MC7304-Professional Ethics



E.G.S.PILLAY ENGINEERING COLLEGE , NAGAPATTINAM

DEPARTMENT OF COMPUTER APPLICATIONS

QUESTION BANK IN REVISED BLOOM’S TAXONOMY

ACADEMIC YEAR: 2016-17 SEMESTER: ODD

BRANCH: MCA YEAR: II SEMESTER: III

SUB. CODE & NAME : MC7304 / PROFESSIONAL ETHICS

Unit -1 Computer Ethics Introduction and Computer Hacking

PART- A

|Q. No |Question |BTL |

|1 |Define Computer Ethics. |1 |

|2 |Define logical malleability. |1 |

|3 |Summarize the three kinds of invisibility factors. |2 |

|4 |Examine how one can identify ethical issues? |3 |

|5 |Illustrate the four guiding principles for understanding ethical issues and making informed decisions? |3 |

|6 |What is computer hacking? |1 |

|7 |Distinguish between Ethics and Law. |2 |

|8 |Classify the two ethical theories. |3 |

|9 |Define Kantianism. |1 |

|10 |Compose the key issues related to computer ethics? |5 |

|11 |Analyze Why computer ethics is unique? |4 |

|12 |Write about Utilitarianism theory. |1 |

|13 |Differentiate the Kantianism and Consequentialism theories. |2 |

|14 |Analyze the various issues for making ethical decisions. |4 |

|15 |Compose the motive behind the hacking. |6 |

|16 |Summarize Ethical Dilemma. |2 |

|17 |Predict the five principles values of hacker ethic. |5 |

|18 |Analyze intrinsic and instrumental goods. |4 |

|19 |Define code of conduct. |1 |

|20 |Assess the important aspects of BCS code of conduct. |6 |

PART - B

|Q. No |Question |BTL |

|1 |Describe the following(i) Importance of computer ethics (ii) to Identifying an ethical Issues (7+6) |1 |

|2 |Describe the different types of ethical dilemma with examples (13) |2 |

E.G.S.PILLAY ENGINEERING COLLEGE , NAGAPATTINAM

DEPARTMENT OF COMPUTER APPLICATIONS

QUESTION BANK IN REVISED BLOOM’S TAXONOMY

|13 |Identify the following (i) Extent and nature of software piracy (ii) Ways to minimize the software piracy (7+6) |4 |

|14 |Analyze about (i) Main Ethical and Professional issues (ii) Benefits of Free and Open Source Software (7+6) |4 |

E.G.S.PILLAY ENGINEERING COLLEGE , NAGAPATTINAM

DEPARTMENT OF COMPUTER APPLICATIONS

QUESTION BANK IN REVISED BLOOM’S TAXONOMY

|19 |Assess some of the advantages of RFID. |6 |

|20 |Define Cookie. |1 |

E.G.S.PILLAY ENGINEERING COLLEGE , NAGAPATTINAM

DEPARTMENT OF COMPUTER APPLICATIONS

QUESTION BANK IN REVISED BLOOM’S TAXONOMY

-----------------------

|3 |(i) Compose the term 'computer Hacking' (ii) Predict different types of Hackers (7+6) |5 |

|4 |Illustrate about (i) Invisibility factor of computer operations (ii) Key issues releated to to the computer ethics (7+6) |3 |

|5 |Explain the following (i) Intrinsic and Instrumental Value (ii) Acts versus rules (6+ 7) |2 |

|6 |Write short note on (i) In what way the hackers have been represented? (ii) The ethical position on hacking (6+7) |1 |

|7 |Investigate the following (i) Worms (iii) Spyware (6+7) |4 |

|8 |Illustrate about (i) the most common types of viruses. (ii) How to evaluate alternatives from various perspective in ethical decision making |3 |

| |process (7+6) | |

|9 |Write short notes on (i) Trojan Horses (ii) Bombs (iii) Denial-of- service (5+ 4+4) |1 |

|10 |Assess the following (i) principal values of Hacker Ethics (ii) Motives behind Hacking (7+6) |6 |

|11 |Describe the relationship between ethics and laws with an example. |1 |

|12 |Explain the different types of destructive programs? |2 |

|13 |(i) Compare the strength and weakness of Kantianism and Consequentialism theories (ii) How to understanding ethical issues and making decisions |4 |

| |with help of ethical framework? (7+6) | |

|14 |Analyze the following (i) main arguments against hacking (ii) the main ethical defences of hacking (7+6) |4 |

