Chapter 3 - Computer Ethics and Security

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

TOPIC 3: COMPUTER ETHICS & SECURITY

3.1 Area of computer ethics


3.2 Netiquette

1. Answer all questions.


a. Green computing involve reducing the electricity and environmental waste while using
computer. State any three (3) suggestions to support green computing. [3 marks]
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________

b. In your opinion, give 2 reason why we need green computing? [1 mark]


________________________________________________________________________
________________________________________________________________________

b. Most of the Internet based companies have their products protected under intellectual
property rights (IP). Give two (2) reasons why a product must have an IP. [4 marks]
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________

c. State 2 others Areas of computer ethics [2 marks]


________________________________________________________________________
________________________________________________________________________

2. Computer ethics is set of moral principles that regulate the use of computers and the
internet. As the world of computers evolves, computer ethics continues to create ethical
standards that address new issues raised by new technologies.
a. Write the common current issue that related to ethical on the internet in intellectual
property. [2 marks]
1) copyrighted electronic content
_____________________________________________________________________
_____________________________________________________________________

2) privacy concerns
_____________________________________________________________________

1 Updated 10/10/2022 ~ MNMM/SA


TOPIC 3: COMPUTER ETHICS & SECURITY
3.1 Area of computer ethics
3.2 Netiquette

___________________________________________________________________

b. Define software piracy [1 mark]


________________________________________________________________________

c. Suggest 2 ways to protect personal information so as not leak to unauthorized parties


[2 mark]
________________________________________________________________________
________________________________________________________________________

d. Give the types of computer ethics for each of the following situation: [14 mark]
Situation Area of ethical

1 Make sure a copy of software had been paid by


the users before it is use
People must also not use other people's
2 computer resources without authorization
because it can be declared as hacking.
3 Avoid from use the computer to harm other
people or destroy other people works
4 Responsibility for your computer failure

5 The staff steal a company's trade secrets and


data
6 Students hack into the university's system to
change their GPA result.
7 Use recycle paper

8 Turn off monitor, printer and other devices while


not in use.
9 A list of Rules and regulation while in computer
laboratory.
10 You shalt not use computer resources without
permission
11 Use updated spyware to protect your computer
from malicious
12 Using scam to get personal and account
information
13 Threatening someone in an instant message
To demonstrate the concept of gravity, a science
14 teacher shows her class a two-minute clip from a
popular movie.

2 Updated 10/10/2022 ~ MNMM/SA


TOPIC 3: COMPUTER ETHICS & SECURITY
3.1 Area of computer ethics
3.2 Netiquette

e. Give 2 actions that violate computer ethics while completing your writing assignments.
[2 marks]
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________

f. State 2 ways to prevent the use of Wi-Fi internet unethical among the KML students
[2 mark]
________________________________________________________________________

3. Users of social networking websites include children and teenagers. Therefore it is important for
them to be aware of the netiquette rules.
a) Define the term netiquette. [2 marks]
________________________________________________________________________
________________________________________________________________________

b) Suggest two (2) effective ways in creating awareness to users about netiquette.
[4 marks]
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________

c) List four (4) rules of netiquette. [4 marks]


________________________________________________________________________
________________________________________________________________________
________________________________________________________________________

d) Give two (2) examples of netiquette that we must follow when using e-mail. [4 marks]
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
4.
a) Ethics is a set of moral principles that control human behaviour or a group of people.
i. Why do we need ethics for Internet users? [2 marks]
_________________________________________________________________

3 Updated 10/10/2022 ~ MNMM/SA


TOPIC 3: COMPUTER ETHICS & SECURITY
3.1 Area of computer ethics
3.2 Netiquette

__________________________________________________________________
__________________________________________________________________

ii. State two (2) issues which are related to ethics in Internet usage. [2 marks]
_________________________________________________________________
__________________________________________________________________
__________________________________________________________________

iii. Give two (2) Internet social media which require ethics to ensure it is able to
function well. [2 marks]
_________________________________________________________________
__________________________________________________________________
__________________________________________________________________

iv. Give two (2) examples of unethical behaviour in Internet while using WhatsApp.
[2 marks]
_________________________________________________________________
__________________________________________________________________
__________________________________________________________________
5.
a) Based on the given situations, identify the type of computer crime.
i. En.Faisal makes a copy of a copyright image of a company from the company’s
Website without permission and displays the image in his company’s website.
[2 marks]
_________________________________________________________________
ii. Zali downloaded Harry Potter movies from the Internet and then made DVD
copies to sell them to her friends. [2 marks]
_________________________________________________________________

6. Netiquette is short for “network etiquette” or “Internet etiquette” that provides a set of rules or
principles to facilitate interaction over network.
a) Give your opinion why netiquette is very important for internet user. [3 marks]
________________________________________________________________________
________________________________________________________________________

4 Updated 10/10/2022 ~ MNMM/SA


TOPIC 3: COMPUTER ETHICS & SECURITY
3.1 Area of computer ethics
3.2 Netiquette

b) Give a netiquette for each of the following scenario. [6 marks]


