Final Exam CIS 3250 (2023/2024) with Complete Solutions
Final Exam CIS 3250 (2023/2024) with Complete Solutions Four noble truths Suffering exists- life consists of suffering and dissatisfaction Suffering arises from attachment to desires Suffering ceases when attachment to desire ceases Freedom from suffering is possible by practicing the Eightfold Path positive use of anonymous speech- Protect political speech , Protect against retaliation and embarrassment, Protect privacy, Protecting against , identity theft Protect against oppressive governments First Amendment Verbatim Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances. Amazon used kill switches to do what? Allow a remote entity to disable applications and delete files. To remove a book that violated copy right laws. Name a job that has changed drasitically from the introduction of the computer Bowling ball pinsetter this job has become completely obsolete Impact of cellphones on society Smartphones serve as electronic wallets and identification cards at store terminals or security checkpoints. Phones monitor security cameras at home or control home appliances from a distance How free services are paid for on the internet- In order for companies to earn ad revenue to fund multimillion-dollar services, many free sites collect information about our online activities and sell it to advertisers. Golden Rule Do un to others as those would have done un to you. Negative uses of social media- Stalkers and bullies stalk and bully.Jurors tweet about court cases during trials Socialbots simulate humans. Deontological We should follow rules of behavior that we can universally apply to everyone. logic or reason determines rules of ethical behavior Utilitarian A system of ethics according to which the rightness or wrongness of an action should be judged by its consequences. The goal of utilitarian ethics is to promote the greatest happiness for the greatest number. Natural rights that respects a set of fundamental rights of others, including the rights to life, liberty, and property Negative rights- Negative rights, or liberties, are rights to act without interference. The only obligationthey impose on others is not to prevent you from acting. the right to be free from assault, the right to use rty, the right to use your labor, skills, and mind to create goods and services and to trade with other people in voluntary exchanges. Positive rights- Claim rights, or positive rights, impose an obligation on some people to provide certain things for others. A positive right to a job means that someone must hire you regardless of whether they voluntarily choose to, or that it is right. Cookies Files a Web site stores on a visitor's c Cookies - Files a Web site stores on a visitor's computer. Which media has the most protection under the 1st amendment- print Threats from new technology- Digital technology and the Internet make copyright infringement easier and cheaper. New compression technologies make copying large files (e.g. graphics, video and audio files) feasible. Search engines make finding material easier. Peer-to-peer technology makes transferring and sharing files easier. Miniaturization of cameras and other equipment enable audience members to record and transmit events. Scanners allow us to change the media of a copyrighted work, converting printed text, photos, and artwork to electronic form. New tools allow us to modify graphics, video and audio files to make derivative works. California supreme court on seizure of cellphones case holding that police are not required to obtain a warrant to search information contained within a cell phone in a lawful arrest. Ohio supreme court decision on seizure of cellphones ruled that a warrant is needed to search the info contained within a cellphone in a lawful arrest. Olmstead V United States in 1928, the government had used wiretaps on telephone lines without a court order. The Supreme Court allowed the wiretaps. It interpreted the Fourth Amendment to apply only to physical intrusion and only to the search or seizure of material things, not conversations Miller V. California- is a landmark United States Supreme Court case in which the Court unanimously held that the warrantless search and seizure of digital contents of a cell phone during an arrest is unconstitutional. USA patriot Act eroded the 4th amendment Communications Decency Act of 1996 (CDA) -Attempted to avoid conflict with First Amendment by focusing on childrenMade it a crime to make available to anyone under 18 any obscene or indecent communication The CDA of 1996 result Found unconstitutional- The worst material threatening children was already illegal was too vague and broad. It did not use the least restrictive means of accomplishing the goal of protecting children. i.e reduced the internet only something that could be viewed by children. And watered down the content. Filtering software was found to be far less restrictive. Child Online Protection Act of 1998 (COPA)More limited than CDA. Federal crime for commercial Web sites to make available to minors material "harmful to minors" as judged by community standards. Found to be unconstitutional- It was too broad would restrict the entire country to the standards of the most conservative community. It would have a chilling effect. Would threaten, art news and health sites. CIPA 2000 requires schools and libraries that participate in certain federal programs to install filtering software. What is considered SPAM- unsolicited bulk email. text messages, tweets, and phone calls. California had a law banned sale of rental of video games to minors in 2011- The California Supreme Court ruled that "disgust is not a valid basis for restricting expression." What is not an impact that technology has had on Employment- technology doesn't create unemployment but rather it is created by rigid policies that are not adaptable. Benefits of Telecommuting- Reduces overhead for employers Reduces need for large offices Employees are more productive, satisfied, and loyal Reduces traffic congestion, pollution, gasoline use, and stress Reduces expenses for commuting and money spent on work clothes Allows work to continue after blizzards, hurricanes, etc. How are some employees monitored for the company they work for- Many major companies use software tools that provide reports on employee Web use. Employees spend time on nonwork activities on the Web Some companies block specific sites (e.g. adult content, sports sites, job search sites, social What is a white hat hacker- for the most part, use their skills to demonstrate system vulnerabilities and improve security. Stuxnet a sophisticated worm that targets a type of control system. Beginning in 2008, damaged equipment in a uranium enrichment plant in Iran. released in a joint operation with Israleis. Definition of Libel/slander - Libel is written defamation, Slander is speech defamation What are some isssues with Wikipedia- Volunteers, not carefully selected scholars, write and continually edit and update Wikipedia articles. Anyone who chooses to participate can do so. People worry that the lack of editorial control means no accountability, no standards of quality, no way for the ordinary person to judge the value of the information. Technology has improved the quality of life. Which is not true of that statement? Measuring quality of life is subjective, and some find other measures more important. A mean time between failure The point where 50% of computer components fail Common reasons for errors in databases- A large population (Many people have identical or similar names, and most of our interactions are with strangers.) Automated processing without human common sense or the power to recognizespecial cases Overconfidence in the accuracy of data stored on computers .Errors (some due to carelessness) in data entry . Failure to update information and correct errors . Lack of accountability for errors What is one method that systems like Banks and Flight control systems guard against hardware failure- Most likely rendundancy in software. Beta Testing- A selected set of customers use a complete, presumably well-tested system in their "real-world" environment. It can detect device limitations and bugs that designers, programmers, and testers missed. It can also uncover confusing aspects of user interfaces and problems that occur when interfacing with other systems You are using the lab computers at school for your work but at the same time you also use them to update a website where you sell poetry. Are you violating any agreement for use of school computers.? True You are a physician and reating a patient and find out the person is caring a deadly contagious disease. The patient asks you to not say anything but you report it to the CDA. Did you violate the Hippocratic oath False The school has software liscenses for computer program that can be installed in 100 machines . you find out they are installed in over 1000.What should you do? First step is inform your supervisor, Dean or department chair. If they do not respond you might take it higher. You suspect that a fellow student in a class that you are taking is cheating on homework but you have no proof. Should you turn them in? False You know a fellow student has copied your term paper and used I as their own submission in a class your both in . The tudent copid it with out your knowledge. Should you turn the student in? true 3 parts of any speech- opener, Body, Conclusion Name a job that has changed drasitically from the introduction of the computer
Written for
- Institution
- CIS 3250
- Course
- CIS 3250
Document information
- Uploaded on
- October 9, 2023
- Number of pages
- 11
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
final exam cis with complete solu
Also available in package deal