890s? -
ANSWER - The Burroughs Adding Machine Company surpassed its competitors by
combining an
excellent product with excellent marketing.
Describe the principal aspects of cyberethics as a field of philosophical ethics -
ANSWER - study of social impact, concerned with justification of social policies
how is Phillip Brey's "disclosive method" of computer ethics different from what Brey
calls "mainstream computer ethics" - ANSWER - discloses morally nontransparent
features, and practices
Why does Moor believe that cyber technology poses special problems for identifying
and analyzing ethical issues? - ANSWER - Believes cybertech poses special
problems because generates policy vacuums that may involve conceptual muddles
and computers are logically maleable
What is meant by a moral system? (hint 4 features of Gerts model)? - ANSWER -
public, informal rational, and impartial
What are the basic differences seperating ethicists from moralists? - ANSWER -
Moralists are know it alls and may have a moral agenda, Ethicists look at ethics in a
logical way and remain open.
Summarize each of the four different kinds of "discussion stoppers? that may often
arise in ethical discourse. - ANSWER - People disagree on solutions to moral issues
, Who am I to judge others
its a private matter
up to culture to decide
What is the essential difference between an argument that s valid and one that is
invalid? Construct an example of each. - ANSWER - valid=premises are assumed
true, conclusion must be true
invalid=premise is true but can imagine case where conclusion is false
valid- ceo=high school grad
bille gates is ceo
bill gates graduated high school
invalid- x pc has the best specs
x must be the best computer
When is a valid argument unsound? Construct an example of an unsound argument.
- ANSWER - Valid argument is unsound when one or more premises are not true in
real world.
iphone users are smarter
my roommate owns an iphone
i own a droid
my roommate is smarter
What differentiates invalid arguments that are inductive from invaliid arguments that
are fallacious? Construct an example of each. - ANSWER - assuming premises are
true inductive arguments conclusion is likely true. A fallacious argument is unlikely to
even follow premise.
inductive 99% percent of all a's are b's
x=a
conclusion x=b
fallacious-
x is authority in y
x said z
conclusion - z
Do computer/IT professionals have special moral responsibilities that ordinary
computer users do not have? - ANSWER - Yes, They have a unique ability to do
good or to cause harm. Also develop safety critical systems
How is safety critical software defined by Kevin Bowyer? - ANSWER - Safety critical
software is directly affecting life critical systems..i.e mass transit, air traffic control,
nuclear reactors, missle systems, medical treatment systems
What exactly is whistleblowing? What are the key elements in John Boatrights
definition of whistle blowing? - ANSWER - voluntary release of nonpublic info.
key elements-
nonpublic
voluntarily disclosed
presented to an appropriate audience
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller conceptialresearchers. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.99. You're not tied to anything after your purchase.