0% found this document useful (0 votes)
54 views

9608/11/o/n/15 © Ucles 2015

The document discusses a case study involving Paul who works part-time for a large software company that produces bank security software and also runs his own software company producing computer games. It then provides six statements and asks the reader to determine whether each describes ethical or unethical behavior. It also includes questions about software licensing types and the ACM/IEEE Software Engineering Code of Ethics.

Uploaded by

Riaz Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views

9608/11/o/n/15 © Ucles 2015

The document discusses a case study involving Paul who works part-time for a large software company that produces bank security software and also runs his own software company producing computer games. It then provides six statements and asks the reader to determine whether each describes ethical or unethical behavior. It also includes questions about software licensing types and the ACM/IEEE Software Engineering Code of Ethics.

Uploaded by

Riaz Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

QUESTION 1.

4 Paul works part-time for a large software company. The company sells security software to
a number of banks. He also runs his own software company that produces and sells computer
games.

Six statements about computer ethics are shown below.

Draw lines to indicate whether each statement describes ethical or unethical behaviour.

Statement

To save time, Paul fakes the test results


when testing the bank security software.

Paul uses the software developed in his


day job to help write some of the games
software routines.

Ethical

To allow him to concentrate on his games


software, Paul has frequently turned down
job opportunities in his day job.

To make the games software more


realistic, Paul uses password protection
code used in the bank security software.

Unethical
Because his work load is increasing, Paul
is now using overseas companies to write
some of the routines used in his games
software.

Paul carries out training on how to write


games software in his spare time.

[6]

© UCLES 2015 9608/11/O/N/15 [Turn over


QUESTION 2. 7

5 Three types of software licensing and four descriptions are shown in the table below.

Put a tick (✓) in each row to match each description to the appropriate type of software licensing.

Type of software

Description Open source Shareware Commercial

Software is purchased
before it can be used
Source code comes with
the software
Software is provided free
on a trial basis

The software can be


modified by the user

[4]

6 A team of software engineers is developing a new e-commerce program for a client.

State three of the principles of the ACM/IEEE Software Engineering Code of Ethics. Illustrate
each one, with an example, describing how it will influence their working practices.

1 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2016 9608/11/M/J/16 [Turn over


QUESTION 3. 12

6 Raj has joined a software company as a trainee programmer. He was given the company’s Code
of Conduct document during his induction training. The handbook has a section headed ‘Ethical
Behaviour’.

(a) Describe what is meant by ethics.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Raj is assigned to work as a new member of a development team.

In his first week, Raj feels uncomfortable working with one of his colleagues. He is unfamiliar
with the programming language used by the team. Next week, he will be working on the site
of one of the company’s clients with a colleague. Raj is very nervous about working in an
unfamiliar workplace.

Raj has a review with his manager after his first three weeks.

The Code of Conduct document was produced by the Human Resources section. It closely
follows the ACM/IEEE Software Engineering Code of Ethics that uses these eight key
principles:

Public Client and Employer Product Judgement

Management Profession Colleagues Self

There are issues Raj will want to raise with his manager.

• Describe two of these issues.


• Circle the key ACM/IEEE principle this comes under.
• Suggest what action should be taken to demonstrate ethical behaviour.

Issue 1

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

ACM/IEEE principle (Circle one only)

Public Client and Employer Product Judgement

Management Profession Colleagues Self

Possible action .........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2017 9608/11/O/N/17


13

Issue 2

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

ACM/IEEE principle (Circle one only)

Public Client and Employer Product Judgement

Management Profession Colleagues Self

Possible action .........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

Question 7 begins on the next page.

© UCLES 2017 9608/11/O/N/17 [Turn over


QUESTION 4. 9

5 The IEEE Software Engineering Code of Ethics uses eight key principles shown in the right-hand
column of the following diagram.

Tom is employed as a tester with a software company. He is keen to become a trainee programmer.

The middle column in the diagram labels six incidents which have happened to Tom this week.
The table that follows the diagram describes each incident.

IEEE category

Public

Incident A Client and Employer


Ethical
Incident B Product
behaviour

Incident C Judgement

Incident D Management

Unethical Incident E Profession


behaviour
Incident F Colleagues

Self

Incident Description
Tom has received some phishing emails. He reported this to the bank they were
A
supposed to have come from.
B Tom has asked his manager if they will pay for him to attend a programming course.
Tom is testing beta versions of new games software at work. He copies the software on
C
to CD-Rs and sells them to his friends.
D Tom has completed the application forms to join the Chartered Institute for IT.
Tom finds it difficult to work with one of his colleagues. His way of dealing with this has
E
been to refuse to speak with the colleague.
Tom’s manager had considered the testing of a new game was completed. Tom reported
F
to his manager that he thought there were still bugs which needed to be rectified.

