D333 Study Guide v2
D333 Study Guide v2
Supplemental Resources
All the videos and quiz resources can be found under “course search” on your course
page.
Section 1
This section overviews the course layout.
Section 2
In this section, three competencies are covered across three modules. This
section of the course contains Modules 1, 2, and 3, as follows:
Module 1: An Overview of Ethics
Module 2: Ethics for IT Workers and IT Users
Module 3: Cyberattacks and Cybersecurity
Complete the table by identifying the legal and ethical considerations for each
example. (p.6)
Example
Ethical? Legal?
1. Sleeping on the clock.
2. Using a business donation for personal use.
3. Asking for a promotion at work.
4. Drinking wine while on call at work.
Identify one way you include ethical considerations in your own decision making.
Identify two managerial behaviors that might encourage unethical behavior from
employees.
Identify the act makes it a crime to bribe a foreign official, a foreign party official, or
candidate for foreign political office. This act applies to all US citizens and companies
listed on any US stock exchange.
What relationships must an IT worker manage, and what key ethical issues can arise in
each?
What ethical issues do IT users face, and what can be done to encourage their ethical
behavior?
Explain several reasons why are computer incidents so prevalent (p. 86-87)?
What is it called when a threat combines various types of exploits and vulnerabilities in
one payload?
Identify the large federal agency with a budget of almost $65 billion whose goal is to
provide for a “safer, more secure America, which is resilient against terrorism and other
potential threats.” (p. 98)
Complete the table of Federal Laws. These laws were enacted to address computer
crimes (p. 100).
Law Subject Area
Address fraud and related activities in
association with computers including access,
transmission, password trafficking, and threats.
Covers false claims regarding unauthorized use
of credit cards.
Focuses on unlawful access to stored
communications to obtain, alter, or prevent
unauthorized access to electronic
communication while it is in electronic storage.
Defines cyberterrorism and associated penalties.
Why might a company try to conceal information about a data breach to it’s
customers?
Explain the importance of activity logs surrounding a data breach or other security
incident.
What must the IT security group do before it begins eradication efforts for
cyberattack?
Identify at least 3 key elements that should be included in the formal incident following
a cyberattack (p. 116):
a.
b.
c.
Section 3
In this section, one competency is covered across three modules. This section of the
course contains Modules 4, 5, and 6, as follows:
Module 4: Privacy
Module 5: Freedom of Expression
Module 6: Intellectual Property
Module 4 Privacy
Topic: Privacy Protection and the Law
What is the right of privacy, and what is the basis for protecting personal privacy under
the law? (p.136)
Identify at least 3 systems that gather data about individuals? (p. 137)
About how much does a data breach cost a company per record? (p. 159)
How might predictive coding assist in an e-discovery? What issues might arise
from this?
Explain why a business may want to monitor its employees and if they are legally
allowed to.
The Supreme Court has held that the following types of speech are not protected
by the First Amendment and may be forbidden by the government: (p. 188)
Explain one of the three questions that can be used to determine if speech is
considered obscene:
Complete the following access table by identifying the key legislation in column
one (pp. 190-192).
Law or Ruling Year Description
1996 Title V of the Telecommunications Act, aimed at
protecting children from pornography. Penalties include
fines and imprisonment.
1998 States that “whoever knowingly and with knowledge of the
character of the material, in interstate or foreign
commerce by means of the World Wide Web, makes any
communication for commercial purposes that is available
to any minor…” is subject to fines and/or imprisonment.
2004 Declared COPA was unconstitutional and could not be
used to shelter children from pornographic materials.
What then can be used by households to protect children from explicit websites
while still allowing open access to media by adults? (p.192)
Identify the top three countries with the largest populations of internet users
(p.196):
1.
2.
3.
What is a SLAPP? (p.197)
Identify one court case where the US protected the right of anonymity. (p.198)
Explain the four factors that should be considered when determining whether a
copyrighted work is prohibited by the fair use doctrine. (p. 226)
1.
2.
3.
4.
What must be proven to validate a software claim of copywrite infringement? (p. 227)
What act created the position of Intellectual Property Enforcement Coordinator within
the Executive Office of the President, while also increasing enforcement and penalties
for infringement? (p. 228)
International trade in counterfeit and pirated goods could have accounted for as much
as $____ billion or 2.5 percent of world trade in 2013.
In WTO TRIPS Agreement table, the second column lists the key terms of the
agreement. In the first column, enter the form of intellectual property that is protected.
(p. 229)
Form of Intellectual Key Term of Agreement
Property
Computer programs are protected as literary works.
Authors of computer programs and producers of sound
recordings have the right to prohibit the commercial
rental of their works to the public.
Patent protection is available for any invention—whether
a product or process—in all fields of technology without
discrimination, subject to the normal tests of novelty,
inventiveness, and industrial applicability.
These have commercial value must be protected against
breach of confidence and other acts that are contrary to
honest commercial practices. Steps must have been
taken to keep it secret.
In the Digital Millennium Copyright Act (DCMA), enter the name of the title section in
the second column to match the appropriate description. (p. 230)
Title Name Description
1 This section implements the WIPO treaties by making
certain technical amendments to the U.S. law to
provide appropriate references and links to the
treaties. It also creates two new prohibitions, one on
circumvention of technological measures used by
copyright owners to protect their works and one on
tampering with copyright management information.
Adds penalties for violation.
2 This section enables website operators that allow
users to post content on their website (e.g., music,
video, and pictures) to avoid copyright infringement
liability if certain “safe harbor” provisions are followed.
