Sie sind auf Seite 1von 4

GEE REVIEWER Subjective Relativism- Each person decides right and wrong for himself or

CHAPTER 1 CATALYST FOR CHANGE herself


Information age Relativism- No universal norms of right and wrong
-Characterized by unprecedented access to information Cultural Relativism- What is “right” and “wrong” depends upon a society’s
-Catalysts actual moral guidelines
Low-cost computers Divine Command Theory
High-speed communication networks -Good actions: those aligned with God’s will
Examples of advances in past two decades -Bad actions: those contrary to God’s will
-Cell phones -Email **Holy books reveal God’s will.
-World Wide Web -MP3 players **We should consider holy books as moral decision-making guides.
Technology and Values Kantianism- Focuses on the critical importance of Good will- the desire to
-Dynamic between people, technology do the right thing (Immanuel Kant)
-Different ways people are affected by technology Kantian Evaluation (1st Formulation) -You may claim credit for work
**Physical changes (e.g., pains accompany the use of laptops) performed by someone else.
**Psychological changes (e.g., cell phones make you feel safer) Utilitarianism -contrast to Kantianism. **An action is good if it benefits
-Technologies can solve problems, create new problems someone. Focuses on the consequences.
Control over New Technologies Act utilitarianism- Add up change in happiness of all affected beings
-People can control whether to adopt new technology Rule Utilitarianism- Rule utilitarianism applies Principle of Utility to moral
-People can influence rate at which technologies are developed rules
3 important aids to manual calculating are: Social Contract Theory
tablet, the abacus, and mathematical tables Thomas Hobbes- “State of nature” (We implicitly accept a social contract)
Mechanical Calculators -Gilded age and new larger corporations, calculator Jean-Jacques Rousseau -In ideal society, no one above rules
adoptions (social change) Kinds of Rights
Cash register- store owners and response to problem Negative right- Free Expression
Tabulators- data processing systems **punched cards Positive right: A right obligating others to do something on your behalf
Data processing system- received input data, perform, produces output Absolute right: A right guaranteed without exception
First Commercial Computers Limited right: A right that may be restricted based on the circumstances
-Precursors- both program and data stored in it memory CHAPTER 3 NETWORKING
-Remington Rand – UNIVAC
-IBM – dominated mainframe/ large base. Email-transferred between computers
Programming Languages Email address: Uniquely identifies cyberspace mailbox
-Assembly Language- symbolic (machine language prog) Spam: Unsolicited, bulk email
-FORTRAN- higher level language/ scientific Spim: is an unsolicited, bulk instant message.
-COBOL- business app Direct Censorship- Government monopolization, Prepublication review
-Time-Sharing Systems – divide comp among multiple user ,Licensing and registration.
-BASIC – teaching programming Self-censorship- Most common form of censorship
-Transistor -vacuum tube Challenges Posed by the Internet
-Semiconductor – Faster, Cheaper, More reliable Many-to-many communication (millions can post pages)
-Integrated Circuit - containing transistors, capacitors, and resistors -Dynamic connections- Millions of PCs are connected to internet
IBM System/360 yearly
Before System/360- mainframe/ pc were incompatible -Huge numbers of Web sites- No way to monitor them all.
System/360- pc are compatible -Extends beyond national borders, laws
Microprocessor- single semiconductor chip -Can’t determine age of users
Telegraph-to transmit messages in the form of electrical impulses that can Identity theft: person uses another person’s electronic identity
be converted into data. Phishing: use of email or Web pages to attempt to deceive people into
ARPANET- Advanced Research Projects Agency Network revealing personal information
Internet- network of networks communicating using TCP/IP Chat room: supports real-time discussions among many people connected
Broadband- High-speed Internet connection to network
Information Technology- Devices used in creation, storage, manipulation, Instant messaging (IM) and chat rooms (which is similar to IM) replacing
dissemination of data, sound, and/or images telephone for many people
Email- Spam has become a real problem Contributing Factors to Computer Addiction
Web- Free access to huge amounts of information Social factors -Peer groups
CDs, MP3s, MP4s- CDs, MP3s, MP4s Situational factors
Credit cards- Convenience over cash and checks -Stress -Lack of social support and intimacy
CHAPTER 2 ETHICS -Limited opportunities for productive activity
Two ways` to view world: Individual factors
-Selfish point of view: consider only own self and its core values -Tendency to pursue activities to excess -Lack of achievement
-Ethical point of view: respect other people and their core values -Fear of failure -Feeling of alienation
Society- under a system of rules CHAPTER 4 INTELECTUAL PROPERTY
Morality- A society’s rules of conduct (good or bad) Intellectual property: any unique product of the human intellect that has
Ethics- (philosophical study of morality- guidelines) commercial value
**rational and systematic analysos Property Rights: -to property in their own person
**A way to decide the best thing to do -to their own labor
-to things which they remove from Nature through their labor
Protecting Intellectual Property Data mining- Searching for patterns or relationships in one or more
Trade Secret- gives company a competitive advantage (Identifies goods) databases
Service mark: Identifies services Secondary use: information collected for one purpose used for another
Patent- A public (not secret) document that provides detailed description of purpose
invention -Information about customers is a valuable commodity
Copyright- Provides owner of an original work five rights IRS Audits: matching and data mining to look for possible income tax fraud
-Reproduction Syndromic Surveillance System: Looks for patterns that might indicate an
-Distribution (copies of the work to public) epidemic, bioterrorism, or an environmental problem
-Public display (copies of the work in public) Opt-in: give permission for the organization to share info with another
-Public performance organization.
