Answer the following statement(s) true (T) or false (F)

1. Ethics is one’s personal beliefs about right and wrong.
2. Morals is a set of beliefs about right and wrong behavior.
3. Laws are enforced by a set of institutions such as the police, courts, and law-making bodies.
4. The First Amendment to the U.S. Constitution was adopted to protect people from unreasonable searches and seizures of properties.
5. The Fourth Amendment to the U.S. Constitution is used to protect the privacy of private employees.


1. FALSE
Ethics is a set of beliefs about right and wrong behavior. Ethical behavior conforms to generally accepted social norms—many of which are almost universally accepted.
2.FALSE
Morals are one’s personal beliefs about right and wrong, whereas the term ethics describes standards or codes of behavior expected of an individual by a group (nation, organization, and profession) to which an individual belongs. For example, the ethics of the law profession demand that defense attorneys defend an accused client to the best of their ability, even if they know that the client is guilty of the most heinous and morally objectionable crime one could imagine.
3.TRUE
Law is a system of rules that tells us what we can and cannot do. Laws are enforced by a set of institutions (the police, courts, law-making bodies). Legal acts are acts that conform to the law.
4.FALSE
The First Amendment to the U.S. Constitution was adopted to guarantee Americans’ rights to freedom of religion, freedom of expression, and freedom to assemble. It reads as follows:
Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press, or the right of the people peaceably to assemble, and to petition the government for a redress of grievances.
5.FALSE
The Fourth Amendment of the Constitution protects citizens from unreasonable searches by the government and is often used to protect the privacy of government employees. The Fourth Amendment cannot be used to control how a private employer treats its employees, however, because such actions are not taken by the government.

Computer Science & Information Technology

You might also like to view...

The classpath consists of a list of directories or archive files, each separated by a ________ on Windows or a ________ on UNIX/Linux/Max OS X.

a. colon (:), semicolon (;). b. semicolon (;), colon (:). c. comma (,), semicolon (;). d. semicolon (;), comma (,).

Computer Science & Information Technology

Which of the following is a good resource for learning more about the threats to your web applications?

a. php My Admin b. MITM c. XSS d. OWASP

Computer Science & Information Technology

A remote access Trojan has the basic functionality of a Trojan but also gives the threat actor unauthorized remote access to the victim's computer by using specially configured communication protocols.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) ____ is an image you can see, store, and manipulate on a computer, tablet, or smartphone.?

A. ?bitmap B. ?graphic C. ?digital graphic D. ?pixel

Computer Science & Information Technology