COSC3325
Final Exam.
5/9/2006
Keys Used:
1-5:
CECAC
6-10:
ADBBB
11-15:
ADBCE
16-20:
CBBB (#19 IS MISSING)
21-25:
CCDBA
26-30:
BCCBA
31-35:
EBABC
36-40:
EDBBB
41-44:
ADDC
Name_______________________________________________
PART-A. Multiple Choices. (44
questions)
(132 points)
Choose the BEST answer by writing
down a Big A, B, C, D, E, or F in Capital in front of each
question number. (Each question is
3 points worth.)
1. Which is
for Immanual Kant?
a. Categorical Imperative.
b. Deontology.
c. both.
d.
neither.
2. Which
is for Jeremy Bentham?
a. Greatest happiness.
b. Consequence and utility.
c. Agent's intention.
d. All above.
e. Two
above.
3.
Relativism is based on
a. Absence of universal morality.
b. Morals varying among different cultures and/or
societies.
c. Both.
d.
Neither.
4.
Deontology emphasizes
a. Intention of agents
b. Consequences
c. both.
d.
neither.
5.
Categorical Imperative is
a. Universal laws
b. Reason-based
c. both.
d.
neither.
6.
Utilitarianism emphasizes
a. happiness and pleasure
b. Motivations of the agent.
c. both.
d.
neither.
7.
Universalism includes
a. Consequentialism
b. Utilitarianism
c. Deontology
d. All above
e. Two above.
f. none
above
8.
Efficacy is
a. special power of general public to affect the world we live
in.
b. special power and corresponding responsibilities of professionals to
affect the world we live in.
c. both.
d.
neither.
9.
Disparity of professional knowledge is the most evident
in
a. employer-employee relationship
b. client-professional relationship.
c. professional-professional relationship.
d. cannot tell.
10.
Which are two opposite extremes?
a. Agency Model and Fiduciary Model
b. Agency Model and Paternalism Model
c. Paternalism Model and Fiduciary Model
d. cannot tell.
11.
Which model is for the clients to retain most
decision-making
power?
a. Agency Model
b. Paternalism Model
c. Fiduciary Model.
d. cannot
tell.
12.
General Moral Imperatives of ACM Code of Ethics
include
a. contribution to society and human well-being
b. avoiding harm to others and honesty.
c. non-discrimination
d. all above.
f. two
above
13.
Which Code of Ethics is centered around
relationships?
a. ACM Code of Ethics
b. Software Engineering Code of Ethics
c. IEEE Code of Ethics
d. All
e. Two above
f. none.
14.
Which Code of Ethics is the briefest?
a. ACM Code of Ethics
b. Software Engineering Code of Ethics
c. IEEE Code of Ethics.
d. cannot tell.
15.
The Software Engineering Code of Ethics
a. has eight Imperatives
b. has eight Principles
c. puts an emphasis on significant opportunities to do good or cause harm
to public interest.
d. all above.
e. two above.
f. none.
16.
According to Dr. Myhrvold, the Price/Performance
increases
a. roughly by 1000 times every 20 years.
b. roughly by 1,000,000 times every 20 years.
c. neither.
17.
The number of prime numbers between 0 and 1000 is
roughly
a. 100
b. 160
c. 240
18.
Suppose that m is a positive prime integer and n is a positive
integer
smaller than m. In this case, there is a positive integer q such that
a. n ** m =
q*m+1
b. n ** (m-1) = q*m+1
c. n ** (m-2) = q*m+1
d. none.
20.
An expert system is intended to be
a. a general problem solver for a variety of many different
domains.
b. a specialized problem solver for just one narrow
domain.
c. both.
d.
neither.
21.
Some successful E-Commerce models include
a. shopping-cart model
b. online auction and online trading.
c. both.
d.
neither.
22.
Benefits of telecommuting include
a. reduced overheads by employers.
b. reduced rush-hour traffic congestion and energy
savings
c. both
d.
neither.
23.
Disadvantages of telecommuting include
a. lack of immediate supervision possibly leading to
lower
productivity
b. missing social interaction.
c. young children at home becoming distractions
d. all above
e. two
above
24.
