9608/11/o/n/15 © Ucles 2015
9608/11/o/n/15 © Ucles 2015
4 Paul works part-time for a large software company. The company sells security software to
a number of banks. He also runs his own software company that produces and sells computer
games.
Draw lines to indicate whether each statement describes ethical or unethical behaviour.
Statement
Ethical
Unethical
Because his work load is increasing, Paul
is now using overseas companies to write
some of the routines used in his games
software.
[6]
5 Three types of software licensing and four descriptions are shown in the table below.
Put a tick (✓) in each row to match each description to the appropriate type of software licensing.
Type of software
Software is purchased
before it can be used
Source code comes with
the software
Software is provided free
on a trial basis
[4]
State three of the principles of the ACM/IEEE Software Engineering Code of Ethics. Illustrate
each one, with an example, describing how it will influence their working practices.
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
6 Raj has joined a software company as a trainee programmer. He was given the company’s Code
of Conduct document during his induction training. The handbook has a section headed ‘Ethical
Behaviour’.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
In his first week, Raj feels uncomfortable working with one of his colleagues. He is unfamiliar
with the programming language used by the team. Next week, he will be working on the site
of one of the company’s clients with a colleague. Raj is very nervous about working in an
unfamiliar workplace.
Raj has a review with his manager after his first three weeks.
The Code of Conduct document was produced by the Human Resources section. It closely
follows the ACM/IEEE Software Engineering Code of Ethics that uses these eight key
principles:
There are issues Raj will want to raise with his manager.
Issue 1
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Issue 2
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
5 The IEEE Software Engineering Code of Ethics uses eight key principles shown in the right-hand
column of the following diagram.
Tom is employed as a tester with a software company. He is keen to become a trainee programmer.
The middle column in the diagram labels six incidents which have happened to Tom this week.
The table that follows the diagram describes each incident.
IEEE category
Public
Incident C Judgement
Incident D Management
Self
Incident Description
Tom has received some phishing emails. He reported this to the bank they were
A
supposed to have come from.
B Tom has asked his manager if they will pay for him to attend a programming course.
Tom is testing beta versions of new games software at work. He copies the software on
C
to CD-Rs and sells them to his friends.
D Tom has completed the application forms to join the Chartered Institute for IT.
Tom finds it difficult to work with one of his colleagues. His way of dealing with this has
E
been to refuse to speak with the colleague.
Tom’s manager had considered the testing of a new game was completed. Tom reported
F
to his manager that he thought there were still bugs which needed to be rectified.
(a) Draw a line on the diagram to link each of the six incidents to either ethical behaviour or
unethical behaviour. [2]
Draw a line from each incident to indicate the IEEE category it maps to. [4]
© UCLES 2017 9608/12/O/N/17 [Turn over
QUESTION 5. 10
5 For each of the following scenarios, tick (3) one box for each scenario to indicate whether you
think the person’s behaviour is ethical or unethical. Justify your choice.
(a) Kevin is a software engineer who has recently started a job with a new company. He is using
program code from his previous employer in his new employer’s programs.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Nadya is a software developer. She has accepted a new job. She has never worked with
the programming languages used by this new company. Nadya is planning to increase her
knowledge of these programming languages before she starts her new job.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) Maria finds that one of her team members has produced some inventive code. She presents
this to her manager, stating that it was produced by the team. She does not mention the
individual’s name.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
Bus Description
Control bus
Unidirectional
(one direction)
Address bus
Bidirectional
(two directions)
Data bus
[2]
5 This question presents three scenarios. For each scenario, tick (✓) one box to show whether you
think the person’s behaviour is ethical or unethical. Justify your choice.
(a) Wendy is a software engineer who is developing a program for her company. Her friend,
Noah, is developing a program for a different company. Wendy looks at the code that Noah is
writing to get ideas for her own program.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(b) Amit is fixing some bugs in the computer system of a large multinational company. He is
asked to sign a confidentiality agreement. He sees some confidential information which
contains the names of other multinational companies that have broken the law. He copies this
information and releases it on the Internet.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(c) Farah is providing a company with an estimate for the cost of writing a program. The company
she works for is in financial difficulty so she increases the estimate by 10%.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(a) Kim needs to make sure the program is secure against unauthorised access. She has already
set up a username and password on her laptop.
Identify two additional electronic measures that Kim can use to keep the program secure.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
3 This question presents three scenarios. Tick (✓) one box for each scenario to indicate whether
you think the person’s behaviour is ethical or unethical. Justify your choice.
(a) Mason is using his work computer to book a holiday whilst at work.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Ethan is supervising a trainee. The trainee asks Ethan for a reference for another job. Ethan
does not want to lose the trainee, so refuses to give him a reference.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) Margarita finds that one of her team members has produced some inventive code. She
presents this to her manager, praising the individual by name.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(a) Two principles of the ACM/IEEE Software Engineering Code of Ethics are:
Name and describe three other principles in the ACM/IEEE Software Engineering Code of
Ethics.
Principle 1 .................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Principle 2 .................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Principle 3 .................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
(b) The software development company uses data backup and disk-mirroring to keep their data
secure.
Explain how data backup and disk-mirroring allow the company to recover from data loss.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Disk-mirroring ...........................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2019 9608/11/M/J/19
QUESTION 9. 4
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Describe two non-physical methods used to improve the security of computer systems.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
(c) A computer uses parity blocks to check the data that has been received is the same as the
data that has been transmitted.
Parity
Data
bit
1 1 1 1 0 0 0 1
0 0 0 0 1 1 1 0
1 1 0 1 1 0 0 1
Parity
1 1 0 1 1 0 0 1
byte
(i) Describe how a parity block check can identify a bit that has been corrupted during
transmission.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) Give a situation where a parity block check cannot identify corrupted bits.
...........................................................................................................................................
..................................................................................................................................... [1]
(d) One principle of the ACM/IEEE Software Engineering Code of Ethics is to always act in the
best interest of the client.
Explain how Frankie can ensure that he is acting in the best interest of his client.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(e) When the program is complete, Frankie uses a compiler to prepare the program for the client.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]