Get premium membership and access revision papers, questions with answers as well as video lessons.

Sct 104: Computer Society And Ethics  Question Paper

Sct 104: Computer Society And Ethics  

Course:Computer Science And Engineering

Institution: Kenyatta University question papers

Exam Year:2010



KENYATTA UNIVERSITY
UNIVERSITY EXAMINATIONS 2009/2010
FIRST SEMESTER EXAMINATION FOR THE DEGREE OF BACHELOR OF
SCIENCE (COMPUTER SCIENCE AND SOFTWARE ENGINEERING)
SCT 104:
COMPUTER SOCIETY AND ETHICS

DATE: Tuesday, 27th July, 2010


TIME: 11.00 a.m. – 1.00 p.m.
------------------------------------------------------------------------------------------------------------
INSTRUCTIONS:
Answer question ONE and other TWO questions.
Question One (30 marks)
a)
Explain the term ethics from computer technology point of view. (3 marks)
b)
State and explain three theories related to business ethics.
(6 marks)
c)
In 1960s Donn Parker made a state “that when people entered the computer center
they left their ethics at the door”. Briefly explain the statement and give an
example that supports your argument.



(5 marks)
d)
Explain the copyright act and how it can be applied in the field computing.










(4 marks)
e)
“ABSOLUTE SECURITY IS UNATTAINABLE, AND DOING NOTHING
IS DANGEROUS, SO HOW MUCH SECURITY IS ENOUGH” MARTIN
KOCHANSKI. So in your own opinion how much security is enough, explain.









(6 marks)
f)
i)
Define the term hacking.

ii)
Explain how an organization can use hacking actions in an ethical way to
protect their data and information systems

(6 marks)








Page 1 of 3


Question Two (20 marks)
a)
Most countries have come up with what is referred to as the “Data Protection
Principles”, briefly explain its aim.



(5 marks)
b)
State and explain any five “Data Protection Principles” referred to (a) above.










(10 marks)
c)
Define the term computer crime and state any four types of computer crime.










(5 marks)

Question Three (20 marks)
a)
Most companies strive to extend internet services to all members of their staff.
However, the management may not be aware of the potential misuse of the
internet service which is likely to be perpetuated by the members of staff. As part
of your internship responsibility; you have been asked by the management to
highlight five possible misuse of the internet services that are likely to be
perpetuated by the employees and indicate how such misuse could be minimized.









(10 marks)
b)
Briefly explain what you understand by the term “Internet Addiction Disorder
(IAD) and outline in details any four symptoms exhibited by an individual
suffering from the disorder.




(10 marks)

Question Four (20 marks)
a)
A patent protects inventions and encourages inventors to innovate by granting the
patent holder exclusive rights to the invention for 20 years. Explain any five
rights a patent owner has.





(10 marks)
b)
A trademark is a word, name, symbol or device used to distinguish one company
from another. One to decide on whether infringement has occurred on a
trademark or not, what factors should be considered?

(10 marks)

Question Five (20 marks)
a)
State and explain the four ethical philosophies.


(8 marks)
b)
Explain the following theories as related business ethics more so when a manager
is to make a decision related to the business of the organization.






Page 2 of 3


i)
Stockholders theory
ii)
Social contract theory
(4 marks)
c)
There are ethical principles that have survived throughout recorded history with
roots in many cultures but which to follow depends on you as an individual. State
and explain any of the four principles.



(8 marks)






Page 3 of 3






More Question Papers


Popular Exams



Return to Question Papers