Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

a ) Discuss how each of the following concepts contributes to harmonious living in any work place: i . Ethical decision making Privacy and Confidentiality

a) Discuss how each of the following concepts contributes to harmonious living in any work place:
i. Ethical decision making
Privacy and Confidentiality iii. Trending technologies iv. Control of personal information
v. Whistle blowing
b) With a relevant example, Differentiate between the following concepts (02 marks@) as used in computing.
i. A trade name and business name.
ii. The right of reproduction and the right of ownership. iii. Ethical issues and legal issues iv. A profession and Professionalism
v. Hacking and Cracking
d) Explain what organizations can do to deal with the increasing number of computing-related insecurity happenings around the world. (5 marks)
SECTION B
Question 2
An (absent minded) work colleague goes on holiday without sharing an important group report which needs to be submitted next week. The latest version is stored on the colleague's personal Cloud box account. Cloud box is a cloud based storage system which uses passwords to control access. Since Cloud box is beyond the reach of your IT department, you suspect that there is nothing you can do. However, another colleague knows that the absent colleague always uses their children's birthdays as passwords and all the children have Friend Face accounts. It seems likely that you should be able to get the group report after all as long as the children haven't restricted access to their Friend Face pages.
Required:
With reference to any relevant code of conduct, comment on whether or not there are any legal or ethical issues involved in using Friend Face to find the children's birthdays in order to guess the right password. (20 marks)
Question 3
A small firm hires a recent graduate to develop a novel algorithm for intelligently selecting adverts for an e-commerce site. Part of the work is designing the website so that the generated adverts are positioned in an eye catching manner. As part of his contract, he is required not to write similar software for any competitor for the next 12 months. The developer leaves the company after two years and is employed
2
to work for a rival company and releases their own version of the e-adverts with almost the sa algorithms and functionalities. The original firm wishes to sue both the programmer and the r company. Required;
a) With reference to IEEE code of conduct of your choice, what options does the firm have? marks)
b) What should you do according to consequentialism theory of ethics? As part of your answ provide a short description of consequentialism. (JO marks)
Question 4
A post graduate student notices that the Examinations manager keeps a copy of the password for t 2022/2023 academic year exam database on his computer and shares the password with him. The stude realizes that looking at question papers with their typical answers would really help him in revision a so decide to log in as the Exams manager and take a look. Required:
Comment on whether such behavior would trespass the ethical behavior expected of such examinations manger. In addition mention whether you or any other involved party might be liable either legal or University sanction and justify your answer. (20 marks)
\Question 5
a) Define Intellectual Property. (02-marks)
b) Explain briefly about following terms:
i. Patents ii. copyrights (2 marks@)
iii. Trade marks.
b) Explain briefly the acquisition process of trade mark. (04 marks)
c) Explain with The project managers are ultimately responsible for project success (02 Marks)
a) What is the role of the human resource manager on the project team? (13 marks)
b) Explain the process of resource allocation and management
c) Give the Importance of resource management in project planning and execution(05marks)
d) Discuss the different types of project resources and explain how they can be acquired for an IT project (5 Marks)
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Introduction To Data Mining

Authors: Pang Ning Tan, Michael Steinbach, Vipin Kumar

1st Edition

321321367, 978-0321321367

More Books

Students also viewed these Databases questions

Question

What are the advantages of Web-based fill-in forms?

Answered: 1 week ago

Question

Describe five organizational development techniques.

Answered: 1 week ago

Question

Explain the two dimensions of an organizations culture.

Answered: 1 week ago

Question

State why people resist change and how to overcome resistance.

Answered: 1 week ago