3 This section permits the owner or lessee of a computer
to make or authorize the making of a copy of a
computer program in the course of maintaining or
repairing that computer. The new copy cannot be used
in any other manner and must be destroyed
immediately after the maintenance or repair is
completed.
4 This section adds language to the Copyright Act
confirming the Copyright Office’s authority to continue
to perform the policy and international functions that it
has carried out for decades under its existing general
authority.
5 This section creates a new form of protection for the
original design of vessel hulls
Since DMCA does not directly govern copying, what does it do instead?
The U.S. Supreme Court has ruled that three classes of items cannot be patented (p.
233):
1.
2.
3.
If a court determines that the infringement is intentional, it can award up to ___ times
the amount of the damages claimed by the patent holder.
Under the Leahy-Smith America Invents Act, the U.S. patent system changed from a
“first-to-invent” to a ________________ system effective from March 16, 2013. (p.234)
Explain how trade secret laws protect more technology worldwide than patent
laws do. (p. 236)
In the Trade Secret Laws table, identify the law in column 1 that is described in
column 2.
Act Description
Defines a trade secret as “information, including a
formula, pattern, compilation, program, device, method,
technique, or process, that:
Derives independent economic value, actual or potential,
from not being generally known to, and not being readily
ascertainable by, persons who can obtain economic value
from its disclosure or use, and is the subject of efforts that
are reasonable under the circumstances to maintain its
secrecy.”
An act passed in 1996 to help law enforcement agencies
pursue economic espionage. It imposes penalties of up to
$10 million and 15 years in prison for the theft of trade
secrets.
An act passed in 2016 that amended the Economic
Espionage Act to create a federal civil remedy for trade
secret misappropriation.
Identify one argument for and one argument against reverse engineering.
Explain the reasoning behind why firms or individual developers create open
source code, even though they do not receive money for it. (p. 244)
Section 4
In this section, one competency is covered across three modules. This section of
the course contains Modules 7, 8, and 9, as follows:
Module 7: Ethical Decisions in Software Development
Module 8: The Impact of Information Technology on Society
Module 9: Social Media
Identify and explain at least three factors that can contribute to poor-quality
software. (p.267)
1.
2.
3.
Explain what a DSS is and how it may be used by a company. (p. 269)
Compare the terms product liability and strict liability. (p. 270)
In the Software Testing table, identify the type of testing in column 1 that is described
in column 2. (p. 276)
Test Type Description
A type of dynamic testing that involves viewing the
software unit as a device that has expected input and
output behaviors but whose internal workings are
unknown (a black box).
A type of dynamic testing that treats the software unit as a
device that has expected input and output behaviors but
whose internal workings, unlike the unit in black-box
testing, are known.
A software-testing technique in which software is tested
without actually executing the code. It consists of two
steps—review and static analysis.
A software-testing technique that involves testing
individual components of code (subroutines, modules,
and programs) to verify that each unit performs as
intended.
Software testing done after successful unit testing, where
the software units are combined into an integrated
subsystem that undergoes rigorous testing to ensure that
the linkages among the various subsystems work
successfully.
Software testing done after successful integration testing,
where the various subsystems are combined to test the
entire system as a complete entity.
Software testing done independently by trained end users
to ensure the system operates as expected.
2. Managed
3. Defined
4. Quantitativ
ely
Managed
5. Optimizing
Fill in the blank. Reliability and safety are two different system characteristics.
_____________ has to do with the capability of the system to continue to perform;
_________ has to do with the ability of the system to perform in a safe manner.
(p.282)
What does the Health Information Technology for Economic and Clinical Health Act
(HITECH) do?
Explain labor productivity and key factors related to improving it. (p. 303)
In the Artificial Intelligence table, identify the type of AI in column 1 that is described
in column 2.(p. 307-309)
AI Type Description
A type of artificial intelligence (AI), involves computer
programs that can learn some task and improve their
performance with experience.
A branch of engineering that involves the development
and manufacture of mechanical or computer devices that
can perform tasks that require a high degree of precision
or that are tedious or hazardous for human beings, such
as painting cars or making precision welds.
An aspect of artificial intelligence that involves technology
that allows computers to understand, analyze,
manipulate, and/or generate “natural” languages, such as
English.
A software-testing technique that involves testing
individual components of code (subroutines, modules,
and programs) to verify that each unit performs as
intended.
What are the three major components of machine learning? (p. 307)
Contrast the how an electronic medical record is different from a personal health
record. (p. 312)
Explain the following four types of social media marketing and it benefit to a business:
1. Organic Media Marketing
3. Earned Media
4. Viral Marketing
Fill in the blank. The First Amendment of the U.S. Constitution protects the right of
freedom of expression from government interference; however, it does not prohibit free
speech interference by _________________. (p.344)
SECTION 5
In this section, four competencies are covered across two modules. This section of the
course contains Modules 10 and 11, as follows:
Identify at least one benefit and one draw back to being employed as an independent
contractor. (p. 362)
Describe at least two benefits to a business when they hire contingent workers.
(p.363)
Topic: Outsourcing
Explain the difference between outsourcing and offshore outsourcing. (p. 372)
Topic: Whistle-Blowing
Define the term whistle-blowing and explain who might be behind it. (p.375)
Explain two common legal provisions from the reading that are associated with
whistle-blowing: (p.376)
1. False Claims Act
2. Qui tam
What are four suggestions are made for tackling AI bias? (17:48)
1. Identify-
2. Select-
3. Build-
4. Mitigate-
SECTION 6
Course summary and completion notice.