CS 3604

Fall 1998 Final Examination

Part I: Multiple Choice

Record your answers on the op-scan form provided.

Each question in this part is worth two (2) points.

1. A book guarantee only refers to its ______ not its _______:

    1. Content, binding
    2. Binding, content (**)
    3. Quality of paper, contained information
    4. Contained information, quality of paper
    5. None of the above

2. Konrad Zuse was a German Civil Engineer who developed what is a definite candidate for one of the world’s first computers–the Z1 machine. Built in 1935-1937 it used _____ as its basic component of construction:

    1. Mechanical components from a calculating machine
    2. Telephone switching relays (**)
    3. Early diodes
    4. Magnetic thin-wire memory
    5. The switches from an Enigma

3. John Mauchly and J. Presper Eckert, who designed and built the ENIAC, were staff at:

    1. Pennsylvania State University
    2. University of Philadelphia
    3. University of Pennsylvania (**)
    4. Illinois University

4. The three stages of computer impact are:

    1. People Replacement, Productivity Improvement, Completion of New Tasks (**)
    2. People Replacement, Productivity Improvement, Introduction of AI
    3. Automation, Efficiency Improvement, People Replacement
    4. Automation, Product Improvement, New Products

5. The earliest graphic user interface (GUI) was built by the same person who invented the mouse–Ivan Sutherland:

    1. True
    2. False (**)

6. Steve Jobs and Steve Wozniak, the developers of the Apple computer, initially built up their capital by manufacturing and selling:

    1. keyboards
    2. calculators
    3. blue boxes (**)
    4. computers of parts supplied by Altair
    5. macintosh apples

7. Community values are:

    1. Agreed codes of ethics in a community
    2. Common practices
    3. Guidelines for conduct developed through district court precedents
    4. Ordinances developed by local authorities
    5. Unwritten rules that the community accepts (**)

8. If one acts such that one must act to achieve the greatest good for the greatest number so that individual rights are sacrificed for the sake of the majority, then one is acting in accordance with:

    1. Ethical relativism
    2. Utilitarianism goals (**)
    3. Deontological concepts

9. The "ACM Code" is a:

    1. Code of Ethics
    2. Code of Conduct (**)
    3. Code of Practice

10. The word "it’s" is used correctly in the following sentence:

Each group had to implement at least two of it’s own classes.

    1. True
    2. False (**)

11. You and one of your roommates, Joe Jones, meet your instructor, Sandra Birch, in Kroger. You want to introduce her to your roommate. The correct introduction is:

    1. Joe, I’d like you to meet one of my instructors, Ms. Birch.
    2. Ms. Birch, I’d like you to meet my roommate, Joe. (**)

12. There are a number of steps a computer science major can take to prepare for the job search or graduate school applications. They include:

    1. Getting to know professors
    2. Taking appropriate classes
    3. Researching companies/schools
    4. All of the above (**)

13. One of the wisest and kindest actions you can take after someone has done you a favor, written you a reference, or given you an interview is:

    1. send her a thank you card or letter. (**)
    2. thank her by e-mail.
    3. nothing, since it’s probably his job .
    4. thank him by phone.

14. Responsibilities and Liabilities are akin to:

    1. Morals and Obligations.
    2. Professional Ethics and Business Law. (**)
    3. Trust and Duty .
    4. Commitment and Function.

15. The right to privacy is peculiarly a US invention.

    1. No, it is a fundamental tenet of all democratic systems.
    2. No, it is a dogma of common law.
    3. No, it is a right defined by the United Nations. (**)
    4. Yes.

16. Social Security Number usage is limited by:

    1. Virginia Privacy Law
    2. 1974 Privacy Act (**)
    3. 1990 ADA
    4. US Department of Health, Education and Welfare


17. According to the 1990 Americans with Disabilities Act, a reasonable accommodation is any change or adjustment to a job or work environment that permits a qualified applicant or employee with a disability:

    1. to participate in the job application process
    2. to perform the essential functions of a job
    3. to enjoy benefits and privileges of employment equal to those enjoyed by non-disabled employees
    4. all of the above (**)
    5. all but one of the above

18. Mental and learning disabilities are not covered by the 1990 Americans with Disabilities Act.

    1. True
    2. False (**)

19. The US Copyright Law grants exclusive protection to a work of authorship for:

    1. for the life of author
    2. for the life of author plus 50 years (**)
    3. 25 years for anonymous works
    4. 70 years for works for hire
    5. all of the above

20. Software can be patented.

    1. False
    2. Only if it is totally original and does not include other patented software
    3. So long as it is an essential element of a larger system.
    4. Only when the software is an integral component of a hardware system. (**)

Part II: Essay Questions. Use the space provided for your answers. Put your name on the top of the sheet.

21. (20 points) Hackers have a code of ethics. Is this statement an oxymoron (def: oxymoron n : conjoining contradictory terms as in `deafening silence')? Justify your answer.

YES NO (Circle one)



22. (15 points) Propose three basic rules of Netiquette for the preparation of Web pages:








23. (25 points) (a) Define Cyberhate:





(b) In discussing Cyberhate in class we distinguished between attitude and action as a means of delimiting the outer boundaries of behavior. Now consider the narrower extremes of "acceptable" and "tolerated" behavior. Give two examples each of what you would consider acceptable and tolerated web page publications. Justify your answers.:



























Last updated 99/01/15
© J.A.N. Lee, 1998, 1999.