Scenario Netiquette Rule
You send a message to your friend.
Unfortunately your friend cannot
understand the message due to many
abbreviations.
You received an email that makes you feel
happy. You want to reply it by expressing
your feeling.
You used a computer that someone else
just vacated but you soon discovered this
person forgot to log out his/her email.
7.
a) Knowledge and practice of ethics is a way of protecting right to an invention and
information.
i. Give the definition of Intellectual Property (IP). [2 marks]
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________

ii. State one (1) example of an issue appropriate for the following IP types.
[2 marks]
Copyright Trademarks

b) State a suitable type of Intellectual property right to protect the following products:
i. Dr.Pijoy Param’s invention on fire prevention system. [1 marks]
_________________________________________________________________
ii. Untung Besar Sdn Berhad company name. [1 marks]
_________________________________________________________________
iii. An E-book titled “Hantu Timah Balik Rumah” [1 marks]
_________________________________________________________________
iv. Artworks company logo. [1 marks]

5 Updated 10/10/2022 ~ MNMM/SA


TOPIC 3: COMPUTER ETHICS & SECURITY
3.1 Area of computer ethics
3.2 Netiquette

_________________________________________________________________

8. Computer ethics are the moral guidelines that shaping the used of information systems and
computers, whereas computer security is preserving confidentiality, integrity and availability of
information assets.
a) Differentiate between copyright and patent. [2 marks]
Copyright Patent

b) Explain one (1) implication if the intellectual property (IP) does not exist. [2 marks]
________________________________________________________________________
________________________________________________________________________

c) State an appropriate type of IP right to protect the following items:


i. A company name. [1 marks]
_________________________________________________________________
ii. A song lyrics. [1 marks]
_________________________________________________________________
iii. A new car model. [1 marks]
_________________________________________________________________
iv. A company tagline. [1 marks]
_________________________________________________________________

d) Netiquette is a code of acceptable behaviours where users should follow while online.
Give a netiquette rule for each scenario below. [8 marks]
Scenario Netiquette Rule

i. Your friend send a message with capital letter

ii. You send a message without checking the content

iii. You spread rumours on certain matter to others.

6 Updated 10/10/2022 ~ MNMM/SA


TOPIC 3: COMPUTER ETHICS & SECURITY
3.1 Area of computer ethics
3.2 Netiquette

iv. A friend read your email while you are not around.

v. Your friend sent an email without subject heading.

vi. Your friend reply condolence message with humour


content.

vii. Your friend sends a very long email message.

viii. Your friend uses offensive language to express his


anger in social media.
9.
a) Privacy is a big concern for individuals, particularly as it relates to their Web activity.
i. Why is it easier to maintain information privacy in the past? [2 marks]
_________________________________________________________________
_________________________________________________________________
__________________________________________________________________

ii. Why is it much harder to do so nowadays? [2 marks]


_________________________________________________________________
_________________________________________________________________
__________________________________________________________________

b) The table below shows the conversation between a primary school student and his class
teacher in a chat room.

Pupil Y GIV ME A SAMPLE PROJECT A.S.A.P

Teacher X You may get sample of previous project from our school library.

Pupil Y BuT, SiR, I WaNt it NOWWWWWWW!

Identify three (3) rules in netiquette that are against the above chat conversation.
[3 marks]
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________

7 Updated 10/10/2022 ~ MNMM/SA


TOPIC 3: COMPUTER ETHICS & SECURITY
3.1 Area of computer ethics
3.2 Netiquette

10.
a. Electronic surveillance such a CCTV, key logger and Intrusion Detection System (IDS) may
reduce computer attacks and network risks. However, this measure may result
inconveniences. Discuss the reason by giving one (1) example. [3 marks]
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________

b. Give 1 example of situation where the following online netiquette rules are not
complied.

[8 marks]

11. Both computer ethics and netiquette are important in ensuring a healthy and meaningful
internet usage among internet users.
a. Define computer ethics. [2 marks]
________________________________________________________________________
________________________________________________________________________

8 Updated 10/10/2022 ~ MNMM/SA


TOPIC 3: COMPUTER ETHICS & SECURITY
3.1 Area of computer ethics
3.2 Netiquette

b. Identify the rules of netiquette based on the given statement. [3 marks]

c. Network etiquette or internet etiquette is a set of social conventions that facilitate


interaction over the network.
i. List 3 areas that good netiquette is majorly focused. [2 marks]
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________

ii. Describe the meaning of ‘Use appropriate language’ based on netiquette rules.
[2 marks]
_________________________________________________________________
_________________________________________________________________

12. What is Netiquette? [1 mark]


_____________________________________________________________________________
_____________________________________________________________________________

13. Identify the rules of netiquette on social interaction and communication electronically. [2 marks]
_______________________________________________________________________________
_______________________________________________________________________________

14. Green computing involves reducing the electricity and environmental waste while using a
computer. State any three (3) suggestions to support green computing. [3 marks]

