Professional Documents
Culture Documents
EXAM CONDITIONS:
NO REFERENCE MATERIALS PERMITTED
No calculator is permitted
No dictionary permitted
The student may NOT retain the question paper
NUMBER OF QUESTIONS: 17
VALUE: 50%
INSTRUCTIONS TO CANDIDATES:
1. The examination is worth 50% of the overall subject.
2. You must obtain a minimum of 50% in this examination, plus 50% overall, in order to pass the
subject.
3. There are three (3) parts to the examination. You are required to answer ALL parts:
Part A: 10 Multiple Choice Questions (10 x 1 = 10 Marks)
Part B: Short Answer Questions (6 x 5 = 30 Marks)
Part C: Case Study (1 x 10 = 10 Marks)
SIGNATURE …………………………………………………………………………………………….
a. Ethics
b. Virtues
c. Laws
d. Morals
a. Professional malpractice
b. Conflict of interest
c. Whistle-blowing
d. Business intelligence
a. DDoS
b. APT
c. rootkit
d. trojan horse
5. Although people have the right to express opinions, they must exercise care in
their Internet communications to avoid possible charges of which of the
following?
a. Internet censorship
b. doxing
d. defamation
(Answer the following SIX (6) questions. Each question is worth 5 marks.)
A breach of contract occurs when one party fails to meet the terms of a contract.
A material breach of contract occurs when a party fails to perform certain express
or implied obligations, which impairs or destroys the essence of the contract.
Students’ examples of a nonmaterial breach of contract will vary but might include
a software development firm failing to meet a noncritical deadline (such as one
relating to the completion of a weekly status report) set out in the contract or a IT
consulting company that is doing infrastructure work for a company installing a
brand of monitors that is different (but equivalent in function and performance) to
the type detailed in the contract. Students examples should focus on situations in
which the breach does not destroy the essence of the contract.
3. What is the difference between system reliability and system safety? Give an
example of a system that operates reliably but not safely. (5 marks)
Reliability and safety are two different system characteristics. Reliability has to do
with the capability of the system to continue to perform; safety has to do with the
ability of the system to perform in a safe manner. Thus, a system could be reliable
but not safe. For example, an antiaircraft missile control system may continue to
operate under a wide range of operating conditions so that it is considerably
reliable. If, however, the control system directs the missile to change direction and
to fly back into its launching device, it is certainly unsafe.
4. Are there particular areas you think are ripe targets for the application of machine
learning? What are they, and why do you think they could benefit from the
application of machine learning? (5 marks)
A cross-licensing agreement is one in which each company agrees not to sue the
other over patent infringements. Large companies, such as Apple, HTC,
Microsoft, and IBM, sign agreements with each other to obtain the rights to
technologies that they might use in their products. Such an agreement provides a
tremendous amount of development freedom without the risk of expensive
litigation.
Some students will argue that it is not fair that small businesses must pay an
additional cost, from which larger companies are exempt, to license the patents
they use. Others may believe that in a free market, companies are entitled to
enter into agreements that are the most financially beneficial to them.
6. Develop an idea for a social media marketing campaign for one of your favorite
consumer products. Document how you would turn your message viral. (5 marks)
Students may include the use of Facebook, Instagram, Snapchat, Twitter, and
YouTube in their plan to turn their message viral. Students may also identify other
social media sites that would serve as an effective base from which to launch their
campaign.
Joe is working on a project for his computer science course. The instructor has allotted a
fixed amount of computer time for this project. Joe has run out of time, but has not yet
finished the project. The instructor cannot be reached. Last year Joe worked as a student
programmer for the campus computer centre and is quite familiar with procedures to
increase time allocations to accounts. Using what he learned last year, he is able to
access the master account. Then he gives himself additional time and finishes his
project.
You must:
• present an introduction (or background) to your topic and your essay (1 mark);
• include at least two ethical theories to support your answer (4 marks);
• Include examples of professional Codes of Ethics to support your answer (2
marks);
• present a conclusion that briefly outlines your point of view (2 marks); and
• ensure that your essay is well written and structured (1 marks).
You are not required to include any references in your essay, but where applicable you
should cite relevant researchers to support your arguments. State any assumptions
before you start writing your essay.
Answer Guideline
The marking for the essay is subjective and you will need to consider each essay in turn.
However, the marking guide above gives you clear guidelines as to what you should be
looking for. You should break your marking down as follows (you should include these
headings for each student as a summary of the marks that you award to this question):
1. Why (Introduction) – the student should basically state how s/he is going to approach
the remainder of the essay (2 marks). Rather than just launching straight into the essay
and say why it is ethical / unethical the student needs to provide background information
about a use of online tools threaten the privacy of ordinary people (this makes for a much
more rounded essay). This would include the student providing examples of what people
might do to respect the privacy of ordinary people and why their action, expressed quite
generally) could or could not be ethical (1 mark).
2. Body - The body of the essay should address whether use of online tools and access
information of ordinary people is ethical or unethical and as a result it should then
concluded whether an ordinary people have no privacy over such actions. Two ethical
theories – the student must present two ethical theories (4 marks for each) presented in
this subject although if another one is presented this should be considered accordingly
and how this can be applied to support the essay question. The student needs to be able
convincingly demonstrate how each ethical theory can be applied to the ethical dilemma.
3. Professional Code of Conduct – the student should state a relevant Professional Code
of Conduct and what its purpose would be to support an ethical dilemma (2 marks).
4. Conclusion – a summation of what was presented in the body of the essay. (2 marks)
5. Shows a polished and imaginative approach to complete the assignment, very well
fluent writing style appropriate to assignment with accurate grammar and spelling. (1
mark)
END OF EXAMINATION