0% found this document useful (0 votes)
26 views16 pages

Ict 407 - Professional Computing Ethics 21 22

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views16 pages

Ict 407 - Professional Computing Ethics 21 22

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

ICT 407 - PROFESSIONAL COMPUTING ETHICS

END OF FIRST SEMESTER EXAMINATIONS ACADEMIC YEAR 2021-2022

SECTION A

Answer All Questions (40 Marks)

1. In December 2021, a consultant by name Oko entered in a contractual agreement with IT Software Alliance to

design a real time warehousing software for his company. As per the agreement, Oko is obliged to pay 15,000 cedis

of airtime (Internet connectivity) to the group. Oko has since stopped paying the airtime for the reason that Internet

is now free within the vicinity of IT Software Alliance.

1. Which of these bests describe his action?

A. Bribery

B. Breach of contract

C. Fraud

D. Misrepresentation

2. Oko committed crime by obtaining different kinds of goods, services, and properties through deception and trickery.

Which of these bests describe his action?

A. Bribery

B. Breach of contract

C. Fraud

D. Misrepresentation

3. It has been found that the materials (information) of Oko's web site at peter.com is incomplete and thus misstated.

Which of these best describes his action?

A. Bribery

B. Breach of contract

C. Fraud
D. Misrepresentation

4. A professional is someone who

A. requires advanced training and experience

B. must exercise discretion and judgment in the course of his or her work

C. does work that cannot be standardized

D. all of the above

5. Society expects professionals to act in a way that……………………

A. causes no harm to society

B. provides significant benefits

C. establishes and maintains professional standards that protect the public

D. all of the above

6. is a process that one

undertakes voluntarily

to prove competency in

a set of skills.

A. Licensing

B. Certification

C. Registering

D. All of the above

7. According to "Computer Crime and Security Surveys," which of the following is the most

common security incident in recent times?

A. instant messaging abuse

B. distributed denial-of-service attacks


C. laptop theft

D. virus attack

8. The written statement that defines an organization's security requirements as well as the controls and
sanctions used to meet those requirements is known as a ……………………

A. risk assessment

B. security policy

C. firewall

D. all of the above

9. A device that works to prevent an attack by blocking viruses, malformed packets, and other threats from
getting into the company network is called a(n)…………………..

A. firewall

B. honeypot

C. intrusion prevention system

D. intrusion detection system

10. An act designed to promote accuracy, fairness, and privacy of information in the files of credit reporting
companies is the………………..

A. Gramm-Leach-Bliley Act

B. Fair Credit Reporting Act

(13 C. HIPAA

D. USA PATRIOT Act

11. According to the Children's Online Privacy Protection Act, a Web site that caters to children must

A. offer comprehensive privacy policies


B. notify parents or guardians about its data-collection practices

C. receive parental consent before collecting any personal information from preteens

D. all of the above


12. The Electronic Communications Privacy Act deals with

A. the protection of communications while in transit from sender to receiver

B. the protection of communications held in electronic storage

C. the prohibition of devices to record dialling, routing, addressing, and signalling information

without a search warrant

D. all of the above

13. Which of the following is not a technique frequently employed by identity thieves? ………

A. hacking databases

B. spyware

C. phishing

D. trap and trace

14. The most basic legal guarantee to the right of freedom of expression in the United States is contained in the

……………………………….

A. Bill of Rights

B. Fourth Amendment

C. First Amendment

D. U.S. Constitution

15. The best Internet filters rely on the use of…………..

A. URL filtering

B. keyword filtering
C. dynamic content filtering D. all of the above

16. Which of the following statements about Internet pornography is true?

A. The First Amendment is often used to protect distributors of adult pornography over the Internet.

B. There are fewer than 60,000 Web sex sites.

C. About one in six regular Internet users visits a Web sex site at least once per month.

D. In contrast to adult pornography, few federal laws address child pornography

17. Trade secrets can include all the following except………………..

A. the design of new software code,

B. hardware designs,

C. business plans,

D. all of the above

18. A is a form of protection for intellectual property that does not require any disclosures or filing of an application.

A. copyright

B. patent

C. trade secret

D. trademark

19. Statements about how people should behave fit together to form the…………….by which a society lives.

A. moral code

B. code of ethics

C. value system D. moral philosophy

20. A(n) ………………..is a moral habit that inclines people to do what is considered acceptable.

A. moral code
B. code of ethics

C. virtue

D. good behaviour

21. The …………… that socially responsible activities create can make it easier for corporations to conduct their

business.

A. good morals

B. good ethics

C. goodwill

D. reputation

22. That an employer can be held responsible for the acts of its employee even if the employee acts in a manner contrary

to corporate policy and the employer's direction is based on the principle called…………

A. respondeat superior

B. respondeat authority

C. respondeat formality

D. respondeat executive

23. The public …………of an organization strongly influences the value of its stock, how consumers regard its products

and services, the degree of oversight it receives from government agencies, and the amount of support and cooperation

it receives from its business partners.

