You are on page 1of 3

Faculty of Science and Technology

BIT321 Professional Issues in Computing

Time allowed: 48 hours

INSTRUCTIONS TO CANDIDATES

Read the following before answering the examination questions.


1. This is an open book Examination to last for strictly two days
2. Read each question carefully before you answer.
3. Your answers should be based on your analytical skills.
4. Answer ALL questions
5. Number the answers to the questions clearly before answering.
6. Any candidate who duplicates another one’s work will result into nullification of both
candidates’ work.
7. Save your work as “your name and student ID.

Section A
Read through the following case and answer questions Q.1 and Q.2

ToyTimeInc.

Leikessa Jones owns her own consulting business, and has several people working for her.
Leikessa is currently designing a database management system for the personnel office of
ToyTimeInc., a mid-sized company that makes toys. Leikessa has involved ToyTimeInc
management in the design process from the start of the project. It is now time to decide about the
kind and degree of security to build into the system.

Leikessa has described several options to the client. The client has decided to opt for the least
secure system because the system is going to cost more than was initially planned, and the least
secure option is the cheapest security option. Leikessa knows that the database includes sensitive
information, such as performance evaluations, medical records, and salaries. With weak security,
she fears that enterprising ToyTimeInc employees will be able to easily access this sensitive
data. Furthermore, she fears that the system will be an easy target for external hackers. Leikessa

Cavendish University Uganda - Examinations, December 2022 Page 1 of


3
feels strongly that the system should be more secure than it would be if the least secure option is
selected.

Ms. Jones has tried to explain the risks to ToyTimeInc, but the CEO, the CIO, and the Director
of Personnel are all convinced that the cheapest security is what they want. Should Jones refuse
to build the system with the least secure option?

Q.1.
a) Identify the client and vendor in this project and explain why. (5 marks)
b) Evaluate the conflicting concerns of Leikessa and those of ToyTimeInc. (5 marks)
c) How can Leikessa approach this matter? (5 marks)
d) In reference to the British Computer Society Code of conduct, critically assess the specific
violations likely to occur if Ms. Jones was to accept to build the system with the least secure
option. (7 marks)
e) Highlight the danger likely to be faced by ToyTimeInc if the system is to be built with least
secure option. (3 marks)

Total 25 marks
Q.2.
a) Justify the involvement of staff of ToyTimeInc by Ms. Jones in the development process? (8
marks)
b) What problems do you think, the introduction of a database management system is likely to
solve? (9 marks)
c) Describe some of the options Leikessa might have proposed to the client. (8 marks)

Total 25 marks

Section B
Q.3.

a) Why are professional codes of conduct necessary for ICT professionals? (6 marks)
b) The Digital Divide is a virus that brings many setbacks with it – economic, social and
political backwardness. Elaborate. (12 marks)
c) Suggest any the strategic measures that can be taken by governments in order to bridge the
digital divide gap? (7 marks)

Total 25 marks

Q.4.

a) What are Intellectual Property Rights? (5 Marks)


b) As an IT professional, why does protecting intellectual property rights matter? (7 marks)
c) Suggest any six ways in which the privacy of people is currently violated. (6 marks)
d) How can we guard ourselves from privacy violations? (7 marks)
Cavendish University Uganda - Examinations, December 2022 Page 2 of
3
Total 25 marks

End

Cavendish University Uganda - Examinations, December 2022 Page 3 of


3

You might also like