SCH163 Question Bank L1 To L3

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

SCH163 Question Bank

- LECTURE ONE -
(from slide 1 to 30 only)

Q1: What are the different types of issues in Computer


Science?
- Legal issues
- Social issues
- Ethical issues
- Privacy issues
- Environmental issues

Q2: Why do you need an ethics course?


- Analyze ethical situations using core ethical theories.
- Identify and evaluate ethical, social, and legal issues in information
systems and technology.
- Apply ethical analysis to real-world problems through case studies and
hypothetical scenarios.
- Make informed decisions and plan actions based on ethical
methodologies.
- Effectively communicate and debate diverse perspectives on ethical issues
with logical reasoning.
- Apply professional codes of ethics to common IT and management
situations.

Q3: What is Facebook’s motto?


- Move Fast And Break Things
- Move Fast and Build Things
- Move Fast With Stable Infra
- Move Fast
- Ship Love
- Move Fast And Please Please Please Don’t Break Anything
Q3: What are the challenges of Ethics?
- Developing an affordable computer-controlled motor.
- Revolutionize the small motor industry.
- Motor lacks power but meets quality standards.
- Management directs team to modify the software:
1. Air filter fully engaged during testing.
2. It is disengaged otherwise.

Q4: What was the ethical challenge presented by the


Volkswagen Defeat Device?
- The new diesel engine couldn't meet air quality standards, and the
software engaged emissions control during testing but disabled it at other
times.

Q5: What were the key points regarding the ethical


challenge in the case of the Volkswagen Defeat Device?
- The device was first used in 2009 models, sold in almost 500,000 vehicles.
The software was updated over time, and many cars were "fixed" with just
a software patch.
When these same situations happen to you, how will you prevent yourself from making
the same decision as the Volkswagen engineers?

Q6: Why did VW engineers break the laws?


- Everybody was doing it.
- It won’t affect anybody else.
- It was culturally accepted.
- They won’t get caught.
- It was not enforced.
- Dangerous not to do it.
Q7: Which professions often require professional
licensing?
Medical Doctors
● Nurses
● Psychologists
● Teachers (K-12)
● Engineers
● Lawyers
● Pilots
● Electricians
● Plumbers
● Architects
● Bartenders
● Massage Therapists
● Barbers
● Nail Technicians (Manicurists)

Q8: Why aren't Software Engineers considered legal


"Engineers" in many U.S. states?
- Because they haven't passed the PE Exam required for that recognition.

Q9: Why is global view important for websites?


- Websites are visible worldwide.
- Cultures, laws, and ethics vary widely. It highlights the importance of a
global viewpoint.

Q10: What are some key global considerations?


- a. Few people are comfortable with technology
- b. Less than 45% of world has Internet connection
- c. Only 7% of the world has college-level degree (about 30% in U.S.)
- d. Top 10% of world population (8.2%) by salary
Q11: What are the key topics?
- The Pace of Change
- Change and Unexpected Developments
- Themes of Technology Challenges
- Ethics

Q12: Have you heard of the small business Fazio


Mechanical?
- Yes
- No

Q13: Have you heard of the small business Fazio


Mechanical?
- Specializes in supermarket refrigeration systems.
- A small business with less than 200 employees located in southwest
Pennsylvania.
- Data on 40 million credit cards stolen.
- Over 70 million customer records were stolen.
- ○ Started with phishing email sent to Fazio Mechanical

Q14: Why is it challenging for small businesses to handle


cybersecurity?
- They cannot afford security staff
- They serve as gateways to larger systems.
- They frequently go out of business.

Q15: Why do security breaches occur in terms of


software?
- Due to poorly written software.
- Poor network and application configurations.
- The choice between whistleblowing and responsible disclosure.
Q16: What are some things related to mobile phones and
connectivity?
- Internet Streaming
- Continuous Connection
- Digital Photos
- Targeted News
- Other Impacts

Q17: How has the pace of change in computing evolved


over time?
- 1940s: First computer built.
- 1956: First hard-drive disk, weighing a ton, stored five megabytes.
- 1991 to the 2000s: Space shuttles had one-megahertz computers; a
decade later, some cars had 100-megahertz computers, and now speeds
of several gigahertz are common.

Q18: How have cell phones evolved with unexpected


developments?
- In the 1990s, there were relatively few cell phones.
- By 2011, approximately five billion cell phones were worldwide.
- Cell phones, initially used for conversations and messaging, now serve
diverse purposes like taking pictures, downloading music, checking email,
banking, and managing investments. Additionally, smartphone apps can
monitor health conditions like diabetes and locate resources in remote
areas.
Q19: What are some unexpected developments and
concerns associated with cell phones?
- Location tracking raises privacy issues.
- Cell phones disrupt solitude, quiet, and concentration.
- Talking on phones while driving is risky.
- Cameras in phones affect privacy in public and private spaces.
- Other concerns include teenagers sexting, terrorists using phones for
bombs, and rioters organizing looting.

Q20: How did social networking evolve?


- Classmates.com in 1995 was the first online social networking site.
- Myspace, founded in 2003, had about 100 million member profiles by
2006.
- Facebook, originating at Harvard, started as an online version of student
directories.
- Social networking became popular due to the ease of sharing aspects of
people's lives.

