1.
An ethical ______ is when one's responsibilites seem to lead in opposite directions.
A. 
B. 
C. 
D. 
2.
____- are the principles and standards that guide our behavior toward other people.
A. 
B. 
C. 
D. 
3.
At the innermost middle ring of your ethical structure you are faced with very serious ethical ________.
A. 
B. 
C. 
D. 
4.
With respect to the circumstances that surround making an ethical decision, your preception of how many people will be affected by your intended action is called ______.
A. 
B. 
C. 
D. 
5.
With respect to the circumstances that surround making an ethical decision, _____ refers to the probability of the harm or benefit that will occur if you take an action.
A. 
B. 
C. 
D. 
6.
With respect to the circumstances that surround making an ethical decision, _____ is the length of time it will take for the benefit or harm to take effect.
A. 
B. 
C. 
D. 
7.
With respect to the circumstances that surround making an ethical decision, how much you identify with the person or persons who will receive the benefit or suffer the harm of your actions is termed _____.
A. 
B. 
C. 
D. 
8.
With respect to the circumstances that surround making an ethical decision, _____ refers to how much or how little benefit or harm will come from a particular decision.
A. 
B. 
C. 
D. 
9.
With respect to the circumstances that surround making an ethical decision, your perception of what society thinks of your intended action is called _____.
A. 
B. 
C. 
D. 
10.
_____ is intangible creative work that is embodied in physical form.
A. 
B. 
C. 
D. 
11.
_____ is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents.
A. 
B. 
C. 
D. 
12.
_____ law protects an idea.
A. 
B. 
C. 
D. 
13.
The _____ says that you may use copyrighted material in certain situations — for example, in the creation of new work or, within certain limits, for teaching purposes.
A. 
B. 
C. 
D. 
14.
_____ software is the unauthorized use, duplication, distribution or sale of copyrighted software.
A. 
B. 
C. 
D. 
15.
_____ is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
A. 
B. 
C. 
D. 
16.
Many Web sites are offering programs, collectively referred to as _____, to help people monitor what's happening on a computer
A. 
B. 
C. 
D. 
17.
_____ is a program, that when installed on a computer, records every keystroke and mouse click.
A. 
B. 
C. 
D. 
18.
A(n) _____ program captures screen images
A. 
B. 
C. 
D. 
19.
A(n) _____ examines information passing through switches, hubs, or routers.
A. 
B. 
C. 
D. 
20.
_____ occurs when someone forges your identity for fraudulent purposes.
A. 
B. 
C. 
D. 
21.
_____ is a technique used to gain personal information for the purpose of identity theft.
A. 
B. 
C. 
D. 
22.
_____ is a technique which reroutes your request for a legitimate Web site to a fake site that collects information from you.
A. 
B. 
C. 
D. 
23.
_____ is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.
A. 
B. 
C. 
D. 
24.
A(n) _____ is a small record deposited on your hard disk by a Web site containing information about you and your Web activities.
A. 
B. 
C. 
D. 
25.
_____ cookies start out as a unique cookie, but the original site sold access to it to a third party that can then change the cookie and track the surfer's activity across many sites.
A. 
B. 
C. 
D.