Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
King Saud University College of Computer and Information Sciences Computer Science Department Ethical Issues in Computing & Research Methods Tutorial #1 First Semester 1436-1437 CSC 304 ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ 1. Analyze the relationships among ethical, social, and political issues that are raised by information systems. 2. Evaluate the impact of contemporary information systems and the Internet on the protection of individual privacy and intellectual property. 3. Assess how information systems have affected everyday life. 4. In the world of computing, the essential element that controls how computers are used is a) ethics b) legal laws c) security requirements d) business demands Answer: A 5. The guidelines for the morally acceptable use of computers in society are a) computer ethics b) privacy c) morality d) legal systems 6. The issues that deal with the collection and use of data about individuals is a) access b) property c) accuracy d) privacy Answer: D 7. The ethical issue that involves who is able to read and use data is a) access b) property c) accuracy d) privacy Answer: A 8. Privacy is primarily a(n) __________ matter. a) ethical b) legal c) security d) business Answer: A 9. A computer crime is __________ a) any activity in which the thief uses computer technology b) an illegal action in which the perpetrator uses special knowledge of computer technology c) an immoral action in which the thief uses special knowledge of computer technology without the other person knowing d) any threat to computer or data security Answer: B 10. __________ commit the majority of computer crimes. a) Employees b) Hackers c) Outside users d) Members of organized crime Answer: A 11. People who gain unauthorized access to computers for the fun of it, but do not intentionally do damage, are __________. a) employees b) hackers c) crackers d) members of organized crime Answer: B 12. People who gain unauthorized access to computers for the purpose of doing damage are called __________. a) employees b) hackers c) members of organized crime d) crackers Answer: D 13. A program that migrates through networks and operating systems and attaches itself to different programs and databases is a __________. a) virus b) worm c) denial-of-service attack d) damage Answer: A 14. Ethical issues are the same as legal issues. Answer: False 15. Viruses are spread from computer to computer through networks and operating systems. Answer: True 16. Worms are programs that primarily attach themselves to programs and databases and migrate through networks and operating systems. Answer: False 17. Trojan horses are programs that attempt to slow down or stop a computer system or network. Answer: False