Get premium membership and access revision papers, questions with answers as well as video lessons.

Inf371:Law, Ethics And Professional Practice In Informatics Question Paper

Inf371:Law, Ethics And Professional Practice In Informatics 

Course:Bachelor Of Science In Information Science

Institution: Moi University question papers

Exam Year:2016



MOI UNIVERSITY
OFFICE OF THE CHIEF ACADEMIC OFFICER
UNIVERSITY EXAMINATIONS
2015/2016 ACADEMIC YEAR
FOURTH YEAR FIRST SEMESTER EXAMINATION
FOR THE DEGREE OF
BACHELOR OF SCIENCE
IN
INFORMATION SCIENCES
COURSE CODE: INF 371
COURSE TITLE: LAW, ETHICS AND PROFESSIONAL PRACTICE IN INFORMATICS
DATE: 16TH AUGUST, 2016 TIME: 2.00 P.M. – 4.15 P.M.

INSTRUCTION TO CANDIDATES
• SEE INSIDE



THIS PAPER CONSISTS OF (2) PRINTED PAGES PLEASE TURN OVER
MOI UNIVERSITY
SCHOOL OF INFORMATION SCIENCES
DEPARTMENT OF INFORMATION TECHNOLOGY
FIRST SEMESTER 2015/2016 ACADEMIC YEAR EXAMINATIONS
COURSE CODE: INF 371 TIME: 2 Hrs 15Mins
COURSE TITLE: LAW, ETHICS AND PROFESSIONAL PRACTICE IN INFORMATICS
==============================================================================
INSTRUCTIONS TO CANDIDATES:
• Answer question ONE and any other TWO questions

QUESTION ONE (30 MARKS)
1. The term “free software” means
A. Software to borrow
B. Unlicensed software
C. Licensed software with permission to copy freely
D. Low-cost software
E. Copyright violation
2. Pirating software is an example of violating:
A. Morals
B. Ethics
C. Laws
D. Character
3. Which of the following federal laws restricted the federal government’s right to match computer files for the purpose of determining eligibility for government programs or identifying debtors?
A. Electronic Communications Privacy Act
B. Computer Matching and Privacy Act
C. Small Business Computer Security and Education Act
D. Counterfeit Access Device and computer Fraud and Abuse Act
4. IT raises intellectual-property issues because:
A. We live in a mass culture
B. People are greedy
C. People are generous
D. Copying is easier
E. We live in an industrial society
5. The view that society’s needs take priority over personal ones is called
A. Communitarianism
B. Liberal individualism
C. Communism
D. Deontology
E. Utilitarianism
6. Predicting behavior of an individual based on data analysis is
A. Computer profiling
B. Data mining
C. A claim right
D. A denial-of-service attack
E. Libel
7. The fact that e-mail has provided an entirely new means of communication is reffered to as:
A. The transformation factor
B. The invisibility factor
C. Logical malleability
D. The communications factor
8. Copyright protects
A. Ideas
B. Profits
C. Expression of ideas
D. Inexperience
E. None of these
9. The part of the ACM Code of Ethics and Professional Conduct that says the ACM member has a responsibility to support only legal use of computing resources is:
A. General Moral Imperatives
B. More Specific Professional Responsibilities
C. Compliance with the Code
D. Organizational Leadership Imperatives
10. Which of the following is not a main responsibility of the software engineering Code of Ethics and Professional Practice?
A. Responsibility to constituents
B. Professional performance
C. Social responsibility
D. Self improvement
11. How would an ethical egoist rationalize not stealing data to further their career?
A. I should not steal data because my peers would think it was wrong
B. I should not steal data because if I was caught my career would be ruined
C. I should not steal data because someone else worked hard to obtain that data
12. Sue was not hired for a job that she applied for because the job was given to the owner of the company’s nephew who had no prior work experience. This exemplifies which weakness of egoism?
A. Prejudice
B. Provincial
C. Arbitrary
D. Conservative
13. Trust in a professional group is based upon:
A. Close collaboration within the group
B. A set of shared values and assumptions
C. Members not accepting bribes
14. An ethical theory system does not have which of the following characteristics?
A. Non-contradictory
B. Scientific
C. Systematic
D. Action-guided
15. Direct use of text found on the internet
A. Is free without attribution
B. Requires a reference
C. Requires quoting and a reference
D. Costs money
E. None of these
16. Utilitarianism is based on concern about:
A. Universal rules
B. Results of actions
C. Divine law
D. Libertarianism
E. Communitarianism
17. According to our sources, risks concerning children are raised because
A. Adults look for adult sex on the Internet
B. Sexual content is widely available for free on the Internet
C. The Internet is full of sex
D. The Internet encourages wanton sex
E. Laws encourage distribution of sexual images on the Internet
18. The social purpose of recognizing intellectual property rights has been
A. To enable maximum profit
B. To encourage innovation
C. To discourage sharing
D. To discover geniuses
E. None of these
19. Plagiarism
A. Violates academic integrity but is not illegal
B. Usually brings a lawsuit
C. Is a criminal offense
D. Is subject to CID investigation
E. Is encouraged by universities
20. Copyright infringement
A. Is a civil offense at most
B. Is always a criminal offense
C. Has been in some forms a criminal offense since the 18th century
D. Has recently been criminalized in some forms
E. No longer occurs
QUESTION TWO (20 MARKS)
a) Your friend just told you that he is developing a worm to attack the administrative systems at your university. The worm is “harmful” and will simply cause a message – “Let’s party!” – to be displayed on all workstations on Friday afternoon at 3 p.m. By 4 p.m., the virus will erase itself and destroy all evidence of its presence.
i. Are there any ethical or legal issues involved in this case? Explain your answer. (6 marks)
ii. Explain what would you say or do depending on your answer to (i). (6 marks)
b) Explain FOUR benefits of professional code of ethics to identified stakeholders. (8 marks)
QUESTION THREE (20 MARKS)
a) Explain FOUR forces that are changing ICT professional services and the ICT industry. (10 marks)
b) Reliance Merchants engaged Quick Solutions to write a custom application to manage its operation. Instead of delivery in a month’s time as agreed, Quick Solutions took two months because some user requirements were unclear. Reliance Merchants decided to reduce agreed payment by half and Quick Solutions went to court to seek redress. As a judge, what would be your decision and why? (10 marks)
QUESTION FOUR (20 MARKS)
a) Read the below scenarios and advise on which law breached in each case and why?
You are travelling in a bus and a marketer comes in with many types of drugs which he claims to be good in curing stomach upsets. You buy one of the drugs and because this is a mobile drug seller, you are not given a receipt. In the evening after taking the drug you develop serious stomach pain. Being rushed to the nearby hospital, the doctor says that the pain is as a result of a drug that you have just taken which he says has a high content poison.
i. In this case who do you think you can sue, the bus owner or the marketer, and why? (5 marks)
ii. Explain the laws which have been breached by both the bus owner and the marketer. (5 marks)
b) Explain the impact of ICTs on Privacy and Confidentiality (5 marks)
c) Discuss the limitations to data protection laws (5 marks)
QUESTION FIVE (20 MARKS)
a) Outline the “Ten Commandments of Computer Crime” (10 marks)
b) Explain FIVE actions that may cause defamation through ICTs (10 marks)






More Question Papers


Popular Exams



Return to Question Papers