A. image

B. reputation

C. goodwill D. morality

5
24. The corporate ethics officer provides the organization with……..and ………in the area of business conduct.

A. vision and leadership

B. objectives and outcome

C. leadership and direction

D. D. vision and mission

25. ate responsible for the careful and responsible management of an organization.

A. chief executives

B. heads of department

C. board of directors

D. managers

26. Children's Online Privacy Protection Aet (COPPA) is meant to give parents control over the collection, use, and

disclosure of their children's personal information. However, COPPA ………..

A. does not cover the dissemination of information to children

B. does not cover the dissemination of information to under age children

C. does not make the dissemination of information to children mandatory

D. does not permit children to have access to information

27 …………. highlight(s) an organization's key ethical issues and identifies the overarching values and principles that

are important to the organization and its decision-making process.

A. Moral code

B. Code of ethics

C. Value system

D. Code of principles
28. …………… A(n)enables an organization to review how well it is meeting its ethical and social responsibility goals,

and communicate new goals for the upcoming year.

A. annual budget

B. social audit

C. probity and accountability

D. accounting principle

29 ……….. makes employees more aware of a company's code of ethics and how to apply it,

as well as demonstrates that the company intends to operate in an ethical manner.

A. Goodwill

B. Reputation

C. Value system

D. Formal ethics training 6

30. The most important part of the decision-making process is…………..

A. system definition

B. problem definition

C. function definition

D. role-based definition

31. Electronic Communications Privacy Act (1986) deals with

A. the protection of communications while in transfer from sender to receiver

B. the protection of communications held in electronic storage

C. the prohibition of devices to record dialling, routing, addressing, and signalling information without a search

warrant. D. all of the above


32 …………… is a process for generating a number of alternative solutions to a problem,

A. Decision making

B. Brainstorming

C. Programming D. Algorithm

33.refers to the obligation to protect people against any unreasonable harm or risk…………

A. Information privacy

B. Freedom of speech

C. Duty of care

D. Personal security

34. This is a piece of programming code that causes a computer to behave in an unexpected and usually undesirable

manner

A. virus

B. worms

C. micro virus

D. trojan horses

35. With this, attackers use an application macro language (such as Visual Basic or VBScript) to create programs

that infect documents and templates.

A. virus

B. worms

C. micro virus

D. trojan horses

36. This is a program in which malicious code is hidden inside a seemingly harmless program.
A. virus

B. worms

C. spyware

D. trojan horses

37. This is a large group of computers controlled from one or more remote locations by hackers, without the knowledge

or consent of their owners.

A. DDOS

B. botnet

C. rootkit

D. zombies

38. This is one in which a malicious hacker takes over computers on the Internet and causes them to flood a target site

with demands for data and other small tasks.

A. DDOS B. ransom

C. rootkit

D. zombies

39. This is a set of programs that enables its user to gain administrator level access to a computer without the end user's

consent or knowledge.

A. DDOS

B. ransom

C. rootkit D. zombies

40. This is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
A. hacking

B. phishing

C. profiling

D. identity theft

SECTION B (30 MARKS)

Answer Any Three (3) Questions In This Section

Q1 a)

i) Privacy and Anonymity Issues outlined four (4) ways to limit or even stop the deposit Of cookies in

computer systems. With explanations, outline the four (4) ways needed to stop or limit the deposit of cookies

in your organizations computer systems.

ii) Explain in detail the phrase Data Privacy

b) Explain the following Quotes in context in your own words with an example each

i. "If we don't believe in freedom of expression for people we despise, then we don't believe in it at all." -

Benjamin Franklin

Q2 a) Explain the following:

i) Why fostering Good Business Ethics in important

ii) Identify thefe as used in ‘computer and internet Crime’

iii) They than can give up essential liberty to obtain a little temporary safety deserve

ii. "They that can give up essential liberty to obtain a little temporary safety deserve

neither liberty nor safety” Avram Noam Chomsky

)
i. To some extent, a particular use of copyrighted property is fair and can be allowed without

penalty. Give two (2) factors with explanations to support the above

ii. Give two (2) points with explanations to differentiate between Bribe and Gift

iii. Differentiate between Trademark and Intellectual Property

Q3. a) Joyce Braham was 16 years of age, a good kid—very lively, artistic, intelligent and fun. But she engaged in

sexting in her last year at Sycamore High School, which was a terrible mistake. As it were, she used her cell

phone to take nude photos of herself and then sent them to her boyfriend. After the couple broke up, Jessie's

ex-boyfriend forwarded the photos to several other teenage girls; eventually, the pictures were sent to hundreds

of teens in the Cincinnati area. Classmates, pedophiles and even kids she did not know, started teasing her.

