100UGRD ITE6202 Social and Professional Issues PDF

Title 100UGRD ITE6202 Social and Professional Issues
Course BSIT
Institution ACLC College
Pages 8
File Size 209.8 KB
File Type PDF
Total Downloads 303
Total Views 912

Summary

UGRD-ITE6202 Social and ProfessionalIssuesMorality is enforced by the authority that enacted them and security forcesFalseAs morality is a survival script humans follow daily, it became a general trait that is flexible with different backgrounds.TrueBelieving in human life implies on the belief that...


Description

UGRD-ITE6202 Social and Professional Issues

Morality is enforced by the authority that enacted them and security forces As morality is a survival script humans follow daily, it became a general trait that is flexible with different backgrounds. Believing in human life implies on the belief that life has a purpose and this applies to everyone, whether one believes in a superior deity or an atheist. The two kinds of rules of conduct; Directives which involves the macroethical level and Social policies that involves the microethical level. Time and place influence the context of morality. Determinative Laws fixes ways of acting in accordance with natural law. Legal acts conform to what an individual believes to be the right thing to do. Impartial moral rules are ideally designed to apply equitably to all participants in the system. Since morality is culturally based, individuals are bound to live within the guidelines the society lives with. As humans tend to follow a life script, an individual's reaction to certain rules of conduct is always intentional. Under what condition can data collections become an invasion of privacy? It is the application of data mining techniques to discover patterns from the Web

False True

True

True

True True True

True

True False

sold to the highest bidder

Web Mining

It is an invasion of privacy by wrongful entry, seizing, or acquiring possession of the property of others It is the core of human dignity and autonomy If the codes of conduct focuses on rules and guidelines, autonomy focuses on One of the contributing factors in the cause of violations is when consumers lack the ethics of how what they consider a little bit of information can turn into a big invasion of privacy There are different strands of information to be protected, which does not belong to a group: It involves the indirect gathering of personal information through an analysis of implicit patterns discoverable in data. Individuals whose data are mined cannot be identified with or linked to certain newly created groups. The danger with information matching is that no one knows who will use the built profiles from the matched information and where it will be used The danger with information matching is that everyone knows who will use the built profiles from the matched information and where it will be used Which is not true about the word profession? Ethics is defined as a field of inquiry whose subject is human actions and these human actions are called Rules that guides individual actions such as not taking the possessions of others are called In order for professions and trades to uphold essential requirements, integrity, commitment, and professional codes of conduct must be met. A provider of service should first inquire the customer before an action

Intrusion

Privacy Violations power balance

True

Employment Information

Data Mining

False

False

True

In the early times there is little distinction between manual and intellectual groups. Human conduct

Directives

False

of service should be done. This statement shows _______. It takes part in building character traits in people. Which is true about Morality?

The moral concept of whistle-blowing is good when the activities involved pose serious danger and harm to human life The decision-making process is developed that individuals tend to execute automatically without thinking about the steps that go through. The step that involves others in brainstorming is __________. Determinative Laws fixes ways of acting in accordance with natural law. This theory states that ethical statements cannot be proven and are really only statements about how someone feels. Even with long years of experience, skills based on shallow knowledge of the field could be damaging to the profession This is another term for large commercial databases It is when an action is right if the consequences of that action are favorable to all except the actor It is an interpretation is done based on a system that uses a process of argumentation consisting of a mixture of inductions and deductions Harassment is a form of discrimination and it mainly involves making decisions that negatively affect an individual. It is when ethical reasoning remained the same even with the evolution of ethical discipline. For formal education to be effective in teaching and enforcing the pillars of professionalism it must be _________

Morality

It does not involve special knowledge that can be understood only by privileged individuals True

