Explain two ethical concerns related to telework
Less secure sensitive information.
Teleworkers are isolated.
Explain how you could ethically justify DDOS attack.
In a scenario where you are launching a DDOS attack against a site with illegal/immoral content
You are a software engineer at April’s House of Software. Your manager, Bingo, tells you that the software project you are developing needs to be released tomorrow, but you have not finished testing. Use the utilitarianism ethical framework to argue how you should respond to Bingo’s demand and why.
Utilitarianism focuses on the greatest amount of benefit produced by an action. Since the software is untested, it is extremely likely that it could contain many errors that could harm the company or the user. Therefore, according to utilitarianism, the software should not be released.
What are the implications of the Stored Communications Act (SCA) for all those how let an internet service provider handle their email? (look at the solutions sheet of the different legislature you all presented in class)
The SCA prohibits providers from sharing electronic communications with any person or entity. However, it includes exceptions which could put the user at risk of privacy leak.
Discuss how the field of software engineering tris to ensure software quality.
We try to ensure quality with testing and peer review.
Verification of simulations is the process of ___.
determining if the
computer program correctly implements the model
Validation of simulations is the process of ___.
determining if the model is
an accurate representation of the real system
The four steps to develop a software product are:
What was the name of the unit containing software & hardware issues that caused the death of six patients by giving massive overdoses of radiation?
Therac-25
Computer simulation definition:
The use of a computer program as a model to represent a real system.
Harms of Privacy:
Benefits of Privacy:
What justifies whistleblowing?
When you have discovered harmful information and attempts to report the
concerns through authorized organizational channels has been ignored or rebuffed.
Which of the following have been the cause to make computerized systems unreliable in the past?
Programming errors, faulty hardware….etc
Which of the following are good reasons to use a simulation for testing a computerized system?
Too large-scale, too
expensive, or too risky to
work with the real system
itself