-Production of derivative works Opt-out: explicitly forbid an organization from sharing info
Fair Use Concept- Sometimes legal to reproduce a copyrighted work Encryption: Valuable tool for maintaining privacy
without permission
Digital Recording Technology- Copying from vinyl records to cassette CHAPTER 6 COMPUTER AND NETWORL SERCURITY
tapes introduced hiss and distortions (bad quality) Virus: piece of self-replicating code embedded within another program (host)
Peer-to-Peer Networks- Transient network How viruses spread
Napster- Peer-to-peer music exchange network -Diskettes or CDs -Email -Files downloaded from Internet
BitTorrent- Broadband connections: download much faster than upload. • Well-known viruses
-Brain -Michelangelo -Melissa -Love Bug
Violations of Software Copyrights • Viruses today
Copying a program to give or sell to someone else -Commercial antivirus software -Few people keep up-to-date
Preloading a program onto the hard disk of a computer being sold Worm
Distributing a program over the Internet -Self-contained program -Spreads through a computer
Open-Source Software: measures being taken to enforce copyrights network
(infringe our liberties) -Exploits security holes in networked computers
-No restrictions preventing others from selling or giving away software Famous worms
Examples of Open-Source Software -WANK -Code Red -Sapphire (Slammer) -Blaster -Sasser
BIND – give DNS for entire Internet The Internet Worm
Apache – runs half of Web servers Robert Tappan Morris, Jr.- Released worm onto Internet from MIT computer
Sendmail – moving e-mail via internet Trojan horse: program with benign capability that masks a sinister purpose
Perl, Python, Ruby, TCL/TK, PHP, Zope, GNU (General Public License) Remote access Trojan: Trojan horse that gives attack access to victim’s
compilers for C, C++, Objective-C, Fortran, Java, and Ada computer. (Back Orifice // SubSeven)
CHAPTER 5 PRIVACY RAT servers often found within files downloaded from erotica/porn Usenet
Defining Privacy- related to notion of access sites
Access- Physical proximity to a person // Knowledge about a person Bot: A software program that responds to commands from a program on
Edmund Byrne: Privacy is a “zone of inaccessibility” another computer
Edward Bloustein: Privacy violations are an affront to human dignity Some bots support legitimate activities
Benefits of Privacy -Internet Relay Chat -Multiplayer Internet games
-Individual growth (maturity) Other bots support illegitimate activities
-Individual responsibility -Distributing spam -Collecting person information for ID theft
-Freedom to be yourself -Distributed denial-of-service attacks
-Intellectual and spiritual growth- Authorization: determining that a user has permission to perform a
-Development of loving, trusting, caring, intimate relationships particular action
Morton Levine- Property rights (Home) →Privacy rights Authentication: determining that people are who they claim to be
Privacy and Trust -emphasis on community Firewall: a computer monitoring packets entering and leaving a local area
Disclosing Information network
Public record: information for public access (birth certificates) Mon 29-11 Hackers- Meaning of “hacker” changed
Public information: information revealed to an organization that has right to -Explorer -Risk-taker -Technical virtuoso
share it (Telephone directory) -Make a system do something never done before
Personal information: undisclosed information (religion, wealth) Phone phreak: someone who manipulates phone system to make free calls
Types of disclosures Most popular methods
-Voluntary, -Involuntary : body and luggage search at airport -Steal long-distance telephone access codes
-Statutory : Record of arrests and convicted persons -Guess long-distance telephone access codes
Census Records: required to ensure every state has fair representation -Use a “blue box” to get free access to long-distance lines ---
OneDOJ Database: Gives state and local police officers access to mimic the actual frequency
information provided by five federal law enforcement agencies **Access codes posted on “pirate boards” by phreaks to share codes and
Wiretaps: relates to interception of telephone conversations credit card No.
