Sie sind auf Seite 1von 5

MC7304 PROFESSIONAL ETHICS - THIRD SEMESTER REGULATION 2013

UNIT I

COMPUTER ETHICS INTRODUCTION AND COMPUTER HACKING 9

A general Introduction Computer ethics: an overview Identifying an ethical issue


Ethics and law Ethical theories - Professional Code of conduct An ethical
dilemma A framework for ethical decision making - Computer hacking Introduction
definition of hacking Destructive programs hacker ethics - Professional
constraints BCS code of conduct To hack or not to hack? Ethical positions on
hacking

PART A
1. Define Computer Ethics.
2. What is Engineering Ethics?
3. What is the importance of ethics in computer world?
4. How one can identify ethical issues?
5. Explain the relation between ethics and laws.
6. Explain the term Spyware?
7. What is Computer Law?
8. What is an ethical dilemma?
9. Define Computer Hacking.
10. What are the steps involved in decision-making framework?
11. What are the causes of destructive programs?
12. Define Kantianism.
13. Define Utilitarianism.
14. What are the common issues related to the computer ethics laws?
15. What are intrinsic and instrumental goods?
16. What is Hacker Ethics?
17. What is Code of Conduct?
18. What are the key issues related to computer ethics?
19. Difference between Law and Ethics.
20. What are the different kinds of malicious programs?
PART - B
1.
2.
3.
4.
5.

What is ethical theory? Explain the Kantianism and Utilitarianism with example.
Explain the ethical positions on hacking.
Explain with example the ethical dilemmas.
Explain the professional code of conduct and their roles?
What is meant by destructive programs? Explain the different types of destructive
Programs.
6. Explain the framework of ethical decision-making.
7. Explain the BCS code of conduct.
8. Explain the hacker ethics.
9. Write short notes on Ethics and Law.
10. Write short notes on Computer Ethics and its Importance.

UNIT II ASPECTS OF COMPUTER CRIME AND INTELLECTUAL PROPERTY


RIGHTS
9
Aspects of computer crime - Introduction - What is computer crime computer security
measures Professional duties and obligations - Intellectual Property Rights The nature
of Intellectual property Intellectual Property Patents, Trademarks, Trade Secrets,
Software Issues, Copyright - The extent and nature of software piracy Ethical and
professional issues free software and open source code

PART A
1.
2.
3.
4.
5.

What are the different types of computer crimes?


Give some examples of Common Hacking Tactics?
Define computer fraud with an example.
What are the reasons of Corporate Espionage?
What are the various measures that may be taken in order to enhance computer
Security?
6. What are intellectual rights?
7. What is Intellectual Property Rights?
8. Define Copyright.
9. List some features of Intellectual Properties.
10. What are the key areas of intellectual property rights?
11. Define Software Piracy.
12. List some of the common software issues.
13. What are the main duties and obligations of professional?
14. What is software audit control?
15. What are the activities involved in software piracy?
16. What are the benefits of free and open source software?
17. What are the two agencies that protect copyright?
18. Define the term trademark.
19. What are the ways to violate trademark?
20. What are patents?
PART - B
1.
2.
3.
4.
5.
6.
7.

Explain the different types of computer crimes.


Explain the nature of Intellectual Property Rights.
Explain the different legislation of Intellectual Property.
Explain the computer security measures in detail.
Write short notes on Software Piracy.
Write short notes on free and open source software.
What is Antivirus software? What are the steps involved in using antivirus
software?
8. What are the activities involved in using software piracy?
9. Write short notes on Encryption.
10. Write short notes on extent and nature of software piracy.

UNIT III REGULATING INTERNET CONTENT, TECHNOLOGY AND SAFETY 9


Introduction In defence of freedom expression censorship laws upholding free
speech Free speech and the Internet - Ethical and professional issues - Internet
technologies and privacy Safety and risk assessment of safety and risk risk benefit
analysis reducing risk