Q21: How is social networking used?


- Businesses connect with customers.
- Organizations seek donations.
- Groups organize volunteers.
- Protesters arrange demonstrations and revolutions.
- Individuals pool resources through "crowdfunding."

Q22: How has communication on the web changed?


- Blogs started as outlets for amateurs.
- They've become significant sources of news and entertainment.
- Inexpensive video tools led to a surge in amateur videos.
- Many web videos can infringe on entertainment companies' copyrights.
Q23: What is telemedicine?
- Telemedicine is the remote execution of medical exams and procedures,
including surgery.

Q24: How has e-commerce evolved?


- Amazon.com, starting in 1994, has become a popular and user-friendly
commercial site.
- eBay.com facilitates online auctions.
- Traditional businesses now have websites.
- Online sales in the U.S. total hundreds of billions annually.
- Sellers can engage in direct sales, creating a peer-to-peer economy.

(from slide 1 to 30 only)


- LECTURE TWO -
(all slides)

Q1: What is the definition of privacy in the context of


computing, and what are its three dimensions?
- Privacy in computing refers to the claim of individuals, groups, and
institutions to determine when, how, and to what extent their information is
communicated to others. Its three dimensions are personal privacy,
territorial privacy, and informational privacy.

Q2: Explain the basic privacy principles that help protect


individuals' privacy.
- Basic privacy principles include lawfulness and fairness, necessity of data
collection and processing, purpose specification, transparency,
supervision, and adequate organizational and technical safeguards.

Q3: How can privacy be protected through


privacy-enhancing technologies (PETs)?
- Privacy can be protected through PETs, which include technologies and
tools that help secure personal data, enable anonymous transactions, and
protect user identities.

Q4: Provide examples of threats to privacy at the


application, communication, and system levels.
- Threats to privacy can include data collection in applications, monitoring of
communication, identity theft, data mining, poor system security, and
government surveillance.
Q5: What are some privacy risks associated with new
technologies like smartphones and search engines?
- Privacy risks with new technologies include location tracking via
smartphones, data collection by search engines, and potential misuse of
personal information.

Q6: How do fair information principles help safeguard


individuals' privacy?
- Fair information principles include informing individuals when collecting
data, collecting only necessary information, offering opt-out options,
maintaining data accuracy, and developing policies for law enforcement
requests.

Q7: Discuss the Fourth Amendment of the U.S.


Constitution and its relevance to privacy in the digital
age.
- The Fourth Amendment protects against unreasonable searches and
seizures and requires government agencies to provide probable cause for
searches. Its relevance is debated in the digital age due to evolving
technologies.

Q8: What Supreme Court cases have shaped the


interpretation of privacy rights in the United States?
- Cases like Katz v. United States and Kyllo v. United States have influenced
privacy rights by extending protections to conversations and limiting
non-invasive surveillance.

Q9: How does video surveillance and face recognition


impact privacy and security?
- Video surveillance and face recognition can enhance security but raise
concerns about privacy invasion and misuse of personal data.
Q10: Should individuals have the right to be forgotten on
the internet, and why or why not?
- The right to be forgotten allows individuals to request the removal of
personal data from the internet. Whether it should be granted depends on
balancing privacy rights against freedom of information.

Q11: How does location tracking via GPS and cell phones
affect privacy, and what are the pros and cons?
- Location tracking can provide convenience and safety but also poses
privacy risks by revealing an individual's whereabouts and activities.

Q12: Explain the concept of "Caller ID" and its


implications for privacy.
- Caller ID displays the telephone number of the caller on the recipient's
phone. It protects the recipient's privacy by allowing them to know who is
calling, but it may violate the caller's privacy by revealing their number
without consent.

Q13: What are some privacy-related challenges and


controversies associated with social networks?
- Social networks raise concerns about data sharing, information exposure,
and the potential for unauthorized access to personal information.

Q14: How do government systems and databases handle


individuals' data, and what are the potential privacy
concerns?
- Government systems collect and store various types of data, which can
lead to privacy concerns, especially when data is accessed without proper
authorization or safeguards.
Q15: What is the right to be forgotten, and how does it
relate to privacy in the digital age?
- The right to be forgotten allows individuals to request the removal of their
personal data from online platforms and search engine results. It
addresses privacy concerns in the digital age by giving individuals more
control over their online presence.

Q16: Should there be a national ID system that collects


various personal data, including biometrics?
- The implementation of a national ID system raises questions about privacy,
security, and data protection. Decisions should consider the balance
between national security and individual privacy.

Q17: Discuss the differences between privacy laws in the


European Union and the United States.
- EU privacy laws, such as the GDPR, are generally more stringent than
U.S. regulations and emphasize individual data protection and consent.
U.S. laws vary by state and sector, with a focus on sectoral regulation.

Q18: How do businesses offering free Internet services in


exchange for tracking web activity impact individuals'
privacy?
- These businesses offer convenience but may compromise privacy by
tracking and monetizing users' online behavior. Users should weigh the
benefits against the loss of privacy.

