You are on page 1of 2

Name : _____________________________ Schedule / Date : _____________ Prelim Exam : CpE 522

I. Identification. Write your answer on the space provided. No erasure.


______________ 1. A creative programmer who wrote clever code.
______________ 2. A software controlled radiation-therapy machine used to treat people with cancer.
______________ 3. Biological characteristics to a unique person.
______________ 4. Combining and comparing information from more than one database.
______________ 5. How many people died on the therac 25 radiation overdose?
______________ 6. Means freedom from intrusion and surveillance and control of information about one self.
______________ 7. Right that impose obligation on others to provide certain things.
______________ 8. The right to act without interference.
______________ 9. The use of hacking expertise to promote a political cause.
______________ 10. Using data in computer files to predict likely behaviors of people.
______________ 11. Using information for a purpose other than the one for which it was obtained.
______________ 12. What is the normal dosage of the radiation therapy?
______________ 13. Under the USAPA, the government can monitor online activity without a court order.
______________ 14. Is it a crime to access, alter, damage, or destroy information on a computer without authorization?
______________ 15. The title of the book we are using.
II. Enumeration.
1 – 6.) 6 benefits of computer application 10 – 15.) 6 negative impacts of new technology
1. 10.
2. 11.
3. 12.
4. 13.
5. 14.
6. 15.
16 – 20.) 5 positive impacts of new technology
7 – 9.) 3 facts about computer errors 16.
7.
17.
8.
18.
9.
19.
20.
III. Acronym.
1. CERT 6. NIS
2. CFAA 7. NSS
3. FCRA 8. SSN
4. GPS 9. USAPA
5. NIPC 10. WWW
IV. Essay
1. A confidential file containing the names of about 4000 AIDS patients was sent from a county health department to a
newspaper, presumably by a disgruntled employee (unhappy/dissatisfied).
a. Would this have been more or less likely to have happened if the names were in paper files, not electronic files? Why?
b. What are some ways this leakage of sensitive data could have been prevented?

2. Chris logs on to your computer at night while you sleep and uses some of your software. Robin takes your car at night
while you sleep and drives it around for a awhile. (Neither has your permission; neither does damage.)
a. List several characteristics of the two events that are similar (characteristics related to the effects of the events, ethics,
legality, risks, etc.)
b. List several characteristics of the two events that are different.
c. Which would offend you more? Why?

You might also like