They called her a tramp and worse; some even threw things at her. Instead Of attending classes, she began

sleeping in her car in the school parking lot or hiding in the bathroom, skipping classes to avoid further

embarrassment. She stopped interacting with her friends, and her grades dropped terribly. Finally, in summer

of Joyce was so full of despair that she hung herself. To date, however, the ex-boyfriend and other students

who distributed the photos have not been arrested or charged for defamation, blackmailing, libel, felony

or none of the Online Protection Acts could be used to shelter Joyce with any crime.

a) You are to explain the following as used in the passage:

i. Sexting

ii. Pedophiles

iv. Tramp

v. Perjury
ß) Explain why Joyce's ex-boyfriend's actions were not considered illegal in the passage.

b) Explain

i. Any two (2) Key issues related to freedom of expression


ii. Any two (2) reasons why computer incidents have become more prevalent

Q4. a) List and explain the three (3) actions or pillars taken by Microsoft to support trustworthy

computing.

b) i Differentiate between Fair use doctrine and Copyright

ii. As ICT professional explain the term Profession


SOLUTION

1) B. Breach of contract 20) C. virtue

2) C. Fraud 21) C. goodwill

3) D. Misrepresentation 22) A. respondeat superior

4) D. all of the above 23) B. reputation

5) D. all of the above 24) C. leadership and direction

6) B. Certification 25) A. chief executives

7) C. laptop theft 26) B. does not cover the dissemination of

8) B. security policy information to under-age children

9) A. firewall 27) B. Code of ethics

10) B. Fair Credit Reporting Act 28) B. social audit

11) D. all of the above 29) D. Formal ethics training

12) D. all of the above 30) B. problem definition

13) D. trap and trace 31) D. all of the above

14) C. First Amendment 32) B. Brainstorming

15) D. all of the above 33) C. Duty of care

16) C. About one in six regular Internet users 34) A. virus

visits a Web sex site at least once per month. 35) C. micro virus

17) D. all of the above 36) D. trojan horses

18) C. trade secret 37) B. botnet

19) C. value system 38) A. DDOS


39) C. rootkit
40) B. phishing
Section B:

Q1: a) i) The four ways to limit or stop the deposit of cookies in computer systems are:

A. Configure browser settings to block cookies.

B. Use browser extensions or add-ons that block or manage cookies.

C. Regularly clear cookies from the browser.

D. Use privacy-focused browsers that automatically limit cookie tracking.

ii) Data Privacy refers to the protection of personal information from unauthorized access and use. It

involves controlling how data is collected, processed, stored, and shared.

b) i) Benjamin Franklin's quote emphasizes the importance of freedom of expression for everyone, even

those with opposing views. Example: Allowing peaceful protests and diverse opinions in society.

ii) Chomsky's quote warns against sacrificing essential liberties for temporary safety. Example:

Implementing strict surveillance measures that infringe on privacy rights in the name of national security.

Q2: a) i) Fostering good business ethics is important for maintaining trust, reputation, and long-term

success. It ensures fair practices, compliance with laws, and positive stakeholder relationships.

ii) Identity theft involves unauthorized access and use of someone's personal information for fraudulent

purposes, often in the context of computer and internet crime.

b) i) Fair use factors: Purpose of use (e.g., educational, commercial), and the nature of the copyrighted

work (e.g., factual or creative).

ii) Difference between Bribe and Gift: Intent behind the transaction and the expectation of reciprocity.
iii) Difference between Trademark and Intellectual Property: Trademark is a specific type of intellectual

property that represents symbols, names, or logos used to identify goods or services.

Q3: a) i)

Sexting: Sending explicit sexual content, often images, via electronic devices.

Pedophiles: Adults sexually attracted to children.

Tramp: Derogatory term implying promiscuity or loose morals.

Perjury: Deliberate lying under oath.

ii) Joyce's ex-boyfriend's actions were not considered illegal due to legal gaps or the absence of specific

laws addressing the distribution of explicit images without consent.

b) i) Key issues related to freedom of expression: Hate speech, censorship, and the balance between free

speech and public safety.

ii) Reasons why computer incidents have become more prevalent: Increased connectivity, reliance on

digital systems, and evolving cyber threats.

Q4: a) Three actions by Microsoft for trustworthy computing:

A. Security - Implementing robust security measures.

B. Privacy - Protecting user data and ensuring privacy.

C. Reliability - Developing reliable and resilient software.

b) i) Fair use doctrine allows limited use of copyrighted material without permission for purposes such

as criticism, commentary, news reporting, teaching, scholarship, or research.

ii) As an ICT professional, a profession involves specialized training, ethical standards, and a commitment

to continuous learning and improvement.

You might also like