Uploaded by Rasen Fernandez

Assignment - 10 Commandments for computer ethics.pdf

advertisement
SELF-ASSESSMENT QUESTIONS
A. Daan is a computer buff. He loves to surf the Internet and try all available applications. Daan also does
web design and programming, among others. In one of his computer explorations, Daan discovered a virus
that destroys the computer motherboard. To test his discovery, Daan surreptitiously installed the virus in his
friend Kael’s PC. After a week, Kael broke the sad news to Daan. His PC has bogged down and he needs to
buy a new motherboard. Daan finds himself torn between whether to tell Kael or not.
1. Which of the 10 commandments on computer ethics did Daan violate?
2. If you were Daan, will you tell Kael the truth or not? Explain.
3. If you were Kael and Daan told you the truth, what will you do?
B. Identify which among the Ten Commandments for computer ethics is violated in each of the following
situations.
1. Deliberately viewing the messages in other peoples’ phone Inbox.
2. Cut-and-paste the text from a webpage into your research paper without recognizing the source.
3. Sending too many unnecessary email messages to your contacts in the Internet.
4. Assuming other people’s computer identity like username and password.
5. Cracking codes to get client listing from a company.
C. True or False: Write T if the statement is true, otherwise write F.
1. Ethics is derived from the Greek term “mores”, which means character or custom.
2. What is ethical in the Laoag may not be ethical in Batac.
3. Computer ethics is example of Applied Ethics.
4. Computer Ethics refers to the guiding precepts and norms that are adopted and applied to regulate and
control the use of computers and its applications.
5. The activities you perform in the Internet does not matter so much because you cannot see the people
you are interacting with anyway.
6. Patent is an example of intangible property.
7. Repetitive strain injuries acquired through constant use of computers is an issue on social justice.
8. The right to freedom of expression allows an individual to post information on whatever nature in the
Internet.
9. Copyrights can be bought.
10. Many argue the national ID system because of possible abuse from the government.
11. Resources taken from the Internet are readily accessible and therefore it is free to use and duplicate for
mass production.
12. Physically handicapped people are incapacitated to use the computer.
D. Multiple Choice: Identify which among the most common computer abuses is described in the following
items:
______1. Some message reaches our e-mail accounts usually from nowhere and sometimes it annoys us
primarily because it crowds our inbox. These e-mails are categorized as:
a. flame b. spam c. hoax d. all of the above
______2. This is a program that reproduces its own code by attaching itself to other executable files in such
a way that it is activated when the infected executable file is executed.
a. virus b. worm c. both a and b d. none of the above
______3. “You have won 1 million. Click here to claim your price.” Would you proceed? This is
categorized as what type of computer abuse?
a. flame b. spam c. hoax d. worm
______4. Messages that disrespect others opinion over the Internet.
a. flame b. spam c. hoax d. all of the above
______5. The web administrator blocks important websites for use.
a. spamming b. hacking c. denial of service d. none of the above
E. The following are reasons why hackers hack. Explain each.
1. Theft of service
_____________________________________________________________________________________
2. Take valuable files
_____________________________________________________________________________________
3. Vengeance and hatred
_____________________________________________________________________________________
4. Thrill and excitement
_____________________________________________________________________________________
5. For the sake of knowledge and experimentation
_____________________________________________________________________________________
F. Are you in favor of the enactment and enforcement of laws that will regulate and control the use of
computer technology? Why and why not? Defend your answer.
G. If you were granted indefinite and unrestricted access to the Internet, would be interested to join a chat
group that holds no barrier as far as free expression and communication are concerned? Why? Why not?
Download