1. | Consideration of computer ethics is recognized to have begun with the work of which of the following? a. Joseph Weizenbaum b. Donn B. Parker c. Norbert Wiener d. Walter Maner | | 2. | Which of the following U.S. laws, regulations, and guidelines does not have a requirement for organizations to provide ethics training? a. Federal sentencing guidelines for organizations b. Health Insurance Portability and Accountability Act c. Sarbanes-Oxley Act d. New York Stock Exchange governance structure | | 3. | According to Peter S. Tippett, which of the following common ethics fallacies is demonstrated by the belief that if a computer application allows an action to occur, the action is allowable because if it was not, the application would have prevented it? a. The computer game fallacy b. The shatterproof fallacy c. The hacker's fallacy d. The law-abiding citizen fallacy | | 4. | According to Stephen Levy, which of the following is one of the six beliefs he described within the hacker ethic? a. There must be a way for an individual to correct information in his or her records. b. Thou shalt not interfere with other people's computer work. c. Preserve the value of their systems, applications, and information. d. Computers can change your life for the better. | | 5. | According to Fritz H. Grupe, Timothy Garcia-Jay, and William Kuechler, which of the following represents the concept behind the "no free lunch" rule ethical basis for IT decision making? a. If an action is not repeatable at all times, it is not right at any time. b. Assume that all property and information belong to someone. c. To be financially viable in the market, one must have data about what competitors are doing and understand and acknowledge the competitive implications of IT decisions. d. IT personnel should avoid potential or apparent conflicts