FINAL EXAMINATION SPRING 1994

PART I: Multiple Choice.

Enter your answers on the mark sense form provided. Each question is worth 2 points.

The following list of events or concepts are associated with specific pioneers (or pioneer company) of the computer. Match each event with a pioneer in the second list and enter your choice onto the mark sense form so the event is associated with the question number and the pioneer name with the answer.

  1. The Analytical Engine
  2. Responsible for documenting the stored program concept
  3. EDSAC
  4. ENIAC
  5. LEO
  6. Microsoft
  7. Sketchpad - the first interactive graphical system
  8. Integrated Circuits
  9. The Z-1, Z-2, Z-3, and Z-4 machines
  10. The mouse

    1. Jack Kilby and Robert Noyce
    2. Lyons Tea Company
    3. Maurice Wilkes
    4. Charles Babbage
    5. Eckert & Mauchley
    6. Ivan Sutherland
    7. Doug Engelbart
    8. Bill Gates
    9. John von Neumann
    10. Konrad Zuse

    Question

  11. IBM originated from the following company:

    1. Tabulating Machine Co.
    2. Computing-Tabulating-Recording Co.
    3. Sperry Corporation

    Question

  12. John Atanasoff was visited by the following scientist to view his computer:

    1. Alan Turing
    2. John Mauchly
    3. Clifford Berry

    Question

  13. Shoulder surfing is a simple technique used to determine:

    1. passwords that are in encrypted form in a file
    2. a user's password from reading keystrokes
    3. the activities that a user engages in during a session

    Question

  14. Viruses have the following at least the two fundamental properties:

    1. replicate themselves and perpetrate "mischief" such as a bomb or worm
    2. replicate and then erase themselves
    3. perform an action and erase themselves
    4. hide themselves in other programs and replicate themselves

    Question

  15. The following are basic copyright rules:
    1. protects original works of authorship against unauthorized copying and potential loss of sales
    2. is applicable to literary and dramatic works, as well as computer programs and databases
    3. is owned by the individual who originates the work
    4. includes the rule of fair use
    5. 1 and 2
    6. 1, 2, 3 and 4

    Question

  16. Of the following list, the three fundamental stages of technology insertion are:

    a. Replacement
    b. Improvement
    c. Productivity increase
    d. Enhancement
    e. Automation
    f. industrialization

    1. a,b,c
    2. b,c,d
    3. c,d,e
    4. d,e,f
    5. a,c,e
    6. b,d,f
    7. a,b,d
    8. a,b,e
    9. a,b,f
    10. b,c,e

    Question

  17. Say that no-one knew how to write a sorting program, then if I wish to give the best protection to my ideas regarding a particular way of sorting numerical values:

    1. I should write a paper about it, and copyright it -- after all the protection will last for my lifetime plus 50 years.
    2. Build a mechanical sorter, and patent it -- giving protection for 17 years.
    3. Form a company, swear all my employees to secrecy, and make it a trade secret which would last as long as my secret lasted.
    4. Give it a peculiar name, and then trademark that name.

    PART II: Essay

    . Answer each question below in the space provided. Each question is worth 25 points.

    Question

  18. Community standards exist, but are rarely written down, regarding speech patterns and vocabulary, driving attitudes and customs, and the definition of pornography. These standards differ frequently between urban and rural environments in much the same manner as political preferences differ. Thus while the law may (or may not) explicitly specify set limits on certain citizens' activities, the local standards and the local environment may further limit or extend acceptable practices.

    Describe a local (urban or rural) convention within your experience which differs from legal requirements, and then discuss how such local variances have an impact on the establishment of practices and protocols for the use of computers, where few laws have yet been established.

    Question

  19. The Commonwealth of Virginia has established a regulation regarding the use of state computer systems which limits their use to "state business". This term is defined for each user by their "job description", and probably extended by the employee's needs to fulfill their assigned tasks. However, state machines are also provided in classroom and laboratory situations for educational purposes.

    The departmental machines in McBryde 116 have unlimited access to Internet but have been restricted from access to certain news groups. Give pro and con arguments for this restriction:

    Question

  20. The "Ten Commandments of Computer Ethics" which were handed out in class at the beginning of the semester were developed by a group which had some strong connections with a religious order, and thus have a basis in the "Ten Commandments" of the Jewish and Christian faiths. If you were (or are) of some other denomination (or agnostic), would you be offended by this "take-off" on the "Ten Commandments"? Would you be concerned that this was mixing religion and professional behavior in an inappropriate manner? Explain your arguments and suggest alternative strategies for presenting ethical guidelines.
    Last updated 95/09/12