The essence of the Diffie-Hellman Key Exchange is to enable two parties
to generate
a. the same public key by themselves.
b. the same private key by themselves.
c. both.
d.
neither
25. Security of
RSA cryptosystem primarily comes from
a. Difficulty of factoring
large integers.
b. Difficulty of testing the
primality of large integers.
c. both.
d.
neither.
26.
DES
a. is a symmetric algorithm
that uses the same public key(s) both for the encryption and the
decryption.
b. was a US Government standard
for
over twenty years.
c. both.
d.
neither.
27. NIST
a. was formerly known as
National Bureau of Standards.
b. is responsible for issuing
standards and guidelines for computer systems in the
c. Both.
d.
neither.
28. The Totient
function of a positive integer n which is p*q where p and q each is a prime
is
a. (p-1)*(q-1)
b. the number of integers
between 1 and n-1 (inclusive) that is relatively prime to
n.
c. Both.
d.
neither.
29. Which is a
reason that may make one-time pads secure?
a. the receiver of a message
uses the same key that the sender used.
b. a given ciphertext may
correspond to any plaintext of the same size with an equal probability depending
upon the pad being used.
c. Both.
d.
neither.
30. Which
preserves the letter frequency of plaintext?
a. Caesar ciphers.
b. polyalphabetic ciphers.
c. both.
d. neither.
31. Which are
purposes of the US Constitution as specified in its
Preamble?
a. to form a more perfect
b. to dominate the rest of the
world in both political and economic powers.
c. to secure the blessings of
liberty to ourselves and our posterity.
d. all above.
e. two.
f.
none
32. Which US
Constitution Article is for the Executive Power?
a. Article-I
b.
Article-II.
c. Article-III.
d.
none
33. Which is a
source for State authorities?
a. US Constitution,
Amendment-X.
b. US Constitution, Article-I,
Section-10.
c. Both.
d.
neither
34.
Copyright protects
a. Principle of operations of
hardware
b. Form of
Expressions.
c. both.
d. neither
35.
Which is true about a Fair Use?
a. An exception to Copyright
protection.
b. It is a reproduction of
copyrighted work without authorization for such purposes as
teaching,
scholarship/research, criticism/comment, and news
reporting.
c. both.
d.
neither.
36.
Which is NOT protected by Copyright?
a. Ideas themselves.
b. methods of
operations.
c. works fixed in a tangible
form of expression.
d. all.
e. two.
f.
none.
37. Copyright
protection requires
a. registration
b.
publication
c. both.
d.
neither
38.
Patent protects
a. Purely mathematical
formulas.
b. Useful, novel and non-obvious
inventions.
c. Both.
d.
Neither.
39.
Which is the primary Patent?
a. Design Patent.
b. Utility
Patent.
c. Plant patent
(with 20-year term). d. none.
40. One of the earliest
public key cryptosystems (algorithms) is
a. DES
b. Diffie-Hellman key exchange
scheme.
c. RSA algorithm.
41.
Federalism
a. is a unique and important
attribute of
b. refers to the fact that only
legislative agancies make laws in their respective areas.
c. Both.
d.
neither.
42. Factors in
determining Fair Use of copyrighted materials include
a. Purpose and character of
use
b. Nature of copyrighted work
and the amount and substantiality of the portion used.
c. The effect of use upon
extending the protected idea for the benefits of the
owner.
d. All above.
e. two above.
f.
none.
43. Which amended the Computer
Fraud and Abuse Act?
a.
DMCA
b.
FOIA
c.
Both.
d.
neither.
44. Which is an
exception in the FOIA?
a. matters of
interest of national defense
b. records
specifically excluded from disclosure by statutes.
c. Both.
d.
neither
PART-B.
Other Problems.
(45 points)
Do five
problems
A. State factors to
consider in determining a fair use.
B. Briefly
describe evolutions of computer
technology applications.
C. Briefly
describe both positive social impacts and negative social impacts of
computers.
D. In no
more than 12 lines, compare three professional Codes of
Ethics.
E.
Describe the Miller-Rabin algorithm.
What do you think it really is checking/testing?
F.
Briefly compare
deontology, utilitarianism and relativism.
G.
Describe
factors affecting (a) ethical decision making within computer profession and (b)
fair resolution of conflicts of interest.