The theory of ____ promotes tolerance.

A. Act Utilitarianism
B. Cultural Relativism
C. Divine Command
D. Deontological Ethics


Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following is a word, phrase, or image that is programmatically configured to connect to another document, bookmark, or location?

A) Hyperlink B) Log C) Relay D) Metadata

Computer Science & Information Technology

Internet access that exceeds 25 Mbps as defined by the FCC.

A. Broadband B. Internet backbone C. Web 2.0

Computer Science & Information Technology

The safe module operation ____ returns a glob reference for the symbol table entry of VARNAME in the package of the compartment.

A. reval (STRING) B. deny_only (OP, ...) C. share (NAME, ...) D. varglob (VARNAME)

Computer Science & Information Technology

Which of the following statements is false?

a. Experience has shown that the best way to develop and maintain a large pro-gram is to construct it from a small number of large, proven pieces—this tech-nique is called divide and conquer. b. Using existing functions as building blocks for creating new programs is a key aspect of software reusability—it’s also a major benefit of object-oriented programming. c. Packaging code as a function allows you to execute it from various locations in your program just by calling the function, rather than duplicating the possibly lengthy code. d. When you change a function’s code, all calls to the function execute the up-dated version.

Computer Science & Information Technology