DOC PREVIEW
Southern Miss CSC 309 - EXAM 2

This preview shows page 1 out of 4 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 4 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 4 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

EXAM 2 Please put Your NameCSC309 on the Back of the LastMiller/Spring 03 Page1.4 What was the Bhopal incident mentioned in this class?_______________________________________________________________________________________________________________________________________________________________________________________2.4 Extensive studies of mishaps have identified three primary causes. (1) Mishaps are almost always caused by _________________________________________________________________________________(2) The failure ___________________________is often a contributing factor (sometimes the causal factor) of mishaps. Another thing we know from studying mishaps is that (3) they often involve problems in subsystem ___________________________3.4 In spite of our understanding of the impact of software bugs and the difficulty in identifying and correcting them, we still see a strong tendency to replacehardware with software. Give two reasons why a. ___________________________________________________________b. ___________________________________________________________c. Uses less space and power.d. Provide more information in a more meaningful form.4.4 When contrasting hardware and software use in safety-critical situations we say, “Software exhibits weak-link behavior”. We do not say that about hardware because with hardware________________________________________________________________________________________________________________________6.4 When we discussed the interface-design-for-safety topic we discussed the design problem of providing an interface between a computer system that performs a critical process control function and the human operator who might be called upon without warning to take over control following some catastrophic event. Two of the three things we mentioned are:a. ______________________________________________________________________________________________________________________b. ______________________________________________________________________________________________________________________7.5 While the use of copyright with software tends to make the software more expensive it is argued that the impact on software quality is to improve it because it gives the author of the code a financial incentive to produce a quality product.8.5 While patents offer a higher level of protection for software than does either trade secrets or copyrights, they are usually not a very practical choice because (any three good reasons)a. ___________________________________________________________b. ___________________________________________________________c. ___________________________________________________________9.5 A copyright protects only the form of the expression, not the ideas expressed in the copyrighted material. (T, F)10.5 Sam teaches at a public university and has purchased a book that contains material that Sam would like to share with his class. Before going to the Xerox machine and making copies of copyrighted material that he will distribute to his class. Sam thinks through the four factors for determining fair use. You list three: a. _____________________________________________________________________________________________________________________b. _____________________________________________________________________________________________________________________c. ______________________________________________________________________________________________________________________11.5 If you purchase software that had Trade secret protection then your obligation to honor the trade secret is____________________________________________________________________________________________________________________________________________________________________________________12.6 Congress shall make no law ... abridging the freedom of speech, or of the press....” (First Amendment). We do however see certain unevenness in how the first amendment is applied. If we consider Radio, TV, and Print, then the highest protection would be given to: ____________________________________________________________________________________________________________________________________________________13.6 When the First Amendment was written there was no TV or Internet. But thefreedom of speech, which it guarantees, has been applied evenly to the “new” technologies. (T, F)14.6 The First Amendment gives me the right to say anything at anytime [even though that might not be the brightest thing to do.] (T, F)15.6 There are words that can be used in print but not said on the radio. (T, F)16.6 Give two arguments against requiring the Telephone Company, a common carrier, to be responsible for the content of messages it transmits.a. ______________________________________________________________________________________________________________________b. ______________________________________________________________________________________________________________________17.6 Explain how a remailing service can let you post messages to a news group anonymously, but still be able to get replies to the message you sent.____________________________________________________________________________________________________________________________________________________________________________________18.6 The Child Online protection Act, (which was an attempt to address problems that the Supreme Court had with the first anti-porn Net law), was again blocked by a Federal Judge. The Judge argued that his actions were in the best interest of children because____________________________________________________________________________________________________________________________________________________________________________________19.6 First Amendment protection is for offensive and/or controversial speech and ideas. (T, F) 20.6 If “A” has more First Amendment Protection than does “B” then “A” can probably use more “dirty” words than “B” can without getting in trouble. (T,F)21.6 The author of a book can be sued for libel. (T, F)22.6 The bookstore that sells a book which libels a person can be sued. (T, F)\Look for questions on the article “How Good is Good


View Full Document

Southern Miss CSC 309 - EXAM 2

Download EXAM 2
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view EXAM 2 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view EXAM 2 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?