Midterm Exam Revision COMPUTER AND COMMUNITY

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Midterm Exam Revision

1. There are many ethical theories used to analyze many situations. List FIVE ethical

theories covered in class.

2. Privacy threats come in several categories. List 5 threats to privacy.

3. Explain what is open-source software?

4. List the four factors considered in the fair use doctrine.

5. Explain what informed consent is and give an example.

6. The GNU project developed the concept of copyleft for free software. What is copyleft?

7. To protect consumers from identity theft, many businesses and organizations use

encryption, authentication, credit card activation, and biometrics. Explain what

biometric security is and give an example.

8. What type of in-formed consent does each represent, Opt-in or Opt-out?

9. Explain the following concepts and which one of them can be used to identify

individuals.

a. Data mining

b. Wiretapping

c. Encryption

d. Re-Identification

10. Define the concept of ethics in your own opinion?

You might also like