Professional Documents
Culture Documents
1.George downloads a shareware game from an Internet site. He copies it and gives it to his
friends. Has George violated copyright? Explain your answer.
George has not violated copyright because the law is: ”A user is given the right to (and is encouraged to)
freely copy and distribute shareware software”
2. Nadine works in the Personnel Department and is in charge of the XYZ Company’s employee database. What
are Nadine’s obligations with respect to the database?
She on whom data are kept are aware of what information is being kept and have the opportunity to correct
any inaccurate information.
3. Fred is backing up his hard drive onto a tape drive. Can he legally include the software programs as well as the
data files in this backup? Explain why or why not.
Yes, because he owns the software on a computer?
Buying an upgrade to a program then selling the old version to someone else and keeping the upgrade.
(Legally the upgrade is part of the original program and cannot be separated from it.)
Copying programming code from one piece of software and using it in another.
6. Jane needs the use of a word processor and a presentation program. Her friend Jim wants a spreadsheet and a
database program. They decide to purchase one copy of Microsoft Office. Jane loads Word and PowerPoint on her
1
computer and Jim does the same with Excel and Access on his computer. Is what they have done legal? Explain
your answer.
No, the ownership of the software always belongs to the person or company who holds the copyright.
When you buy the program what you get is a license or right to use the program. You are paying for the
right to use the program not for ownership of the program.
7. List the four main categories of software available to users and briefly describe the user rights for each type.
Commercial Software
Shareware
Public Domain Software
Free Distribution Software
8. Helen works as a word processor for a legal firm. All files are kept on the firm’s network system. Helen is
cautious and saves a second file of her work on the hard drive of the machine she works on. One day the network
goes down and a piece of Helen’s work is needed desperately. April works with Helen and knows of Helen’s
saving the copy. April goes to Helen’s machine and retrieves the file. Has April acted legally? Has she acted
ethically? Explain your answer.
April has acted illegally because: Only people authorized to access data are able to do so.
9_Explain what measures can be taken to ensure the security of data stored in a computer
system.
It measures the number of modems available at your service provider in relation to the number of active
users that use the service
To shoplift or steal something that The individuals on whom data are kept
belongs to another. are aware of what information is being
kept and have the opportunity to
correct any inaccurate information.
2
To lock another person out of his or People authorized to access data use
her own household or car. the information only for the purpose it
is intended
____Slowest______________video,image,audio,text____________________Fastest_________
3
2. What is the difference between downloading and uploading?
-downloading: you load to your computer from internet
-uploading: you load from your computer to internet
3. What are the main software programs used with the Internet?
-TCP/IP
4. List five important factors that should be considered when choosing an Internet Service Provider.
Type of connection
Modem speed
Level of service
Insurance
5. What type of Internet connections provide direct links between the Internet and your personal computer (PC).
PPP,ADSL
6. Which one of the following hardware items will affect the performance of your Internet connection most?
7. When connecting to an overseas site on the Internet are you paying local or overseas telephone rates?
-paying local
8. What is the Australian Call Waiting deactivation code?
9. What are the first ten characters that are common to most document locationidentifiers (URL's)?
4
Review Questions for Session 8
1. What does it mean to perform a backup? Why is it important to perform backups regularly?
Backup contains a complete set of backup, restore, and comparison features. The backup jobs make
backing up regularly easy to do, because you can create backup jobs that describe different backup settings
and open whatever backup job you want to use
2. Identify five possible reasons why backups should be performed.
The possibility of damage to or malfunction of disks and disk drives.
Your expectations and if you are in business, your client's expectations that data are safe, up-to-date and
complete.
To ensure that certain legal obligations (such as tax records, income and expense data etc) can be met if the
information is computerised.
Your or your organisation’s reliance on computers to supply timely access to up-to-date information.
Using the software that comes with devices such as Tape Units.
Using the Backup command of MS-DOS or the Backup Utility of Windows95, Windows 98, Windows Me,
Windows 2000 and Windows XP.
Using third party backup utilities. Some of these can come in the form of shareware.
5
Using special compression utilities such as Pkzip, WinZip, or Arj.
Using the software that comes with devices such as Tape Units.
6. ABC Company’s data files are kept on their network drive N: in a folder named DATA. An incremental backup
is done Mondays through Thursdays with a full backup on Fridays. The backups are done to a tape drive.
Create the listings that would appear in the backup logbook for this process.
28/012003 C:\Windows\ *.dat, *.ini ,*.sys Used WinZip to create file system.zip on D:\;
C:\Msdos.sys a backup of system settings
C:\autoexec.bat
C:\config.sys
1. What is a computer virus? List 7 possible examples of strange behaviour on your computer that might indicate
an infection by a virus.
A virus is an irritating and/or damaging program that deliberately and unwittingly stores itself on the disks of a
computer system
Buying software from less than reliable sources, especially if it may be pirated.
6
Downloading files from bulletin boards or from the Internet.
Only buy software from reputable vendors; do not use pirated software.
Never boot a system from a system disk from another computer system.
Avoid using floppy diskettes that have been used on other systems. If you do make sure you scan them
first.
In a business situation develop and follow site procedures regarding the use of software and all computer
access.
Have a recovery procedure in place in case of infection. This is particularly important in a business
situation.
4. You work as the systems administrator for a large company. Your boss is worried about the possibility of
the system being infected by a virus. You are asked to create a procedure for users to follow with respect to
virus detection and circulate it to all computer users in the company. What information needs to be given to
the users?
Notify all users a virus has been found.
Attempt to establish the cause of the infection.
Isolate all possible infected disks.
Use your AV software to eliminate the virus and clean the disks. If your current software cannot get rid of
the virus, get an upgrade of software that will.
Keep your backups up-to-date, as they may be needed. The virus may have destroyed data files and these
will need to be recovered from you backups.
As a last resort to get rid of the virus, a low-level format of a hard drive may be necessary. This destroys all
files on the disk, so it is very important that your backups are current.
http://www.microsoft.com/
http://www.swin.edu.au/
http://www.ibm.com.au/
http://www.sofcom.com.au/
http://www.eisa.net.au/
http://www.uct.ac.za/
5. What program has to be running the whole time you are connected to the Internet?
Hystory
6. What is the difference between e-mail, newsgroups, FTP and the World Wide Web?
World Wide Web. The collection of hypertext documents made up of multi-media material.
Newsgroups Discussion groups on USENET.
E-mail Electronic Mail. Messages sent and received by users of the Internet.
FTP File Transfer Protocol. One of the main ways to retrieve files from computers on the Internet
8
9