(a) Draw a line on the diagram to link each of the six incidents to either ethical behaviour or
unethical behaviour. [2]

(b) Consider each incident you have identified as ethical behaviour.

Draw a line from each incident to indicate the IEEE category it maps to. [4]
© UCLES 2017 9608/12/O/N/17 [Turn over
QUESTION 5. 10

5 For each of the following scenarios, tick (3) one box for each scenario to indicate whether you
think the person’s behaviour is ethical or unethical. Justify your choice.

(a) Kevin is a software engineer who has recently started a job with a new company. He is using
program code from his previous employer in his new employer’s programs.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Nadya is a software developer. She has accepted a new job. She has never worked with
the programming languages used by this new company. Nadya is planning to increase her
knowledge of these programming languages before she starts her new job.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) Maria finds that one of her team members has produced some inventive code. She presents
this to her manager, stating that it was produced by the team. She does not mention the
individual’s name.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 9608/11/O/N/18


QUESTION 6. 11

(c) The processor uses buses in the FE cycle.

The diagram shows three buses and two descriptions.

Draw one line from each bus to its appropriate description.

Bus Description

Control bus
Unidirectional
(one direction)

Address bus

Bidirectional
(two directions)
Data bus

[2]

5 This question presents three scenarios. For each scenario, tick (✓) one box to show whether you
think the person’s behaviour is ethical or unethical. Justify your choice.

(a) Wendy is a software engineer who is developing a program for her company. Her friend,
Noah, is developing a program for a different company. Wendy looks at the code that Noah is
writing to get ideas for her own program.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© UCLES 2018 9608/12/O/N/18 [Turn over


12

(b) Amit is fixing some bugs in the computer system of a large multinational company. He is
asked to sign a confidentiality agreement. He sees some confidential information which
contains the names of other multinational companies that have broken the law. He copies this
information and releases it on the Internet.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(c) Farah is providing a company with an estimate for the cost of writing a program. The company
she works for is in financial difficulty so she increases the estimate by 10%.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

6 Kim is using her laptop computer to write a program in a high-level language.

(a) Kim needs to make sure the program is secure against unauthorised access. She has already
set up a username and password on her laptop.

Identify two additional electronic measures that Kim can use to keep the program secure.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Kim will use library routines in her program.

(i) Describe what is meant by a library routine.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

© UCLES 2018 9608/12/O/N/18


QUESTION 7. 8

3 This question presents three scenarios. Tick (✓) one box for each scenario to indicate whether
you think the person’s behaviour is ethical or unethical. Justify your choice.

(a) Mason is using his work computer to book a holiday whilst at work.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Ethan is supervising a trainee. The trainee asks Ethan for a reference for another job. Ethan
does not want to lose the trainee, so refuses to give him a reference.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) Margarita finds that one of her team members has produced some inventive code. She
presents this to her manager, praising the individual by name.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 9608/13/O/N/18


QUESTION 8. 8

4 A software developer works in a team for a large software development company.

(a) Two principles of the ACM/IEEE Software Engineering Code of Ethics are:

• developers must act consistently with the public interest


• developers must act in the best interest of their client and employer.

Name and describe three other principles in the ACM/IEEE Software Engineering Code of
Ethics.

Principle 1 .................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Principle 2 .................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Principle 3 .................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

(b) The software development company uses data backup and disk-mirroring to keep their data
secure.

Explain how data backup and disk-mirroring allow the company to recover from data loss.

Data backup .............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Disk-mirroring ...........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]
© UCLES 2019 9608/11/M/J/19
QUESTION 9. 4

2 Frankie is a software developer. He is developing a program to manage customer records for a


client with an online retail business. He must ensure that data stored about each customer are
both secure and private.

(a) State the difference between security and privacy.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Computer systems can be protected by physical methods such as locks.

Describe two non-physical methods used to improve the security of computer systems.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2019 9608/13/M/J/19


5

(c) A computer uses parity blocks to check the data that has been received is the same as the
data that has been transmitted.

The following is an example of a parity block.

Parity
Data
bit
1 1 1 1 0 0 0 1
0 0 0 0 1 1 1 0
1 1 0 1 1 0 0 1
Parity
1 1 0 1 1 0 0 1
byte

(i) Describe how a parity block check can identify a bit that has been corrupted during
transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) Give a situation where a parity block check cannot identify corrupted bits.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2019 9608/13/M/J/19 [Turn over


6

(d) One principle of the ACM/IEEE Software Engineering Code of Ethics is to always act in the
best interest of the client.

Explain how Frankie can ensure that he is acting in the best interest of his client.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(e) When the program is complete, Frankie uses a compiler to prepare the program for the client.

Explain why Frankie uses a compiler instead of an interpreter.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 9608/13/M/J/19

You might also like