PART A
1. List out few types of regulation?
2. Define Censorship.
3. Define RFID.
4. What are the major challenges of Internet for Free Speech?
5. Define Cookie.
6. List out some types of cookies?
7. What are intellectual rights?
8. List out some ethical and professional issues?
9. What are the laws restricting Free Speech?
10. What are the intellectual consequences of Denial of Free Speech?
11. What is data matching?
12. Define Spam.
13. What are the types of spam?
14. What is privacy and how it is valued?
15. What are the technologies helping in censorship?
16. What is risk? Explain with example.
17. What is safety? Give an example of it.
18. Define Personal Risk.
19. What are the faulty assumptions about safety?
20. Define Free Speech.
PART - B
1. What is an RFID? What are the privacy implications of RFID capabilities?
Mention some of the advantages of RFID.
2. Explain the impact of computer technology over privacy.
3. What is a risk? What are the factors influenced by it?
4. What are the incentives to reduce risk? Explain the examples of Improved
Safety?
5. Write short notes on risk benefit analysis and reducing risk.
6. Explain the following terms i)Cookies ii) Spam iii) Encryption
7. Explain the persona and public risk with example.
8. What is meant by freedom of expression? How freedom of expression can be
prevented? Explain briefly.
9. What are the testing procedures of safety? What are the conditions when testing
is inappropriate?
10. Write short notes on Free Speech and Internet.

UNIT IV

COMPUTER TECHNOLOGIES ACCESSIBILITY ISSUES

Introduction Principle of equal access Obstacles to access for individuals


professional responsibility - Empowering computers in the workplace Introduction
computers and employment computers and the quality of work computerized
monitoring in the work place telecommuting social, legal and professional issues - Use
of Software, Computers and Internet-based Tools -Liability for Software errors Documentation Authentication and Control Software engineering code of ethics and
practices IEEE-CS ACM Joint task force

PART A
1. What are the principles of equal access?
2. What are the obstacles to access for individuals?
3. List out some of the responsibilities of professionals?
4. Mention some rules of professional conduct.
5. List out few roles of computers in employment.
6. Mention some methods that employers can use to track employee activities.
7. Define Telecommuting.
8. Mention some of the advantages of computerized monitoring in workplace.
9. What are the advantages of telecommuting?
10. List out some of the disadvantages of telecommuting?
11. What are the contractual duties that cannot be avoided?
12. List out few uses of computers.
13. What are the different types of software?
14. What are the social, legal and professional issues?
15. What is the relation between computer and quality of work?
16. What are the liabilities of software errors?
17. Define Software Engineering.
18. Mention some of the uses of Internet-based tools?
19. What is documentation authentication and control
20. Define Shareware.
PART - B
1. What is an RFID? What are the privacy implications of RFID capabilities?
Mention some of the advantages of RFID.
2. Explain the use of Internet-Based Tools.
3. Write short notes on Strictly Liability and Negligence.
4. Explain the Key challenges faced by software engineering.
5. Write short notes on IEEE CS-ACM Joint Task Force.
6. Explain Documentation Authentication and Control in detail.
7. Write short notes on Ethical Decision Making.
8. Explain the need for Computerized Monitoring in the work place.
9. Explain the software engineering ethical and professional principles.
10. Write shot notes on uses of software.

UNIT V

SOFTWARE DEVELOPMENT AND SOCIAL NETWORKING

Software Development strategies for engineering quality standards Quality


management standards Social Networking Company owned social network web site
the use of social networks in the hiring process Social Networking ethical issues Cyber
bullying cyber stalking Online virtual world Crime in virtual world - digital rights
management - Online defamation Piracy Fraud

PART A
1. What is software development?
2. What is SDLC?
3. What is feasibility study?
4. What is design?
5. What is the need for testing?
6. What are the main components of quality management?
7. What is the importance of international standards?
8. List out few advantages of social networking.
9. What are the uses of social networks in hiring process?
10. List out few characteristics of cyber bullying.
11. Define cyber stalking.
12. What are the categories of threats?
13. Mention few advantages of online virtual world.
14. What is digital rights management?
15. Define online defamation.
16. What are the problems of online defamation?
17. Define piracy.
18. What is fraud? Explain with example.
19. What is software quality? Explain the importance of software quality.
20. Define spoofying.

PART - B
1. Explain in detail about the phases of SDLC?
2. Explain the different types of feasibility study.
3. What are requirements? Explain the different types of requirements and methods
to determine requirements.
4. Explain the different strategies of software design?
5. Explain in detail about the steps of software requirement analysis.
6. What are the techniques for software testing?
7. What are the strategies for engineering quality software?
8. Write short notes on quality management standards and ISO standards.
9. Explain the architecture and components of digital right management.
10. Write short notes on social networking.

Das könnte Ihnen auch gefallen