id LT Q_ aro (Q(7/,, REDEEMER'S UNIVERSITY, EDE COLLEGE OF NATURAL SCIENCES DEPARTMENT OF COMPUTER SCIENCE SECOND SEMESTER EXAMINATIONS 2017/2018 SESSION (STREAM B) Course Code: CMP 106 Course Title: Professional Ethics and Legal Issues in Information Technology Unit: 2 Units Instruction: Answer any three questions Time: 2 Hours Question 1 a. Define the term "Ethics" b. Write short notes on a good code of practice c. Differentiate between the terms: Morals and Laws d. Give any two examples of challenges facing Information technology ethics e. Distinguish between Electronic discovery (e-discovery) and Electronically Stored Information (ESI) f. Differentiate between the following Information Technology challenges and attackers i. Phishing and Spear-Phishing ii. Malicious Insiders and Industrial Spies iii. Competitive Intelligence and Industrial Espionage Question 2 a. Give any two reasons why computer incidents are now prevalent b. What is a Security Policy? c. Name any six of the offences stated in the Nigerian Cybercrimes' Act 2015 d. Enumerate any six Ministries, Agencies or Departments that forms the membership of the Nigerian Cybercrime Advisory Council e. Who is a Cybersquatter? f. What are Trade Secrets? g. State the advantages of trade secrets over patents and copyrights Question 3 a. State any two things that CMP 106 course was designed to achieve in students b. Give four examples of IT related professional bodies in Nigeria (stating their full names and acronyms) c. State any four duties of the CPN. d. In Ethical Decision Making, explain any two of the six useful tests that could be applied if presented with some kind of dilemma. e. Enumerate any four considerable body of law that can apply to computer professionals in most countries f. Write the full meaning of the following acronyms: NITDA, NITPA, ACM, IEEE, NACOSS, ITAN Question 4 a. What is Intellectual Property? b. Differentiate between Copyright Laws, Patent Laws and Trade Secret Laws c. In contract law, state any three contractual duties that you cannot avoid as a computer professional d. What is Corporate Social Responsibility (CSR)? e. Give any four reasons for pursuing CSR goals and promoting a work environment in which employees are encouraged to act ethically when making business decisions f. Define the following terms: i. Plagiarism ii. Reverse Engineering iii. Open Source Code iv. Trademark Question 5 a. Write short notes on Computer Misuse Law b. Explain Stakeholder analysis as related to ethical decision making c. What is Information Privacy? d. As the information manager of your organization, state any five things you must do to prevent data breaches e. Differentiate between the following: "Copyright infringements", "Patent infringements" and "Trademark infringements" f. Write short notes on the term: "Computer Forensics" g. State any three considerations for engaging external forensic organizations 2 Page 1 Page 2