DOC PREVIEW
Southern Miss CSC 309 - Final Exam

This preview shows page 1-2-3 out of 8 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

309 Spring 03 Hattiesburg Please put name onFinal Exam back of last pageMiller1. If we do a perfect job of developing the skills for making perfect ethical decisions and we use these skills to perfectly analyze all of the situations where ethics plays a factor to arrive at a best course of action then for this to not be another totally useless academic exercise we need to ________________________________________________________________________________________________________________________2. In class we discussed a number of informal guidelines for making ethical decisions. These guidelines, designated by names such as the Mom Test, the TVTest, and the Newspaper Test, all seemed to be variations on the thought that if____________ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _____________ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _3. Give a brief definition of each of the following:Altruism _________________________________________________________________________________________________________________Egoism __________________________________________________________________________________________________________________4.0 Given a situation that calls for an evaluation of competing responses, whatwould you need to do to apply a utilitarian approach to arrive at your decision on what to do?____________ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _____________ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _____________ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _ _ _ _ ______ _5. When we give up total privacy from our government through constitutionally limited and approved surveillance of people and activities, one thing that we gain is ____________________________________________________________________________________________________________________________________________________________________6. Credit bureaus collect lots of data on each of us. On the surface, that appears to be a rather major invasion of personal privacy. But this turns out to beanother of those tradeoffs we keep talking about because when we give up this privacy protection we gain what in return?_____________________________________________________________________________________________________________________________________________________________________________________7. The Code of Fair Information Practices, produced by a Governmental Advisory Committee in 1973, has become the basis for privacy legislation aroundthe world. The set of five principles includes:a. ________________________________________________________________________________________________________________________b. _________________________________________________________________________________________________________________________c. ________________________________________________________________________________________________________________________8. The terms computer matching and computer profiling describe two different actions.Computer matching occurs when ________________________________________________________________________________________________Computer profiling ________________________________________________________________________________________________________________________________________________________________________9.3a Before issuing a court order for a wiretap, a judge must review a lengthy affidavit that sets forth all the evidence and agree with the assertions contained there in. With regard to other investigative techniques the affidavit must also demonstrate that other investigative techniques have been tried without success, or won't work, or would be too dangerous. Also,law enforcement needed to demonstrate probable cause that the subject under investigation is committing some specific serious, felony and communications concerning the offense will beobtained through the intercepts. Because of these and other safeguards placed on obtaining permission to do a wiretap, fewer than half of the requests for one are honored. (T, F)10. While there does seem to be considerable concern about the governments push for mandatory key escrow encryption there are good businessand personal reasons for using some sort of key escrow system. In fact it can be argued that every business that uses encryption needs key escrow because __________________________________________________________ ____________________________________________________________________________________________________________________11. In the 1970’s Diffie and Hellman developed a completely new encryption scheme called public key cryptography. A major advantage that this approach offered was that __________________________________________________________________________________________________________________________12. What is Steganography?_______________________________________________________________________________________________________________________________________________________________________________________13.4 What was the Vincennes incident mentioned in this class?_______________________________________________________________________________________________________________________________________________________________________________________14.4 Extensive studies of mishaps have identified three primary causes. (1) Mishaps are almost always caused by _________________________________________________________________________________(2) The failure ___________________________is often a contributing factor (sometimes the causal factor) of mishaps. Another thing we know from studying mishaps is that (3) they often involve problems in subsystem ___________________________15.5 While the use of copyright with software tends to make the software more expensive it is argued that the impact on software quality is ____________________________________________ because______________________________________________________________________________________________________________________16.5 While patents offer a higher level of protection for software than does either trade secrets or copyrights, they are usually not a very practical choice because (any three good reasons)a. ___________________________________________________________b. ___________________________________________________________c. ___________________________________________________________17.5 Sam teaches at a public university and has purchased a


View Full Document

Southern Miss CSC 309 - Final Exam

Download Final Exam
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Final Exam and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Final Exam 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?