E.G.S.PILLAY ENGINEERING COLLEGE , NAGAPATTINAM

DEPARTMENT OF COMPUTER APPLICATIONS

QUESTION BANK IN REVISED BLOOM’S TAXONOMY

PART -C

|Q. No |Question |BTL |

|1 |Describe about (i) BCS code of conduct in detail (ii) The snapshot of key ethical theories (8+7) |1 |

|2 |(i) What are destructive programs and why do people write and spread destructive programs? Explain how computer viruses and other destructive |2 |

| |programs spread. (8) (ii) Discuss about the frameworks for ethical decision making in detail (7) | |

|3 |Assess the professional code of conduct and their roles in detail. (15) |6 |

|4 |Examine about to hack or not to hack and ethical positions on hacking?justify (15) |3 |

Unit - II Aspects of Computer Crime and Intellectual Property Rights

PART- A

|Q. No |Question |BTL |

|1 |Define Computer crime. |1 |

|2 |Mention the different types of computer crime. |3 |

|3 |Identify the different types of computer fraud with an example. |4 |

|4 |Analyze the reasons for the corporate espionage. |4 |

|5 |Illustrate the various computer security measures. |3 |

|6 |What is meant by software audit control? |1 |

|7 |Construct the main duties and obligations of professional. |5 |

|8 |Define the term IPR. |1 |

|9 |Identify any four Ethical and professional issues in IPR. |4 |

|10 |Assess the advantages of Intellectual Property Rights. |6 |

|11 |What are patents? |1 |

|12 |Outline the term Copyright. |2 |

|13 |Assess the term trademark. |6 |

|14 |Illustrate the ways to violate trademark. |3 |

|15 |Discuss some of the common software issues. |2 |

|16 |Summarize the two agencies that protect copyright. |2 |

|17 |Differentiate between trademark, patent and copyright. |2 |

|18 |Define Software Piracy. |1 |

|19 |Find out the various activities involved in software piracy. |1 |

|20 |Compose the benefits of free and open source software. |5 |

E.G.S.PILLAY ENGINEERING COLLEGE , NAGAPATTINAM

DEPARTMENT OF COMPUTER APPLICATIONS

QUESTION BANK IN REVISED BLOOM’S TAXONOMY

PART-B

|Q. No |Question |BTL |

|1 |Describe the different types of computer crimes. (13) |1 |

|2 |Discuss about (i) The main duties and obligations of professional. (6) (ii) Nature of Intellectual Property Rights (7) |2 |

|3 |What is corporate Espionage? Illustrate the various reasons of Corporate Espionage.(13) |3 |

|4 |Illustrate (i) computer technology and intellectual property (ii) List some features of Intellectual Properties. (7+6) |3 |

|5 |Compose (i) Unauthorized use of computer at work (i) Harassment and sexually-related Material (6+7) |5 |

|6 |Analyze the following (i) Firewall (ii) Key strength of password (7+6) |4 |

|7 |Define Encryption. Describe the various types of Encryption. (13) |1 |

|8 |Describe the following (i) Antivirus Software (ii)Biometrics (7+6) |1 |

|9 |Assess the concepts of (i) Audit Control Software (ii) Access Control (8+5) |6 |

|10 |Describe about (i) Copy Right (ii) Patents (8+5) |1 |

|11 |Explain in detail about (i) Trade Marks (ii) Trade Secrets (8+5) |2 |

|12 |Describe the following (i) some examples of Common Hacking Tactics (ii) ) Some common software issues (6+7) |2 |

PART- C

|Q. No |Question |BTL |

|1 |What is mean by Computer fraud? Discuss about the various techniques for computer fraud. (15) |2 |

|2 |(i)State and explain the various computer security measures with its limitations (10) (ii) How is due diligence different from due care and why |1 |

| |are both important (5) | |

|3 |What is intellectual property? Describe the types of intellectual property (IPR) in details (10) |3 |

| |Briefly differentiate between free software and open source software.(5) | |

|4 |What is software Piracy? Explain different activity in software piracy. (15) |4 |

Unit- III Regulating Internet Content, Technology and Safety

PART-A

|Q. No |Question |BTL |

|1 |Define Free Speech. |1 |

|2 |Illustrate the laws restricting Free Speech. |3 |

|3 |Summarize the intellectual consequences of Denial of Free Speech. |6 |

|4 |Define Censorship. |1 |

|5 |Discuss the merits of censorship in regulating internet content. |2 |

|6 |Differentiate between self-censorship and soft censorship. |2 |

|7 |List out the most problematic forms of speech on the internet? |1 |

|8 |Analyze the internet privacy. |4 |

|9 |What contents must be filtered or blocked from Internet? |1 |

|10 |Compose anonymity on the internet. |5 |

|11 |Examined about chained re-mailing. |4 |

|12 |Discuss out some ethical and professional issues. |2 |

|13 |Illustrate the privacy in an information security context. |3 |

|14 |What is meant by cancelbot? |3 |

|15 |What is meant by risk benefit analysis? |1 |

|16 |Invent some of Risk exposure assessment. |5 |

|17 |What is safety? Give an example. |4 |

|18 |Give the outline to assess the risks in workplace. |2 |

PART-B

|Q. No |Question |BTL |

|1 |Describe the following (i) types of regulatory options (ii) Defense of freedom Expression (7+6) |1 |

