DOC PREVIEW
Southern Miss CSC 309 - Final Exam

This preview shows page 1-2-3 out of 8 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Final Exam Please put Your NameCSC309 on the Back of the LastMiller/Fall 99 Page1. In class we discussed a number of informal guidelines for making ethical decisions. These guidelines, designated by names such as the Mom Test, the TVTest, and the Newspaper Test, all seemed to be variations on the thought that if _________________________________________________________________________________________________________________2. While the use of copyright with software tends to make the software more expensive it is argued that the impact on software quality is ____________________________________________ because_________________________________________________________________________________________________________________________________________________________________________________3. We see a rather significant increase in the number of individuals who are using a computer link to work from home and we are told that the percentage of workers doing this will increase. Give two advantages that this teleworking has forthe employer.a. ____________________________________________________________________________________________________________________b. ____________________________________________________________________________________________________________________4. One ethical rule/guide line that has appeared in many religions of the world is commonly referred to as the Golden Rule. Here the central thought is ________________________________________________________________________________________________________________________5. If we do a perfect job of developing the skills for making perfect ethical decisions and we use these skills to perfectly analyze all of the situations where ethics plays a factor to arrive at a best course of action then for this to not be another totally useless academic exercise we need to ________________________________________________________________________________________________________________________6. When we say that someone always uses an altrustic approach we are simply saying that ______________________________________________________________________________________________________________________7. If you were going to apply utilitarian ethics to a situation then you would need to ___________________________________________________________________________________________________________________________________________________________________________8. Kant believed that morality could be summed up in one ultimate principal which he called the Categorical Imperative. In class we presented it as consistingof two parts; consistency and respect. By consistency Kant argued that if an action is not right for __________________________________________________________________________________________________________________9. You are pretty sure you have a medical condition that you are not real eager to let the world know you have. You are interested in getting medical help but at the same time you want to protect your own privacy. Two things that you could do are:a. ________________________________________________________________________________________________________________b. ________________________________________________________________________________________________________________10. The terms computer matching and computer profiling describe two different actions. Computer matching occurs when __________________________________________________________________________________________________________Computer profiling occurs when__________________________________________________________________________________________________________11. While we will quickly agree that we don’t want the government invading our privacy there is a balancing act at play here. We do approve of limitedsurveillance if the purpose of the surveillance is ____________________________________________________________________________________________________________________________________________________________________________________ 12. In the hospital scenario given in the paper “How Good is Good Enough”, it seemed that a lot of people did a lot of things right and still there were problems. Identify a problem they experienced and something that could have been done that wasn’t that could have eliminated, minimized or at least made the problem easier to solve when it happened.________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________13. In the 1970’s Diffie and Hellman developed a completely new encryption scheme called public key cryptography. A major advantage that this approach offered was that ______________________________________________________________________________________________________________________14. While there does seem to be considerable concern about the governmentspush for mandatory key escrow encryption there are good business and personalreasons for using some sort of key escrow system. In fact it can be argued that every business that uses encryption needs key escrow because___________________________________________________________ ___________________________________________________________15. E-mail privacy has become a real problem and there are lots of cases being reported of employers reading employees mail. As an employee you shouldfind out what the company policy is on the use of e-mail and regardless of what you find you should avoid (most say never including the authors of the article “Protect your Privacy”) using e-mail to say anything that __________________________________________________________________________________________________________________________16. Studies have shown that in the area of computer crime the person who poses the major threat to a company's computer systems is usuallya. An employee programmer. b. A company manager. c. A hacker.17. Give an example of the over-billing scam that is not in any way a variation of a salami scheme. Why is a scam of this type so hard to stop?______________________________________________________________________________________________________________________________________________________________________________18. In this class, we have attempted to make a distinction between “ethics” and “professional ethics.” Two reasons that has been put forth for


View Full Document

Southern Miss CSC 309 - Final Exam

Download Final Exam
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Final Exam and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Final Exam 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?