9 Updated 10/10/2022 ~ MNMM/SA


TOPIC 3: COMPUTER ETHICS & SECURITY
3.1 Area of computer ethics
3.2 Netiquette

_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________

15. Answer all questions.


a. Give the definition of Intellectual Property. [2 marks]
______________________________________________________________________
______________________________________________________________________

b. Explain the important of Intellectual Property [2 marks]


______________________________________________________________________
______________________________________________________________________

c. Identify the IP for the following work. [12 marks]


Work Type of IP
1 Derivative work
2 Song titles “My Idol” singing by Pii-Joie
3 A smell

Specifics of a current product being


5 modified, such as ‘Water-proof board to
board; connectors’ for an Apple Iphone
6 Graffiti
7 A specifically shaped chair
8 Publishing editions
9 “Now everyone can fly” slogan
10 A new design of phone case
11 Dramatic works intended to be performed
in theatre
12 The new original bread toaster

10 Updated 10/10/2022 ~ MNMM/SA


TOPIC 3: COMPUTER ETHICS & SECURITY
3.1 Area of computer ethics
3.2 Netiquette

d. Give three (3) types of Intellectual Property. [3 marks]


________________________________________________________________________
________________________________________________________________________
________________________________________________________________________

e. What is similarity of answer in 15d. [1 mark]


________________________________________________________________________
________________________________________________________________________

16. Answer all questions:


a. Give three (3) examples of artistic work. [3 marks]
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________

b. Give three (3) examples of literary work. [3 marks]


________________________________________________________________________
________________________________________________________________________
________________________________________________________________________

17. The explosions of information technology amongst our new generations make them greedy in
reaching their vision without realizing that they are doing cybercriminal. They simply copied
other's works to get profit and fast returns.

a. What type of Intellectual Property for above statement? [1 mark]

_______________________________________________________________________

b. Give one example for answer 17 (a). [1 mark]

_______________________________________________________________________

18. "I’m Loving it", McDonald’s double arches, the Nike® "swoosh", John Deere Green

a. What type of Intellectual Property for above statement? [1 mark]

________________________________________________________________________

b. Give one other example for answer 18(a). [1 mark]

________________________________________________________________________

11 Updated 10/10/2022 ~ MNMM/SA


TOPIC 3: COMPUTER ETHICS & SECURITY
3.1 Area of computer ethics
3.2 Netiquette

19. You have right to exclude others from making, using, selling, offering for sale, or importing the
invention for 20 years from the filing date (formerly 17 years from the date the inventions was
issued). As the owner, you have rights and do not have to actually use or make your invention;
you still have the right to exclude others from making and using your patented invention.

a. What type of Intellectual Property for above statement? [1 mark]

________________________________________________________________________

b. Give one example for answer 19(a). [1 mark]

________________________________________________________________________

PASS YEAR 2018/2019


PART A
1. (a) State three (3) netiquette rules in a chat room. [3 marks]
_______________________________________________________________________________
_______________________________________________________________________________
(b) Explain the importance of Computer Ethics. [1 mark]
_______________________________________________________________________________
_______________________________________________________________________________

(c) Explain the following terms. [4 marks]


Term Explanation

Intellectual Property Right

Information Privacy

PART B
1. (a) Identify and state whether the given scenario is ethical or non-ethical behaviour while
chatting online. Give justification based on the netiquette. [2 marks]
Scenario Ethical/ Non-Ethical Justification

Sending a very long positive


message

12 Updated 10/10/2022 ~ MNMM/SA


TOPIC 3: COMPUTER ETHICS & SECURITY
3.1 Area of computer ethics
3.2 Netiquette

(b) Identify and state the area of Computer Ethics based on the following scenario. [2 marks]
Scenario Area of Computer Ethics
Raju searches information using only social
media such as personal blog and Facebook
to write a report.
Azizah leaves her computer idle overnight.

PASS YEAR 2019/2020


PART A
[email protected]
Answer me please
HI THERE
CAN YOU REPLY ME ASAP!!!!
1. (a) Identify two (2) netiquette rules that must be abide based on figure 4. [2 marks]
_______________________________________________________________________________
(b) Name the appropriate area of computer ethics based on the following scenario. [5 marks]
Scenario Area of Computer Ethics
Someone copy a well-known novel to the web and
encourages others to read it
A student finds information solely on Wikipedia to
write a report.
You are not encourageg to use third party application
in Facebook.
Do not leave the computer running overnight

Download movies illegally

13 Updated 10/10/2022 ~ MNMM/SA


TOPIC 3: COMPUTER ETHICS & SECURITY
3.1 Area of computer ethics
3.2 Netiquette

PART B
1. (a) Show one (1) example of situation in Facebook where the following online netiquette rules
are NOT complied. [2 marks]
Netiquette Rule Situation where Netiquette Rule is NOT complied

Respect others’ privacy

(b) Point out one (1) risk of inaccurate information associated with weather forecasting in
aviation industry. [2 marks]
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

EOQ

14 Updated 10/10/2022 ~ MNMM/SA

You might also like