You are on page 1of 5

KINGDOM OF SAUDI ARABIA

MINISTRY OF HIGHER EDUCATION


JAZAN UNIVERSITY
COLLEGE OF COMPUTER SCIENCE & INFORMATION SYSTEMS



Academic Year: 1434 / 1435 H
Student ID: Level: 10

FINAL EXAMINATION ANSWER KEY


Term: (Fall / Spring)
Student Name: Section Number: Course Name: Computer Ethics & Society Exam Date: 29-12-2013

Course Code: INFS-452-3 Exam Day: Sunday

Exam Duration: 2 Hours. Start Time: 01:00 pm

Maximum Marks: 40

SECTION A

Qn. No.

MARKS DISTRIBUTION MARKS CONSOLIDATED (IN NUMBERS) MARKS INTERNAL (40)

TOTAL MARKS (In Numbers) (In Words)

FINAL PRACTICAL (20)

FINAL THEORY (40)

FINAL THEORY (40) + FINAL PRACTICAL (20)

TOTAL MARKS (40)


COURSE TEACHER (EVALUATOR)
(Name, Signature & Date)

TOTAL (100) GRADE


: .) 1) .) 2) . ) 3) .) 4)

Instruction for the Students (English): 1) 2) 3) 4) Refer the question paper and write the answers in the same paper. Submit the question paper to the Invigilator after finishing the exam. Bring all your belonging (pen, pencil, eraser, scale, calculator etc.) to the exam hall. Bring your Student ID Card for verification.

COURSE COORDINATOR

TRACK LEADER

QAU EXAMINATION COMMITTEE

(Name, Signature & Date)

(Name, Signature & Date)

(Name, Signature & Date)

SECTION A

(15 MARKS)

Answer 1(a) and 1(b). Each Question carries ONE Mark. 1 (a) Choose the correct answer: (10 Marks)

1) The term morality refers to social conventions about right and wrong those are so widely shared that they become the basis for an established consensus. Ch1 2) Whistle-blowing is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company that threatens the public interest. Ch2 3) Misrepresentation is the misstatement or incomplete statement of a material fact. Ch2 4) Installation of a corporate firewall is the most common security precaution taken by businesses. Ch3 5) Identity theft occurs when someone steals key pieces of personal information to impersonate a person. Ch4 6) Competitive intelligence is legally obtained information that is gathered to help a company gain an advantage over its rivals. Ch6 7) A software defect is any error that, if not removed, could cause a software system to fail to meet its users needs. Ch7 8) Safety-critical software takes much longer to complete and is much more expensive to develop. Ch7 9) Live telemedicine requires the presence of patients and healthcare providers at the same time and often involves a video conference link between the two sites. (ch8) 10) The safety engineer uses a logging and monitoring system to track hazards from a projects start to its finish. Ch7

1 (b) Fill in the Blanks:

(5 Marks)

1) Each society forms a set of rules that establishes the boundaries of generally accepted behavior. (ch1) 2) Fraud is the crime of obtaining goods, services, or property through deception or trickery. (Ch2) 3) A common type of business system is one that captures and records business transactions. (ch7) 4) Telemedicine employs modern telecommunications and information technologies to provide medical care to people who live far away from healthcare providers. (ch8)

5) A trade secret is defined as business information that represents something of economic value, has required effort or cost to develop, has some degree of uniqueness or novelty, is generally unknown to the public, and is kept confidential. (ch6)

SECTION B

(5 x 3 = 15 MARKS)

Answer any FIVE Questions. Each Question carries THREE Marks.


2. What is difference between Morals, Ethics & Laws? (Ch 1)

Morals are ones personal beliefs about right and wrong. The term ethics describes standards or codes of behavior expected of an individual by a group (nation, organization, profession) to which an individual belongs. Law is a system of rules that tells us what we can and cannot do. Laws are enforced by a set of institutions (the police, courts, law-making bodies).

3.

Write down the definitions of Trojan horse and Bot-nets. (Ch. 3)

Trojan Horses A Trojan horse is a program in which malicious code is hidden inside a seemingly harmless program. Botnets A botnet is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners. 4. What is meant by the term Consumer profiling? (ch4)

Companies openly collect personal information about Internet users when they register at Web sites, complete surveys, fill out forms, or enter contests online. Many companies also obtain information about Web surfers through the use of cookies, text files that a Web site can download to visitors hard drives so that it can identify visitors on subsequent visits. This is called consumer profiling.

5.

What is difference between Copy right and Patent? (ch6)

A copyright is the exclusive right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work. A patent is a grant of a property right issued by the United States Patent and Trademark Office (USPTO) to an inventor. 6. What is meant by a Safety Critical System? Give at-least 3 examples. (ch7)

A safety-critical system is one whose failure may cause injury or death. The safe operation of many safety-critical systems relies on the flawless performance of software; such systems control

automobiles antilock brakes, nuclear power plant reactors, airplane navigation, roller coasters, elevators, and numerous medical devices, to name just a few.

7.

Write down different types of Tele-Medicine along with definitions.

(CH8)

Store-and-forward telemedicine involves acquiring data, sound, images, and video from a patient and then transmitting everything to a medical specialist for later evaluation. Live telemedicine requires the presence of patients and healthcare providers at the same time and often involves a video conference link between the two sites.

SECTION C

(2 x 5 = 10 MARKS)

Answer any TWO Questions. Each Question carries FIVE Marks.


8. Write down the key intellectual property issues. Explain any 3 of them. (ch6)

KEY INTELLECTUAL PROPERTY ISSUES This section discusses several issues that apply to intellectual property and information technology, including plagiarism, reverse engineering, open source code, competitive intelligence, and cyber squatting. Plagiarism Plagiarism is the act of stealing someones ideas or words and passing them off as ones own. The explosion of electronic content and the growth of the Web have made it easy to cut and paste paragraphs into term papers and other documents without proper citation or quotation marks. Reverse Engineering Reverse engineering is the process of taking something apart in order to understand it, build a copy of it, or improve it. Reverse engineering was originally applied to computer hardware but is now commonly applied to software as well. Open Source Code Historically, the makers of proprietary software have not made their source code available, but not all developers share that philosophy. Open source code is any program whose source code is made available for use or modification, as users or other developers see fit. Competitive Intelligence Competitive intelligence is legally obtained information that is gathered to help a company gain an advantage over its rivals. For example, some companies have employees who monitor the public announcements of property transfers to detect any plant or store expansions of competitors. Cyber squatting Cyber-squatters registered domain names for famous trademarks or company names to which they had no connection, with the hope that the trademarks owner would eventually buy the domain name for a large sum of money.

9. List down different points to consider while developing safety critical systems. Write in detail about Rigorous Software Development Process related to safety critical systems. (ch7) Consider the following points while developing safety critical systems: 1. International standards 2. Rigorous Software Development Process 3. Project safety engineer 4. Sufficient testing 5. Formal risk analysis 6. Redundancy 7. Human Interface Rigorous Software Development Process Safety-critical software must go through a much more rigorous and time-consuming development process than other kinds of software. All tasksincluding requirement definition, systems analysis, design, coding, fault analysis, testing, implementation, and change controlrequire additional steps, more thorough documentation, and vigilant checking and rechecking. As a result, safety-critical software takes much longer to complete and is much more expensive to develop. 10. What is Tele-work? Write down the advantages and disadvantages of tele-work for organizations. (ch8) Tele-work (also known as telecommuting) is a work arrangement in which an employee works away from the officeat home, at a clients office, in a hotelliterally, anywhere.