Final Exam Flashcards
Explain two ethical concerns related to telework
Less secure sensitive information.
Teleworkers are isolated.
Explain how you could ethically justify DDOS attack.
In a scenario where you are launching a DDOS attack against a site with illegal/immoral content
You are a software engineer at April’s House of Software. Your manager, Bingo, tells you that the software project you are developing needs to be released tomorrow, but you have not finished testing. Use the utilitarianism ethical framework to argue how you should respond to Bingo’s demand and why.
Utilitarianism focuses on the greatest amount of benefit produced by an action. Since the software is untested, it is extremely likely that it could contain many errors that could harm the company or the user. Therefore, according to utilitarianism, the software should not be released.
What are the implications of the Stored Communications Act (SCA) for all those how let an internet service provider handle their email? (look at the solutions sheet of the different legislature you all presented in class)
The SCA prohibits providers from sharing electronic communications with any person or entity. However, it includes exceptions which could put the user at risk of privacy leak.
Discuss how the field of software engineering tris to ensure software quality.
We try to ensure quality with testing and peer review.
Verification of simulations is the process of ___.
determining if the
computer program correctly implements the model
Validation of simulations is the process of ___.
determining if the model is
an accurate representation of the real system
The four steps to develop a software product are:
- Specification: defining the functions to be
performed by the software - Development: producing the software
that meets the specifications - Validation: testing the software
- Evolution: modifying the software to meet
the changing needs of the customer.
What was the name of the unit containing software & hardware issues that caused the death of six patients by giving massive overdoses of radiation?
Therac-25
Computer simulation definition:
The use of a computer program as a model to represent a real system.
Harms of Privacy:
- Illegal/Immoral activities
- Dysfunctional families – harm of family members
- For outcasts, an abundance of privacy may be a curse, not a blessing
Benefits of Privacy:
- necessary for a person to become and develop as an individual
- Focus, creativity, spiritual growth
- Some people feel that closeness in relationships are tied to privacy (how much you share).
What justifies whistleblowing?
When you have discovered harmful information and attempts to report the
concerns through authorized organizational channels has been ignored or rebuffed.
Which of the following have been the cause to make computerized systems unreliable in the past?
Programming errors, faulty hardware….etc
Which of the following are good reasons to use a simulation for testing a computerized system?
Too large-scale, too
expensive, or too risky to
work with the real system
itself