COSC3325
Final Exam.
Spring 2008
Keys
Used:
1-5:
BDCBB
6-10:
EBBBB
11-15:
CEACE
16-20:
BBAED
21-25:
BBADA
26-31:
DCCDDE
Name_______________________________________________
PART-A. Multiple Choices. (31
questions)
(93 points)
Choose the BEST answer by writing
down a Big A, B, C, D, E, or F in Capital in front of each
question number. (If this
instruction is NOT followed, you will lose FIVE
points.)
1. Which is
advocated (or represented) by Immanual Kant?
a. Relativism.
b. Deontology.
c. both.
d.
neither.
2. Which
is advocated (or represented) by Jeremy Bentham?
a. Greatest happiness.
b. Consequence and utility.
c. Utilitarianism.
d. All above.
e. Two
above.
3.
Relativism is based on
a. Absence of universal morality.
b. Morals varying among different cultures and/or
societies.
c. Both.
d.
Neither.
4.
Disparity of professional knowledge is the most evident
in
a. employer-employee relationship
b. client-professional relationship.
c. professional-professional relationship.
5.
Which are two opposite extremes?
a. Agency Model and Fiduciary Model
b. Agency Model and Paternalism Model
c. Paternalism Model and Fiduciary Model
6.
General Moral Imperatives of ACM Code of Ethics
include
a. contribution to society and human well-being
b. avoiding harm to others and honesty.
c. positive discrimination
d.
all above.
e. two above.
f. none
above.
7.
Which Code of Ethics is centered around relationships referred to as Principles?
a. ACM Code of Ethics
b. Software Engineering Code of Ethics
c. IEEE Code of Ethics
d. All
e. Two above
f. none.
8.
The number of prime numbers between 0 and 1000 is
roughly
a. 100
b. 160
c. 240
9.
Suppose that m is a positive prime integer and n is a positive integer
smaller than m.
In
this case, there is a positive integer q such that
a. n ** m =
q*m+1
b. n ** (m-1) = q*m+1
c. n ** (m-2) = q*m+1
d. none.
10.
An expert system is intended to be
a. a general problem solver for a variety of many different
domains.
b. a specialized problem solver for just one relatively narrow
domain.
c. both.
d.
neither.
11.
Some successful E-Commerce models include
a. shopping-cart model
b. online auction and online trading.
c. both.
d.
neither.
12.
Benefits of telecommuting include
a.
reduced overheads by employers.
b.
reduced rush-hour traffic congestion and energy
savings
c. lack
of immediate supervision possibly leading to lower productivity.
d.
all above.
e. two
above.
13. Security of RSA cryptosystem primarily comes
from
a.
Difficulty of factoring
large integers.
b.
Difficulty of testing the
primality of large integers.
c.
Difficulty of calculating a
multiplicative inverse.
14.
DES
a.
is a symmetric algorithm
that uses the same private key(s) both for the encryption and the
decryption.
b. was a US Government standard for
many years before being replaced by AES.
c. both.
d.
neither.
15. Which are
purposes of the US Constitution as specified in its
Preamble?
a. to form a
more perfect
b.
to dominate the rest of
the world in both political and economic powers.
c.
to secure
the blessings of liberty to ourselves and our posterity.
d.
all
above.
e. two.
f.
none
16. Which US
Constitution Article is for the Executive Power?
a. Article-I
b.
Article-II.
c. Article-III.
d.
none
17.
Copyright protects
a.
Principle of operations of
hardware
b.
Form of
Expressions.
c. both.
d. neither
18.
Which is true about a Fair Use?
a. An exception to Copyright
protection.
b. It is a reproduction of
copyrighted work with proper authorization for such purposes as
teaching,
scholarship/research, criticism/comment, and news
reporting.
c. both.
d.
neither.
19.
Which is NOT protected by Copyright?
a.
Ideas themselves.
b. methods of
operations.
c.
works fixed in a tangible
form of expression.
d.
all.
e. two.
f.
none.
20. Copyright
protection requires
a. registration
b.
publication
c. both.
d.
neither
21.
Patent protects
a.
Purely abstract ideas with no
usefulness.
b. Useful, novel and non-obvious
inventions.
c. Both.
d.
Neither.
22. One of the earliest
public key cryptosystems (algorithms) is
a.
DES
b.
Diffie-Hellman key exchange
scheme.
c.
RSA algorithm.
23.
Federalism
a.
is a unique and important
attribute of
b.
refers to the fact that only
legislative agancies make laws in their respective areas.
c.
Both.
d.
neither.
24. Factors in
determining Fair Use of copyrighted materials include
a.
Purpose and character of
use
b.
Nature of copyrighted work
and the amount and substantiality of the portion used.
c.
The effect of use upon the
potential market for the copyrighted work.
d.
All above.
e. two above.
f.
none.
25. Which is an argument
for personal copying of software?
a.
violation is insignificant
and some people cannot afford to pay.
b.
less employment
opportunities for programmers.
c.
Both.
d.
neither.
26. In the US Constitution,
state authorities are provided in
a.
Amendment-1
b. Section-10, Article-1
c. both.
d.
neither.
27. Enumerated Powers
a.. are specified in Section-8, Article-1,
US Constitution.
b. include, among others, Interstate
commerce and Promoting progress of science and useful
arts.
c. both.
d.
neither.
28.
Which preserves
the letter frequency of plaintext?
a. Caesar ciphers.
b. monoalphabetic
ciphers.
c.
Both.
d. neither.
29. Laws in the
a.
US
Congress.
b.
Courts at various levels as
precedents.
c.
Federal government agencies
and state government agencies.
d.
All above.
e. two above.
f.
none
30.
Which is an
exemption in FOIA?
a.
Matters
of national interest or national security.
b.
Matters
solely related to internal personnel procedures of a government
agency.
c.
Investigation
records compiled for law enforcement purposes.
d.
All
above.
e. two
above
31. Which is an amendment
of EFOIA of 1996?
a.
broadening
the definition of government records.
b.
shortening
legal response period.
c.
providing
easier and faster public access to government information.
d.
All
above.
e. two
above.
PART-B.
Other Problems.
(80 points)
Do all
problems.
A. Explain what a
fair use is for and also factors to consider in determining a fair
use.
B.
In
no more than ten lines, compare copyright and patents in terms
of
1.
what
exactly are protected or others that are pretty close but not
protected.
2.
protection
requirements and
3.
terms
(how long)
C.
Briefly describe evolutions
of computer technology applications including Expert Systems and information
globalization.
D.
Briefly describe various
types of computer crimes in which a computer plays either an essential role
or a merely enhancing role.
E.
Briefly
describe some positive social impacts of computing including information
globalization, E-Commerce, E- Learning, new job creation and telecommuting.
F.
Briefly
describe some negative social impacts of computing including computer crimes,
privacy violation, Internet pornography, dehumanization and health
hazards.
G. In no
more than 12 lines, compare three computing professional Codes of Ethics in
terms of
1.
structure
2.
underlying
principles, if any
3.
overall
strengths and weaknesses.
H. In no more than
twelve lines, compare deontology, utilitarianism and relativism in terms
of
1.
points of
emphasis
2.
strengths and weaknesses
and
3.
your own
preference.
I.
Describe some desirable
professional abilities for ethical decision making within computer
profession.
J.
Describe factors affecting
fair resolution of conflicts of interest.
K.
Give a precise description
of the RSA Public Key Cryptography algorithm.
What are key elements
involved in the algorithm that make the cryptography (decryption, in particular)
really work???