COSC3325                                          Final Exam.                                                    Spring 2008

 

Keys Used:

            1-5:                  BDCBB

            6-10:                EBBBB

            11-15:              CEACE

            16-20:              BBAED

            21-25:              BBADA          

            26-31:              DCCDDE

 

Name_______________________________________________

 

   PART-A.      Multiple Choices. (31 questions)                                            (93 points)

 

   Choose the BEST answer by writing down a Big A, B, C, D, E, or F in Capital in front of each

   question number. (If this instruction is NOT followed, you will lose FIVE points.)

 

 

            1.         Which is advocated (or represented) by Immanual Kant?

                        a. Relativism.

                        b. Deontology.

                        c. both.                                    d.  neither.

           

            2.         Which is advocated (or represented) by Jeremy Bentham?

                        a. Greatest happiness.

                        b. Consequence and utility.

                        c. Utilitarianism.

                        d. All above.                e.  Two above.

           

            3.         Relativism is based on

                        a. Absence of universal morality.

                        b. Morals varying among different cultures and/or societies.

                        c. Both.                                    d.  Neither.

 

            4.         Disparity of professional knowledge is the most evident in

                        a. employer-employee relationship

                        b. client-professional relationship.

                        c. professional-professional relationship.

                       

            5.         Which are two opposite extremes?

                        a. Agency Model and Fiduciary Model

                        b. Agency Model and Paternalism Model

                        c. Paternalism Model and Fiduciary Model

           

            6.         General Moral Imperatives of ACM Code of Ethics include

                        a. contribution to society and human well-being

                        b. avoiding harm to others and honesty.

                        c. positive discrimination                    

d. all above.                             e.  two above.                          f.  none above.

 

            7.         Which Code of Ethics is centered around relationships referred to as Principles?

                        a. ACM Code of Ethics

                        b. Software Engineering Code of Ethics

                        c. IEEE Code of Ethics

                        d. All                                       e. Two above                           f. none.

            8.         The number of prime numbers between 0 and 1000 is roughly

                        a. 100

                        b. 160

                        c. 240             

            9.         Suppose that m is a positive prime integer and n is a positive integer smaller than m.

In this case, there is a positive integer q such that

                        a. n ** m       = q*m+1

                        b. n ** (m-1) = q*m+1

                        c. n ** (m-2) = q*m+1

                        d. none.

            10.       An expert system is intended to be

                        a. a general problem solver for a variety of many different domains.

                        b. a specialized problem solver for just one relatively narrow domain.

                        c. both.                                                d.  neither.

            11.       Some successful E-Commerce models include

                        a. shopping-cart model

                        b. online auction and online trading.

                        c. both.                                                d.  neither.

            12.       Benefits of telecommuting include

                        a.         reduced overheads by employers.

                        b.         reduced rush-hour traffic congestion and energy savings

                        c.         lack of immediate supervision possibly leading to lower productivity.

                        d.         all above.                     e.  two above.

     

13.      Security of RSA cryptosystem primarily comes from

a.       Difficulty of factoring large integers.

b.      Difficulty of testing the primality of large integers.

c.       Difficulty of calculating a multiplicative inverse.

 

14.       DES

a.       is a symmetric algorithm that uses the same private key(s) both for the encryption and the decryption.

b.   was a US Government standard for many years before being replaced by AES.

c.   both.                                  d.   neither.

 

15.      Which are purposes of the US Constitution as specified in its Preamble?

a.         to form a more perfect Union and to establish justice.

b.            to dominate the rest of the world in both political and economic powers.

c.             to secure the blessings of liberty to ourselves and our posterity.

d.            all above.                                 e.  two.                         f.  none

 

16.      Which US Constitution Article is for the Executive Power?

a.  Article-I                              b.  Article-II.

c.  Article-III.                           d.   none

 

            17.       Copyright protects

a.       Principle of operations of hardware                                  

b.      Form of Expressions.

                        c.    both.                                 d.   neither                  

            18.       Which is true about a Fair Use?

                        a.  An exception to Copyright protection.

                        b.  It is a reproduction of copyrighted work with proper authorization for such purposes as

     teaching, scholarship/research, criticism/comment, and news reporting.

c.  both.                                               d.  neither.

