309 Spring 01 Please put name on
Exam 1 Back of last page
Miller
1. If we do a perfect job of developing the skills for making perfect ethical decisions and we use these skills to perfectly analyze all of the situations where ethics plays a factor to arrive at a best course of action then for this to not be another totally useless
academic exercise we need to ______
______
2. In class we discussed a number of informal guidelines for making ethical decisions. These guidelines, designated by names such as the Mom Test, the TV Test, and the Newspaper Test, all seemed to be variations on the thought that if
______
______
______
3. It can be argued that the Golden Rule, which contains the central thought that
______
______
is a fundamental moral principle because
______
4. In altruism the emphasis is placed on ______
______
5. Kant Question
6. Mary, who sort of has a date for a party, ends up talking to a fellow who when he learns she is a computer science major, offers to get her a disk full of account name/ password pairs currently active on the USM computer named ocean. He explains that he and some of his friends have control of the computer and that so far it looks like their break in has not been detected. Mary is not sure why she is being told all of this, although a couple thoughts have crossed her mind and she surely does not know for a fact that what she is being told is true. Oh, what to do? Fortunately Mary has just finished taking CSC309.
Following a utilitarian approach to ethics she (a. reports what she has heard to a faculty member who she feels will protect her identity and who will have the claim checked out, b. does not report the contents of this private communication to anyone else,)
reasoning that ______
______
After reflecting on her answer to the first part of this question and again applying a utilitarian approach to ethics she, changes her mind about what she should do and (a. reports what she has heard to a faculty member who she feels will protect her identity and who will have the claim checked out, b. does not report the contents of this private communication to anyone else,)
reasoning that______
______
Following a Kantian approach to ethics she (a. reports what she has heard to a faculty member who she feels will protect her identity and who will have the claim checked out, b. does not report the contents of this private communication to anyone else,)
reasoning that ______
______
Following an altruistic approach to ethics she (a. reports what she has heard to a faculty member who she feels will protect her identity and who will have the claim checked out, b. does not report the contents of this private communication to anyone else,)
reasoning that ______
______
7. At the Super Bowl held in January of 2001 computers were used to scan images of the people entering the game to identify them.
A benefit of this surveillance for people attending the game was ______
______
______
A penalty caused by this surveillance for people attending the game was ______
______
______
8. Question on article covered in class
9. Credit bureaus collect lots of data on each of us. On the surface, that appears to be a rather major invasion of personal privacy. But this turns out to be another of those tradeoffs we keep talking about because when we give up this privacy protection we gain what in return?
______
______
10. What was the Bhopal incident mentioned in this class?
______
______
______
11. Example of question on article covered in class. With theft of identity we usually think of someone simply running up bills on our credit cards. In the article “Stolen Identity Haunts Victim” we saw that there were worst things that could happen. Explain what happened to the victim, Bronti Kelley.
12. In 1976 Diffie and Hellman developed a completely new encryption scheme called public key cryptography. An elegant implementation of public key appeared in 1977 authored by three MIT professors (Rivest, Shamir, and Adleman). A major advantage that this approach offered was that
______
______
13. While there does seem to be considerable concern about the governments push for mandatory key escrow encryption there are good business and personal reasons for using some sort of key escrow system. In fact it can be argued that every business that uses encryption needs key escrow because
______
______
______
14. If longer encryption keys offer greater security why doesn’t everyone simply use very long keys to produce encrypted messages that would take forever to decode?
______
______
______
15. The terms computer matching and computer profiling describe two different actions.
Computer matching occurs when ______
______
Computer profiling ______
______
______
16. Why is protection of your social security number more important now than it was 30 years ago?
______
______
______
17. Extensive studies of mishaps have identified three primary
causes. (1) Mishaps are almost always caused by ______
______
(2) The failure ______is often a contributing
factor (sometimes the causal factor) of mishaps. Another thing we know from studying mishaps is that (3) they often involve problems
in subsystem ______
18. Describe a situation where
a. You should be willing to reveal your social security number.
______
b. You should not be willing to reveal your social security number.
______
19. When we discussed the interface-design-for-safety topic we discussed the design problem of providing an interface between a computer system that performs a critical process control function and the human operator who might be called upon without warning to take over control following some catastrophic event. Two of the three things we mentioned are:
a. ______
______
b. ______
______
20. In spite of our understanding of the impact of software bugs and the difficulty in identifying and correcting them, we still see a strong tendency to replace hardware with software. Give two reasons why
a. ______
b. ______
c. Uses less space and power.
21. Explain how there can still be errors with "software that matches its specifications perfectly and is used correctly by the user."
______
______
22. E-mail privacy has become a real problem and there are lots of cases being reported of employers reading employees mail. As an employee you should find out what the company policy is on the use of e-mail and regardless of what you find you should avoid (most say never) using e-mail to say anything that
______
______