Ict 407 - Professional Computing Ethics 21 22
Ict 407 - Professional Computing Ethics 21 22
SECTION A
1. In December 2021, a consultant by name Oko entered in a contractual agreement with IT Software Alliance to
design a real time warehousing software for his company. As per the agreement, Oko is obliged to pay 15,000 cedis
of airtime (Internet connectivity) to the group. Oko has since stopped paying the airtime for the reason that Internet
A. Bribery
B. Breach of contract
C. Fraud
D. Misrepresentation
2. Oko committed crime by obtaining different kinds of goods, services, and properties through deception and trickery.
A. Bribery
B. Breach of contract
C. Fraud
D. Misrepresentation
3. It has been found that the materials (information) of Oko's web site at peter.com is incomplete and thus misstated.
A. Bribery
B. Breach of contract
C. Fraud
D. Misrepresentation
B. must exercise discretion and judgment in the course of his or her work
undertakes voluntarily
to prove competency in
a set of skills.
A. Licensing
B. Certification
C. Registering
7. According to "Computer Crime and Security Surveys," which of the following is the most
D. virus attack
8. The written statement that defines an organization's security requirements as well as the controls and
sanctions used to meet those requirements is known as a ……………………
A. risk assessment
B. security policy
C. firewall
9. A device that works to prevent an attack by blocking viruses, malformed packets, and other threats from
getting into the company network is called a(n)…………………..
A. firewall
B. honeypot
10. An act designed to promote accuracy, fairness, and privacy of information in the files of credit reporting
companies is the………………..
A. Gramm-Leach-Bliley Act
(13 C. HIPAA
11. According to the Children's Online Privacy Protection Act, a Web site that caters to children must
C. receive parental consent before collecting any personal information from preteens
C. the prohibition of devices to record dialling, routing, addressing, and signalling information
13. Which of the following is not a technique frequently employed by identity thieves? ………
A. hacking databases
B. spyware
C. phishing
14. The most basic legal guarantee to the right of freedom of expression in the United States is contained in the
……………………………….
A. Bill of Rights
B. Fourth Amendment
C. First Amendment
D. U.S. Constitution
A. URL filtering
B. keyword filtering
C. dynamic content filtering D. all of the above
A. The First Amendment is often used to protect distributors of adult pornography over the Internet.
C. About one in six regular Internet users visits a Web sex site at least once per month.
B. hardware designs,
C. business plans,
18. A is a form of protection for intellectual property that does not require any disclosures or filing of an application.
A. copyright
B. patent
C. trade secret
D. trademark
19. Statements about how people should behave fit together to form the…………….by which a society lives.
A. moral code
B. code of ethics
20. A(n) ………………..is a moral habit that inclines people to do what is considered acceptable.
A. moral code
B. code of ethics
C. virtue
D. good behaviour
21. The …………… that socially responsible activities create can make it easier for corporations to conduct their
business.
A. good morals
B. good ethics
C. goodwill
D. reputation
22. That an employer can be held responsible for the acts of its employee even if the employee acts in a manner contrary
to corporate policy and the employer's direction is based on the principle called…………
A. respondeat superior
B. respondeat authority
C. respondeat formality
D. respondeat executive
23. The public …………of an organization strongly influences the value of its stock, how consumers regard its products
and services, the degree of oversight it receives from government agencies, and the amount of support and cooperation
A. image
B. reputation
C. goodwill D. morality
5
24. The corporate ethics officer provides the organization with……..and ………in the area of business conduct.
25. ate responsible for the careful and responsible management of an organization.
A. chief executives
B. heads of department
C. board of directors
D. managers
26. Children's Online Privacy Protection Aet (COPPA) is meant to give parents control over the collection, use, and
27 …………. highlight(s) an organization's key ethical issues and identifies the overarching values and principles that
A. Moral code
B. Code of ethics
C. Value system
D. Code of principles
28. …………… A(n)enables an organization to review how well it is meeting its ethical and social responsibility goals,
A. annual budget
B. social audit
D. accounting principle
29 ……….. makes employees more aware of a company's code of ethics and how to apply it,
A. Goodwill
B. Reputation
C. Value system
A. system definition
B. problem definition
C. function definition
D. role-based definition
C. the prohibition of devices to record dialling, routing, addressing, and signalling information without a search
A. Decision making
B. Brainstorming
C. Programming D. Algorithm
33.refers to the obligation to protect people against any unreasonable harm or risk…………