|2 |Describe (i) Laws upholding free Speech (ii) Laws restricting free speech (7+6) |2 |

|3 |Analyze the following (i) Types of censorship tools (ii) Anonymous Expression for and against (6+7) |4 |

|4 |Describe about (i) Internet Technologies supporting Free Speech (ii) Internet Technologies Tools for censorship (6+7) |1 |

|5 |Assess the various impact of computer technology over privacy.(13) |6 |

|6 |Explain the following (i) Cookies (ii) Spam (7+6) |2 |

|7 |Analyze the concept of RFID along with its implications and advantages. |4 |

|8 |Illustrate about (i) List out the various types of risks. Explain (ii) How to reduce risks? Examine the various steps involved in reducing the |3 |

| |risks.(7+6) | |

|9 |Compose the concepts of safety and risk assessment in detail. (13) |5 |

|10 |Describe about the Risk benefit analysis with an example. (13) |1 |

|11 |Describe about the personal and public risk with example. (13) |1 |

|12 |Explain the following (i) Uncertainties in design (ii) Incentives to reduce the risk. (7+6) |2 |

|13 |Illustrate the ethical and professional issues in Internet. (13) |3 |

|14 |Explain the following (i) improved safety with an example (ii) When testing is inappropriate for safety. (7+6) |4 |

PART -C

|Q. No |Question |BTL |

|1 |(i) Discuss about technical and non-technical internet content censorship methods (ii) What are pros and cons of freedom of expression on the |2 |

| |internet? (10+5) | |

|2 |Assess the information about Free speech and the internet in briefly. (15) |6 |

|3 |(i) What is risk assessment and how does it relate to information technology specifically and explain mechanisms for reducing risks? (ii) |1 |

| |Describe about the important of regulating internet content in detail (8+7) | |

|4 |Show the impact of information technology on privacy and how can information technology itself solve Concerns. (15) |3 |

E.G.S.PILLAY ENGINEERING COLLEGE , NAGAPATTINAM

DEPARTMENT OF COMPUTER APPLICATIONS

QUESTION BANK IN REVISED BLOOM’S TAXONOMY

Unit - IV Computer Technologies Accessibility Issues

PART-A

|Q. No |Question |BTL |

|1 |Define professional responsibilities. |1 |

|2 |List out the principles of equal access. |1 |

|3 |Investigate various obstacles to access for individuals. |4 |

|4 |Illustrate any four accessibility issue in computer technology. |3 |

|5 |Examine the relations between computer and quality of work. |3 |

|6 |Debate the advantages and disadvantage of computerized monitoring in the work place. |6 |

|7 |Analyze the several factors for determination of liability for computer aided mistakes. |4 |

|8 |State some reasons for the impact of new technology was not as great sa envisaged. |3 |

|9 |Distinguish between the legal and professional issues. |2 |

|10 |Define Institutional Authority. |1 |

|11 |Outline the guidelines to reach an agreement. |2 |

|12 |Give some rules of professional conduct. |2 |

|13 |Define Shareware. |1 |

|14 |What is meant by telecommuting? |2 |

|15 |State some of the drawback of telecommuting. |4 |

|16 |Assess purposes for using internet based tools? |5 |

|17 |Define EIM. |1 |

|18 |Compose the different types of software documentation. |5 |

|19 |What is authentication? |1 |

|20 |Verify the key challenges are facing in software engineering. |6 |

PART- B

|Q. No |Question |BTL |

|1 |Analyze the following (i)The broader consequences of equal access (ii) Enabling the technology for disabled people (6+7) |4 |

|2 |Assess the various Rules of professional conduct in detail. (13) |6 |

|3 |Examine the following (i) Roles of computers in Employment (ii) Health and safety Hazards in IT Industry. (7+6) |4 |

|4 |What is Telecommuting and What are benefits and limitations of telecommuting? ii) How the uses of computers improve the quality of work? Explain |1 |

| |(7+6) | |

|5 |Illustrate the social, legal and professional issues in work place monitoring. (13) |3 |

|6 |(i) Explain how computer can be used ethically? (ii) Give the outline of Uses of Software and its classification (7+6) |2 |

|7 |Compose the following (i) arguments for and against monitoring in workplace (ii) The code of ethics on workplace monitoring. (8+5) |5 |

|8 |Discuss the various benefits and effects of computer monitoring in the workplace (13) |2 |

|9 |Describe about the Liability for software errors in detail.(13) |1 |

|10 |Discuss following (i) Duty to employers and clients (ii) Duty to the profession (7+6) |1 |

|11 |Describe about (i) Key Challenges are facing software engineering (ii)professional and ethical responsibility of the software engineer. (7+ 6) |1 |

|12 |Discuss about some common points related to use of Internet based tools for Ethics. (13) |2 |

|13 |Show the eight principles of software engineering code of ethics in detail. (13) |3 |

|14 |Investigate the area covered in ethical decision making? (ii) Identify the uses of computers ethically.(7+6) |4 |

