Download King Saud University College of Computer and Information Sciences

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Information privacy law wikipedia , lookup

Malware wikipedia , lookup

Computer security wikipedia , lookup

Cyberattack wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Cybercrime wikipedia , lookup

Transcript
King Saud University
College of Computer and Information Sciences
Computer Science Department
Ethical Issues in Computing
& Research Methods
Tutorial #1
First Semester
1436-1437
CSC 304
‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
1. Analyze the relationships among ethical, social, and political issues that are
raised by information systems.
2. Evaluate the impact of contemporary information systems and the Internet on the
protection of individual privacy and intellectual property.
3. Assess how information systems have affected everyday life.
4. In the world of computing, the essential element that controls how computers are
used is
a) ethics
b) legal laws
c) security requirements
d) business demands
Answer: A
5. The guidelines for the morally acceptable use of computers in society are
a) computer ethics
b) privacy
c) morality
d) legal systems
6. The issues that deal with the collection and use of data about individuals is
a) access
b) property
c) accuracy
d) privacy
Answer: D
7. The ethical issue that involves who is able to read and use data is
a) access
b) property
c) accuracy
d) privacy
Answer: A
8. Privacy is primarily a(n) __________ matter.
a) ethical
b) legal
c) security
d) business
Answer: A
9. A computer crime is __________
a) any activity in which the thief uses computer technology
b) an illegal action in which the perpetrator uses special knowledge of computer
technology
c) an immoral action in which the thief uses special knowledge of computer
technology without the other person knowing
d) any threat to computer or data security
Answer: B
10.
__________ commit the majority of computer crimes.
a) Employees
b) Hackers
c) Outside users
d) Members of organized crime
Answer: A
11.
People who gain unauthorized access to computers for the fun of it, but do not
intentionally do damage, are __________.
a) employees
b) hackers
c) crackers
d) members of organized crime
Answer: B
12.
People who gain unauthorized access to computers for the purpose of doing
damage are called __________.
a) employees
b) hackers
c) members of organized crime
d) crackers
Answer: D
13.
A program that migrates through networks and operating systems and attaches
itself to different programs and databases is a __________.
a) virus
b) worm
c) denial-of-service attack
d) damage
Answer: A
14.
Ethical issues are the same as legal issues.
Answer: False
15.
Viruses are spread from computer to computer through networks and operating
systems.
Answer: True
16.
Worms are programs that primarily attach themselves to programs and databases
and migrate through networks and operating systems.
Answer: False
17.
Trojan horses are programs that attempt to slow down or stop a computer system
or network.
Answer: False