A. Information privacy
B. Freedom of speech
C. Duty of care
D. Personal security
34. This is a piece of programming code that causes a computer to behave in an unexpected and usually undesirable
manner
A. virus
B. worms
C. micro virus
D. trojan horses
35. With this, attackers use an application macro language (such as Visual Basic or VBScript) to create programs
A. virus
B. worms
C. micro virus
D. trojan horses
36. This is a program in which malicious code is hidden inside a seemingly harmless program.
A. virus
B. worms
C. spyware
D. trojan horses
37. This is a large group of computers controlled from one or more remote locations by hackers, without the knowledge
A. DDOS
B. botnet
C. rootkit
D. zombies
38. This is one in which a malicious hacker takes over computers on the Internet and causes them to flood a target site
A. DDOS B. ransom
C. rootkit
D. zombies
39. This is a set of programs that enables its user to gain administrator level access to a computer without the end user's
consent or knowledge.
A. DDOS
B. ransom
C. rootkit D. zombies
40. This is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
A. hacking
B. phishing
C. profiling
D. identity theft
Q1 a)
i) Privacy and Anonymity Issues outlined four (4) ways to limit or even stop the deposit Of cookies in
computer systems. With explanations, outline the four (4) ways needed to stop or limit the deposit of cookies
b) Explain the following Quotes in context in your own words with an example each
i. "If we don't believe in freedom of expression for people we despise, then we don't believe in it at all." -
Benjamin Franklin
iii) They than can give up essential liberty to obtain a little temporary safety deserve
ii. "They that can give up essential liberty to obtain a little temporary safety deserve
)
i. To some extent, a particular use of copyrighted property is fair and can be allowed without
penalty. Give two (2) factors with explanations to support the above
ii. Give two (2) points with explanations to differentiate between Bribe and Gift
Q3. a) Joyce Braham was 16 years of age, a good kid—very lively, artistic, intelligent and fun. But she engaged in
sexting in her last year at Sycamore High School, which was a terrible mistake. As it were, she used her cell
phone to take nude photos of herself and then sent them to her boyfriend. After the couple broke up, Jessie's
ex-boyfriend forwarded the photos to several other teenage girls; eventually, the pictures were sent to hundreds
of teens in the Cincinnati area. Classmates, pedophiles and even kids she did not know, started teasing her.
They called her a tramp and worse; some even threw things at her. Instead Of attending classes, she began
sleeping in her car in the school parking lot or hiding in the bathroom, skipping classes to avoid further
embarrassment. She stopped interacting with her friends, and her grades dropped terribly. Finally, in summer
of Joyce was so full of despair that she hung herself. To date, however, the ex-boyfriend and other students
who distributed the photos have not been arrested or charged for defamation, blackmailing, libel, felony
or none of the Online Protection Acts could be used to shelter Joyce with any crime.
i. Sexting
ii. Pedophiles
iv. Tramp
v. Perjury
ß) Explain why Joyce's ex-boyfriend's actions were not considered illegal in the passage.
b) Explain
Q4. a) List and explain the three (3) actions or pillars taken by Microsoft to support trustworthy
computing.
visits a Web sex site at least once per month. 35) C. micro virus
Q1: a) i) The four ways to limit or stop the deposit of cookies in computer systems are:
ii) Data Privacy refers to the protection of personal information from unauthorized access and use. It
b) i) Benjamin Franklin's quote emphasizes the importance of freedom of expression for everyone, even
those with opposing views. Example: Allowing peaceful protests and diverse opinions in society.
ii) Chomsky's quote warns against sacrificing essential liberties for temporary safety. Example:
Implementing strict surveillance measures that infringe on privacy rights in the name of national security.
Q2: a) i) Fostering good business ethics is important for maintaining trust, reputation, and long-term
success. It ensures fair practices, compliance with laws, and positive stakeholder relationships.
ii) Identity theft involves unauthorized access and use of someone's personal information for fraudulent
b) i) Fair use factors: Purpose of use (e.g., educational, commercial), and the nature of the copyrighted
ii) Difference between Bribe and Gift: Intent behind the transaction and the expectation of reciprocity.
iii) Difference between Trademark and Intellectual Property: Trademark is a specific type of intellectual
property that represents symbols, names, or logos used to identify goods or services.
Q3: a) i)
Sexting: Sending explicit sexual content, often images, via electronic devices.
ii) Joyce's ex-boyfriend's actions were not considered illegal due to legal gaps or the absence of specific
b) i) Key issues related to freedom of expression: Hate speech, censorship, and the balance between free
ii) Reasons why computer incidents have become more prevalent: Increased connectivity, reliance on
b) i) Fair use doctrine allows limited use of copyrighted material without permission for purposes such
ii) As an ICT professional, a profession involves specialized training, ethical standards, and a commitment