 

            19.       Which is NOT protected by Copyright?

a.       Ideas themselves.                           b.  methods of operations.

c.       works fixed in a tangible form of expression.

d.      all.                                     e.  two.                         f.  none.

 

20.       Copyright protection requires

             a.    registration                                   b.    publication                                               

c.    both.                                d.    neither

            21.       Patent protects

a.       Purely abstract  ideas with no usefulness.

b.   Useful, novel and non-obvious inventions.

                        c.   Both.                                              d.  Neither.

22.       One of the earliest public key cryptosystems (algorithms) is

a.       DES

b.       Diffie-Hellman key exchange scheme.

c.       RSA algorithm.     

23.       Federalism

a.       is a unique and important attribute of US legal system.

b.      refers to the fact that only legislative agancies make laws in their respective areas.

c.       Both.                                  d.  neither.

24.       Factors in determining Fair Use of copyrighted materials include

a.       Purpose and character of use

b.      Nature of copyrighted work and the amount and substantiality of the portion used.

c.       The effect of use upon the potential market for the copyrighted work.

d.      All above.                          e.  two above.                          f.  none.

25.      Which is an argument for personal copying of software?

a.       violation is insignificant and some people cannot afford to pay.

b.      less employment opportunities for programmers.

c.       Both.                                 d.  neither.

 26.      In the US Constitution, state authorities are provided in

a.       Amendment-1

b.   Section-10, Article-1               

c.   both.                            d.  neither.

 27.      Enumerated Powers

      a..  are specified in Section-8, Article-1, US Constitution.

      b.   include, among others, Interstate commerce and Promoting progress of science and useful arts.

      c.   both.                            d.  neither.

 

 28.      Which preserves the letter frequency of plaintext?

a.    Caesar ciphers.                  b.   monoalphabetic ciphers.   

c.       Both.                                  d.   neither.

 

 29.      Laws in the US can be made by

a.       US Congress.

b.      Courts at various levels as precedents.

c.       Federal government agencies and state government agencies.

d.      All above.                          e.  two above.                          f.  none

 

 30.      Which is an exemption in FOIA?

a.                   Matters of national interest or national security.

b.                  Matters solely related to internal personnel procedures of a government agency.

c.                   Investigation records compiled for law enforcement purposes.

d.                  All above.                                e.  two above

 31.      Which is an amendment of EFOIA of 1996?

a.       broadening the definition of government records.

b.      shortening legal response period.

c.       providing easier and faster public access to government information.

d.      All above.                                      e.  two above.

 

      PART-B.               Other Problems.                                                                                 (80 points)

           

       Do all problems.

 

            A.        Explain what a fair use is for and also factors to consider in determining a fair use.

 

 

B.                 In no more than ten lines, compare copyright and patents in terms of

1.      what exactly are protected or others that are pretty close but not protected.

2.      protection requirements and

3.      terms (how long)

 

C.                 Briefly describe evolutions of computer technology applications including Expert Systems and information

globalization.

 

 

D.                 Briefly describe various types of computer crimes in which a computer plays either an essential role

            or a merely enhancing role.

 

           

E.                  Briefly describe some positive social impacts of computing including information globalization, E-Commerce, E- Learning, new job creation and telecommuting. 

 

F.                  Briefly describe some negative social impacts of computing including computer crimes, privacy violation, Internet pornography, dehumanization and health hazards.

 

 

G.        In no more than 12 lines, compare three computing professional Codes of Ethics in terms of

1.      structure

2.      underlying principles, if any

3.      overall strengths and weaknesses.

 

H.        In no more than twelve lines, compare deontology, utilitarianism and relativism in terms of

1.      points of emphasis

2.      strengths and weaknesses and

3.      your own preference.

 

I.                    Describe some desirable professional abilities for ethical decision making within computer profession.  

 

 

J.                   Describe factors affecting fair resolution of conflicts of interest.

 

K.                 Give a precise description of the RSA Public Key Cryptography algorithm.

What are key elements involved in the algorithm that make the cryptography (decryption, in particular) really work???