Bugs are hidden microphones used for surveillance **Maximum penalty: 20 years in prison + $250,000 fine
**Wiretapping and bugs are not legal // FBI continues secret wiretapping Denial-of-service attack: an intentional action designed to prevent
Operation Shamrock- was a covert, domestic intelligence gathering legitimate users from making use of a computer service
operation that monitored telegraph communications. Goal of attack: disrupt a server’s ability to respond to its clients
Kennedy- Organized crime figures “watch list” **About 4,000 Web sites attacked each week
Johnson and Nixon -Vietnam war protesters Asymmetrical attack: a single person can harm huge organization
Nixon- War on drugs, Monitoring phone calls (multinational organization) **may prove popular with terrorists
SATAN- Security Administrator Tool for Analyzing Networks -Software engineers have opportunities to do good or do harm
-Allows administrators (especially novices) to test their systems -Software engineers ought to be committed to doing good
-Eight principles identify key ethical relationships and obligations
Benefits of Online Voting: within these relationship
-More people would vote -Code should be seen as a whole, not a collection of parts
-Votes would be counted more quickly -Concern for the public interest is paramount
-No ambiguity with electronic votes Software Engineering Code: Principles
-Cost less money -Public
-Eliminate ballot box tampering -Client and employer
-Software can prevent accidental over-voting -Product
-Software can prevent under-voting -Judgment
-Management
CHAPTER 7 COMPUTER RELIABILITY -Profession
Data-Entry or Data-Retrieval Errors: A computerized system may fail -Colleagues
because wrong data entered into it. -Self
-A computerized system may fail because people incorrectly interpret data Origin of Virtue Ethics
they retrieve. Aristotle- Happiness results from living a life of virtue
Issues with DRE Voting Machines Intellectual virtue: developed through education
-Voting irregularities Moral virtue: developed by repeating appropriate acts
-Failure to record votes -Overcounting votes ***Deriving pleasure from a virtuous act is a sign that the virtue has been
-Misrecording votes acquired
-Lack of a paper audit trail Some virtues: Benevolence, courage, fairness, generosity, honesty, loyalty,
-Vulnerability to tampering patience, tolerance
-Source code a trade secret, can’t be examined Strengths of Virtue Ethics: Provides a motivation for good behavior
-Possibility of widespread fraud through malicious programming -Provides a solution to the problem of impartiality
Uses of Computer Simulations Weakness of Virtue Ethics: No methodology for answering moral problems
-Model past events (Evolution of the universe) Alternative List of Fundamental Principles
--Understand world around us (Search for Oil) -Be impartial.
Predict the future (weather predictions) -Disclose information that others ought to know.
Software Engineering (4 STEPS PROCESS) -Respect the rights of others.
• Specs: determine the functions to be performed -Treat others justly.
-Determine system requirements -Take responsibility for your actions and inactions.
-Understand constraints -Take responsibility for the actions of those you supervise.
-Determine feasibility (Budget and schedule) -Maintain your integrity.
End products: -Continually improve your abilities.
-High-level statement of requirements (Summary) -Share your knowledge, expertise, and values
-Mock-up of user interface Whistleblower: Tries to report harmful situation through authorized channels
-Low-level requirements statement (Detailed) -Rebuffed by organization
• Development: produce SW that meet specs. -Makes disclosure through unauthorized channels
-Create high-level design Whistleblowing harms organization
-Discover and resolve mistakes, omissions in specification -Bad publicity -Ruined careers -Erodes team spirit
-CASE tools to support design process Whistleblowing harms whistleblower
-Object-oriented systems have advantages -Retaliation -Estrangement
-After detailed design, actual programs written
-Result: working software system CHAPTER 9 WORK AND WEALTH
• Validation: testing the SW Telework: Arrangement in which employees work away from traditional
-Ensure software satisfies specification place of work
-Ensure software meets user’s needs Advantages of Telework
-Challenges to testing software -Increases productivity -Reduces absenteeism
-Test modules, then subsystems, then system -Improves morale -Saves overhead (offices, …)
-Helps environment -Saves employees money
• Evolution: Modify SW to meet change requirements Disadvantages of Telework
Shrinkwrap Warranties: Some say you accept software “as is” -Threatens managers’ control and authority
Some offer 90-day replacement or money-back guarantee -Makes face-to-face meetings impossible
-Sensitive information less secure -Team meetings more difficult
CHAPTER 8 PROFESSIONAL ETHICS -Teleworkers less visible (forgotten for promotion)
Software Engineers: Certification and licensing not needed -Teleworkers “out of the loop” -Isolation of teleworkers
-Without these, other characteristics are irrelevant -Less likely to contact them from employees at offices
-No college education needed -No apprenticeship needed -Teleworkers work longer hours for same pay
-No membership in professional society needed Temporary Work: Long-term employment for one firm less common
-No continuing education needed Monitoring: Identify inappropriate use of company resources
-Most software engineers are part of teams Globalization: process of creating a worldwide network of businesses and
-Software engineers have ability to harm public markets
Software Engineering Code: Preamble
Digital divide: some people have access to modern information technology Electronic Devices. These are devices which use only electrical switches
while others do not and circuitry instead of mechanical relays.