Identify Alternatives

True emotivism

False

Web Mining

Altruism

ethical theories

False

Emotivism Incremental

Ethical decision making is the process of making a decision which may result in one or more moral conflicts while ethical reasoning is when ethical principles is integrated in the reasoning process It is a human cognitive process of looking for ways to generate or affirm a proposition It comes from an enforceable part of the moral code that differs with each society and culture. It is developed over a period of time based on either the religion or culture of the indigenous people in the area. It is a system created by and for human beings usually in public deliberations like a council of elders or representatives in national legislatures. Listening in to other people's conversations is an example of what privacy violation? It is an act of seeking public attention to what is considered an illegal or mismanaged act It is an unwritten law that holds our rights of self-preservation Which of the following does not describe the word ethics? Professional Codes of Conduct addresses the following except: A man who did something to help others but it is against his will is not considered good. This is an example of _________. One of the contributing factors in the cause of violations is when consumers lack the knowledge of how what they consider a little bit of information can turn into a big invasion of privacy Individuals whose data are mined can become identified with or linked to certain newly created groups. Which is true about Licensing Authorities. I. Before a license is issued an

False

Reasoning

Conventional law

Community Code

Conventional Law

Intrusion

whistle-blowing

Natural Law

the study of right and wrong in human conduct Confidentiality and Commitment Deontology

False

False I, II, & III

individual must be tested. II. Violation of the rules from the licensing authority may lead to recalling of the license III. After the test, the licensing authority may deny issuing the license It is when laws are used to resolve interpersonal conflicts in a society. The primary purpose of professional code of ethics is to promote the public image of the profession by specifying and enforcing the ethical behavior expected from its members According to this theory actions are judged according on the results. For example, a person kills one person to prevent the deaths of others. These are guidelines that state the dos and dont's of a professional that protects individual members and their image. Morality is enforced by the authority that enacted them and security forces With the relationship between the provider and receiver of the service/product present, a power play may sometimes be in favor of the provider not the receiver Sensors, Security Lighting and Natural Trees E-mail Fraud Encryption and Authentication Witness Protection Coded Messages Rootki t No Identity Preventing of unauthorized disclosure of information Secret-key Encryption Digital Signature

Conflict Resolution True

Consequentialism

Professional Code

True False

Physical Security Barriers Phishing Information Security Pseudo Identity Cryptography Exploits Anonymity Confidentiality Symmetric Encryption Authentication

shapes and colors adaptations creative works reckless hindering inventions computer programs reckless alteration unauthorized ways reclusion and isolation unauthorized access Which statement is true about Artificial Intelligence? I. Artificial intelligence studies concentrate on a limited number of areas II. Artificial intelligence is bounded to the potential of solving real life problems The human errors in coding can be sometimes referred to as Humans are not perfect; they are emotional, biased, easily manipulated and easily bored beings. Machines, however, don‘t have any of these problems. AIs have the capacity to perform better than the world best experts at many tasks already and are making the world healthier Human Nature can result to a bias environment that AIs might learn from. AIs are able to automating parts of people‘s jobs and it wont affect the employment rate in a company The data that the AI technology is using to train and learn mostly coveres all the aspect of human behavior An AI can achieve its goal without going through consequences AIs are software programs that are vulnerable to attack just like all software Determining customer behavior and preferences. The short text messages in Twitter are

Trademark Derivative Works Copyright System Interference Patents Original Works Derivative Works Cyberpiracy Psychological Effects Cybertrespass Both Statements are True

Things can go wrong

Safety

Performance

True

True

False

True True

Cheap tweets

called It is the data left behind by users of electronic media Which of the following is a purpose of a social networking web site? I. Breakdown the barriers of distance and time II. Bridge cultural differences III. Create an online community IV. Social Interaction It is a messaging social platform that enables a user to chat with friends by using pictures It is the harassment, torment, humiliation, or threatening of one minor by another minor or group of minors via the Internet or cell phone It enables an individual to capture life's best moments with thier phone’s camera or any other camera, and convert them into works of art. Its goal is to create a buzz about a product or idea that spreads wide and fast It is threatening behavior or unwanted advances directed at an adult using the Internet or other forms of online and electronic communications It has been linked to depression, selfinjurious behaviors, sleep disturbances, increased alcohol and tobacco use, and obesity As the social network grows, it tends to lose the nuances of a local system. So in order to maintain the qualities of network properties, one must take note of the size.

Sleep Deprivation

IV, I

Snapchat

Cyberbullying

Instagram

Viral Making

Cyberstalking

Internet Addiction

True...


Similar Free PDFs