E.G.S.PILLAY ENGINEERING COLLEGE , NAGAPATTINAM

DEPARTMENT OF COMPUTER APPLICATIONS

QUESTION BANK IN REVISED BLOOM’S TAXONOMY

PART -C

|Q. No |Question |BTL |

|1 |Analyze Principle of equal access, obstacles to access for individuals and professional responsibility in computer technology accessibility |4 |

| |issues. (15) | |

|2 |Describe the documentation authentication and control briefly. (15) |1 |

|3 |Discribe the concept of computerized monitoring in the work place.(15) |2 |

|4 |(i) Assess IEEE CS/ACM Software engineering code of ethics and professional practice(10) (ii) Determine various obstacles to information access |6 |

| |for individual (5) | |

Unit - V Software Development and Social Networking

PART- A

|Q. No |Question |BTL |

|1 |Illustrate the various factors influencing software Quality. |3 |

|2 |Differentiate between SSDLC and SDLC |2 |

|3 |State some activities of Quality Management. |5 |

|4 |Define social networking |1 |

|5 |Illustrate the uses of social networks in the hiring process |3 |

|6 |Summarize the various issues for social networking Web sites |2 |

|7 |What is meant by SOPA? |1 |

|8 |Difference between Paid, Owned and Earned media |2 |

|9 |Analyze about MMORPG and Avatar. |4 |

|10 |Debate Thin copy right and Thick copy right in DRM |6 |

|11 |Create the list for frequently busted online fraud |5 |

|12 |What are virtual crimes? |4 |

|13 |Define cyber bullying |1 |

|14 |Define cyber- stalking. |1 |

|15 |Debate the difference between Marketing and Virtual Marketing |6 |

|16 |Define online defamation. |1 |

|17 |Define Internet piracy. |1 |

|18 |Illustrate the benefits of online virtual world |3 |

|19 |Outline about spoofing |2 |

|20 |What is meant by malware? |4 |

E.G.S.PILLAY ENGINEERING COLLEGE , NAGAPATTINAM

DEPARTMENT OF COMPUTER APPLICATIONS

QUESTION BANK IN REVISED BLOOM’S TAXONOMY

PART-B

|Q. No |Question |BTL |

|1 |Describe the following (i) the causes for poor software quality. (ii) the importance of software quality (5+8) |1 |

|2 |Determine in detail about the phases of SDLC? (13) |6 |

|3 |Illustrate about (i) different strategies of software design (ii) Different levels of testing (7+6) |3 |

|4 |Discuss about (i) Failure Mode and Effects analysis(FEMA) with example (ii) TickIT (7+6) |2 |

|5 |compose the need of ISO 9001 certification for software industries (6) |5 |

| |Distinguish manufacturing and software industries with respect to ISO9000 Certification. (7) | |

|6 |Describe the Characteristics of (i) Cyber bullying (ii) Cyber stalking (7+6) |1 |

|7 |Explain some examples of Crime in Virtual World in detail. (13) |4 |

|8 |Describe the categories of threads in online Virtual World. (13) |2 |

|9 |Illustrate about (i) Social Networking Advertising strategies (ii) Uploading of inappropriate Material in Social Networking (7+6) |3 |

|10 |What is virtual world? Discuss about the crimes in the virtual world. (13) |1 |

|11 |Explain the following (i) the major functionality of DRM (ii) Online Defamation (7+6) |4 |

|12 |Describe about the various DRM Techniques. (13) |1 |

|13 |Analyze the various types of online piracy with an example. (13) |4 |

|14 |Explain the various types of online fraud with examples. (13) |2 |

PART -C

|Q. No |Question |BTL |

|1 |Explain Quality Management Standard. Describe about standards available for engineering quality.(3+12) |2 |

|2 |Assess the various strategies for engineering quality software in details (8) |6 |

| |Verify the use of social networks in the hiring process (7) | |

|3 |Analyze the various social networking ethical issues in detail (15) |4 |

|4 |Describe about DRM is used to control the use of digital content in the virtual world securely. (15) |1 |

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download