Beruflich Dokumente
Kultur Dokumente
UNIT I
PART A
1. Define Computer Ethics.
2. What is Engineering Ethics?
3. What is the importance of ethics in computer world?
4. How one can identify ethical issues?
5. Explain the relation between ethics and laws.
6. Explain the term Spyware?
7. What is Computer Law?
8. What is an ethical dilemma?
9. Define Computer Hacking.
10. What are the steps involved in decision-making framework?
11. What are the causes of destructive programs?
12. Define Kantianism.
13. Define Utilitarianism.
14. What are the common issues related to the computer ethics laws?
15. What are intrinsic and instrumental goods?
16. What is Hacker Ethics?
17. What is Code of Conduct?
18. What are the key issues related to computer ethics?
19. Difference between Law and Ethics.
20. What are the different kinds of malicious programs?
PART - B
1.
2.
3.
4.
5.
What is ethical theory? Explain the Kantianism and Utilitarianism with example.
Explain the ethical positions on hacking.
Explain with example the ethical dilemmas.
Explain the professional code of conduct and their roles?
What is meant by destructive programs? Explain the different types of destructive
Programs.
6. Explain the framework of ethical decision-making.
7. Explain the BCS code of conduct.
8. Explain the hacker ethics.
9. Write short notes on Ethics and Law.
10. Write short notes on Computer Ethics and its Importance.
PART A
1.
2.
3.
4.
5.
PART A
1. List out few types of regulation?
2. Define Censorship.
3. Define RFID.
4. What are the major challenges of Internet for Free Speech?
5. Define Cookie.
6. List out some types of cookies?
7. What are intellectual rights?
8. List out some ethical and professional issues?
9. What are the laws restricting Free Speech?
10. What are the intellectual consequences of Denial of Free Speech?
11. What is data matching?
12. Define Spam.
13. What are the types of spam?
14. What is privacy and how it is valued?
15. What are the technologies helping in censorship?
16. What is risk? Explain with example.
17. What is safety? Give an example of it.
18. Define Personal Risk.
19. What are the faulty assumptions about safety?
20. Define Free Speech.
PART - B
1. What is an RFID? What are the privacy implications of RFID capabilities?
Mention some of the advantages of RFID.
2. Explain the impact of computer technology over privacy.
3. What is a risk? What are the factors influenced by it?
4. What are the incentives to reduce risk? Explain the examples of Improved
Safety?
5. Write short notes on risk benefit analysis and reducing risk.
6. Explain the following terms i)Cookies ii) Spam iii) Encryption
7. Explain the persona and public risk with example.
8. What is meant by freedom of expression? How freedom of expression can be
prevented? Explain briefly.
9. What are the testing procedures of safety? What are the conditions when testing
is inappropriate?
10. Write short notes on Free Speech and Internet.
UNIT IV
PART A
1. What are the principles of equal access?
2. What are the obstacles to access for individuals?
3. List out some of the responsibilities of professionals?
4. Mention some rules of professional conduct.
5. List out few roles of computers in employment.
6. Mention some methods that employers can use to track employee activities.
7. Define Telecommuting.
8. Mention some of the advantages of computerized monitoring in workplace.
9. What are the advantages of telecommuting?
10. List out some of the disadvantages of telecommuting?
11. What are the contractual duties that cannot be avoided?
12. List out few uses of computers.
13. What are the different types of software?
14. What are the social, legal and professional issues?
15. What is the relation between computer and quality of work?
16. What are the liabilities of software errors?
17. Define Software Engineering.
18. Mention some of the uses of Internet-based tools?
19. What is documentation authentication and control
20. Define Shareware.
PART - B
1. What is an RFID? What are the privacy implications of RFID capabilities?
Mention some of the advantages of RFID.
2. Explain the use of Internet-Based Tools.
3. Write short notes on Strictly Liability and Negligence.
4. Explain the Key challenges faced by software engineering.
5. Write short notes on IEEE CS-ACM Joint Task Force.
6. Explain Documentation Authentication and Control in detail.
7. Write short notes on Ethical Decision Making.
8. Explain the need for Computerized Monitoring in the work place.
9. Explain the software engineering ethical and professional principles.
10. Write shot notes on uses of software.
UNIT V
PART A
1. What is software development?
2. What is SDLC?
3. What is feasibility study?
4. What is design?
5. What is the need for testing?
6. What are the main components of quality management?
7. What is the importance of international standards?
8. List out few advantages of social networking.
9. What are the uses of social networks in hiring process?
10. List out few characteristics of cyber bullying.
11. Define cyber stalking.
12. What are the categories of threats?
13. Mention few advantages of online virtual world.
14. What is digital rights management?
15. Define online defamation.
16. What are the problems of online defamation?
17. Define piracy.
18. What is fraud? Explain with example.
19. What is software quality? Explain the importance of software quality.
20. Define spoofying.
PART - B
1. Explain in detail about the phases of SDLC?
2. Explain the different types of feasibility study.
3. What are requirements? Explain the different types of requirements and methods
to determine requirements.
4. Explain the different strategies of software design?
5. Explain in detail about the steps of software requirement analysis.
6. What are the techniques for software testing?
7. What are the strategies for engineering quality software?
8. Write short notes on quality management standards and ISO standards.
9. Explain the architecture and components of digital right management.
10. Write short notes on social networking.