Underlying assumption: people with access to telephones, computers, ABC (Atanasoff – Berry Computer). The first special-purpose
Internet have opportunities denied to those without access digital computer developed by John Atanasoff.
COMPUTER CONCEPTS Electronic Numerical Integrator and Calculator (ENIAC). The
Computer- electronic data processing device designed to accept and first fully electronic general-purpose digital computer by John Eckert and
manipulate data and instructions. John Mauchly.
Characteristics of a Computer Electronic Discrete Variable Computer(EDVAC). This is simply
-It is a machine. -It is electronic. the enhancement of ENIAC to overcome its limitations.
-It is automatic. -It can manipulate data. Electronic Delayed Storage Automatic Computer (EDSAC).
-It has memory. -It has logical functions. Also known as Electronic Binary Digital computer that uses binary
Capabilities of a Computer representation of data and internally stored program; developed by John
-Speed -Accuracy -Repetitiveness. -Storage. -Programmable. Eckert and John Presper.
Limitations of a Computer First Generation Computers ( 1951 – 1958 ) - Vacuum tubes and magnetic
-Computers cannot operate without a set of instructions. drums.
-Computers cannot derive a meaning from objects. Second Generation Computers ( 1959 – 1963 )- Transistors and magnetic
-Computers cannot correct errors, it can only detect them. core.
-Computers are subject to occasional breakdown. Third Generation Computers ( 1964 – 1971 )- Major Hardware Features:
-Computers cannot run without electric power. Integrated circuits or “chips”
Classifications of Computer Fourth Generation Computers ( 1971 – 1979 )- Microprocessors or Large –
According to Purpose second IC
-General – Purpose Computers. Capable of dealing with a Fifth Generation Computers ( 1980-present)- Circuitry based on gallium
variety of problems. arsenide
-Special – Purpose Computers. Designed to perform a specific Personal Computer (PC) – are Integrated Circuit that contains the
task. Arithmetic Logic Unit (ALU) and Control Unit of computer Central Processing
According to Data Handled Unit.
Analog Computers. Deal with continuously changing physical data Microprocessor – a single Central Processing Unit (CPU).
Digital Computers. Work with values that are in a discrete from (or Data
that can be counted).
Hybrid Computers. Incorporate in a single machine the capabilities of the
analog and digital computers.
According to Capacity
Microcomputers: Small computers which are portable.
Minicomputers: Machine which are in the middle of microcomputers and
mainframes in terms of cost and capability. These act as “servers”
Mainframe: are used mostly by banks, airlines, and insurance companies
that handles millions of transactions.
Supercomputers: The biggest and fastest computers.
EVOLUTION OF COMPUTERS
Pre-Modern Era
Manual-Mechanical Device. These are devices powered by hand and
requires physical effort from the user.
Abacus. The first man-made computing device
Napier’s bones. An arrangement of bones wherein numbers are
printed; invented by John Napier.
Oughtred’s Slide Rule. Consists of movable bars with a precise
scale which uses approximations for solving problems; invented by William
Oughtred.
Pascaline. The first mechanical calculator ( adding machine ) that
uses cogged wheels;invented by Blaise Pascal.
Leibnitz Calculator. The improved Pascaline which could
multiply and divide; invented by Gottfried Leibnitz.
Babbage’s Difference and Analytical Engines. These engines
embodied most of the design of modern computers by Charles Babbage.
Electro-mechanical Devices. These are devices powered by an electronic
motor and use switches and relays.
Holllerith’s Punch Card Machine. The first use of punched
cards to store data; developed by Herman Hollerith.
Automatic Weaving Loom. Uses the concept of punched card to
control his looms; by Joseph Marie Jacquard.
Automatic Sequence Controlled Calculator (MARK I). The first
genera-purpose computer; invented by Howard Aiken.

Das könnte Ihnen auch gefallen