Q19: What ethical considerations surround the use of


anonymous digital cash and online marketing practices?
- The use of anonymous digital cash raises questions about the balance
between privacy and potential misuse, while online marketing practices
should be transparent and respectful of user preferences.
Q20: How can individuals and organizations balance the
need for data security with the protection of privacy?
- Balancing data security and privacy involves implementing strong security
measures while respecting individuals' rights and following legal and
ethical guidelines.
- LECTURE THREE -
(all slides)

Q1: What is the main purpose of the Data Protection Act


(DPA)?
- The main purpose of the Data Protection Act (DPA) is to protect personal
data stored on computers or in organized paper filing systems and
safeguard individuals from the misuse of their data.

Q2. How many principles are there in the Data Protection


Act (DPA), and can you name some of them?
- There are eight principles in the Data Protection Act (DPA). Some of these
principles include data security, data relevance, data retention, data
accuracy, lawful data processing, data subject rights, specified lawful
purposes, and restrictions on data transfers to countries without adequate
data protection laws.

Q3: When was the Data Protection Act (DPA) first


introduced in the United Kingdom?
- The Data Protection Act (DPA) was first introduced in the United Kingdom
in 1988.

Q4: What are the consequences of violating the Data


Protection Act (DPA)?
- The consequences of violating the Data Protection Act (DPA) can include
fines and penalties, as well as legal actions by individuals whose data has
been mishandled.
Q5: Can you provide an example of a case that violated
the Data Protection Act (DPA)?
- An example of a case that violated the Data Protection Act (DPA) is
Facebook's Cambridge Analytica data scandal, where personal data of
millions of Facebook users was collected without consent for political
propaganda purposes.

Q6: How did Facebook update its privacy settings in 2018


to comply with the Data Protection Act (DPA)?
- Facebook updated its privacy settings in 2018 to comply with the Data
Protection Act (DPA) by redesigning the mobile settings menu, adding
tools for data downloading and deletion, and making changes to its terms
of service and data policy.

Q7: What is the Information Technology Act, 2000


(ITA-2000) also known as?
- The Information Technology Act, 2000 (ITA-2000) is also known as
ITA-2000.

Q8: What is the primary focus of the Information


Technology Act, 2000 (ITA-2000)?
- The primary focus of the Information Technology Act, 2000 (ITA-2000) is to
deal with cybercrime and electronic commerce in India.

9. When was the Information Technology Act, 2000


(ITA-2000) enacted in India?
- The Information Technology Act, 2000 (ITA-2000) was enacted in India on
17th October 2000.
10. What are some key provisions of the Information
Technology Act, 2000 (ITA-2000)?
- Key provisions of the Information Technology Act, 2000 (ITA-2000) include
legal recognition for electronic transactions, addressing electronic
documents, e-signatures, authentication, and penalties for security breach
offenses, including cyber terrorism.

11. Who introduced the Information Technology Act, 2000


(ITA-2000) to the Indian Parliament?
- The Information Technology Act, 2000 (ITA-2000) was introduced to the
Indian Parliament by Pramod Mahajan.

12. What was the significance of Section 66A of the


Information Technology Act, 2000 (ITA-2000)?
- Section 66A of the Information Technology Act, 2000 (ITA-2000) was
significant as it penalized sending offensive messages.

13. What does the Stored Communications Act (SCA)


protect?

- The Stored Communications Act (SCA) protects stored data from various
databases on the internet, including emails, billing information, and all
stored information.

14. When was the Stored Communications Act (SCA)


enacted?
- The Stored Communications Act (SCA) was enacted in 1986 as part of the
Electronic Communications Privacy Act.
15. What does the Stored Communications Act (SCA)
provide privacy protection for?
- The Stored Communications Act (SCA) provides privacy protection for
customers of network service providers and controls how the government
can access stored account information from entities like Internet service
providers.

16. Under what circumstances can authorities access


someone's stored communications without a warrant
according to the Stored Communications Act (SCA)?
- Authorities can access someone's stored communications without a
warrant when the privacy policy of the electronic communication facility
doesn't limit access or if electronic communication services are not offered
by the facility.

17. Can you provide an example of a case that violated


the Stored Communications Act (SCA)?
- An example of a case that violated the Stored Communications Act (SCA)
is the "Robbins vs. Lower Merion School District," where school-issued
laptops captured students' photos and web activity without authorization.

18. What is the purpose of the Communications


Assistance for Law Enforcement Act (CALEA)?
- The purpose of the Communications Assistance for Law Enforcement Act
(CALEA) is to allow law enforcement agencies to intercept communications
with a warrant, originally applying to telephone conversations but later
expanded to cover VoIP and internet traffic.
19. How has CALEA evolved over time to cover different
forms of communication?
- CALEA has evolved over time to cover different forms of communication
due to technological advancements.

20. Can you provide an example of a case where CALEA


was followed to aid law enforcement?
- An example of a case where CALEA was followed to aid law enforcement
is the murder of Jennifer Corbin, where cell phone evidence was used to
establish the suspect's location and actions.

By Amr Mahmoud & Ahmed Abbas.

You might also like