, iD DAli& REDEEMER'S UNIVERSITY, EDE COLLEGE OF NATURAL SCIENCES DEPARTMENT OF COMPUTER SCIENCE SECOND SEMESTER EXAMINATIONS 2017/2018 SESSION Course Code: CMP 106 Course Title: Professional Ethics and Legal Issues in Information Technology Unit: 2 Units Instruction: Answer any three questions Time: 2 Hours Question 1 a. Define the term "Information Technology (IT)" b. Give a highlight of the four distinct phases of IT development c. State three major roles that information technology play in a modern society d. Describe any two ways through which computer security can be increased e. What is a Professional Body? f. State the full meaning of the following acronyms representing some IT related professional bodies and associations in Nigeria (i). ISPON (ii). NCS (iii). NIREG (iv). ITAN (v). ISPAN (vi). NACOSS Question 2 a. State any three things that CMP 106 course was designed to achieve in you b. State any five duties of the CPN c. Name any four considerable body of law that can apply to computer Professionals in most countries d. Write short notes on Computer Misuse Law e. Explain Stakeholder analysis as related to ethical decision making f. Who is a Cybersquatter? Question 3 a. What is Corporate Social Responsibility? b. Enumerate any three reasons for pursuing CSR goals and promoting a work environment in which employees are encouraged to act ethically when making business decisions c. Discuss the following current and important privacy issues: i. Right to privacy ii. Electronic discovery (e-discovery) iii. Electronically stored information (ESI) d. State four things that information managers should do to prevent data breaches e. Name any five of the offences stated in the Nigerian Cybercrimes' Act 2015 Question 4 a. Define the term "Ethics" b. The Ethics Resource Center (ERC) has defined a set of characteristics of a successful ethics program, what are these characteristics? c. Philosophers have developed many approaches to aid in ethical decision making, explain any two of the most common approaches d. Give any three examples of challenges facing Information technology ethics e. What is a Trademark? f. Differentiate between the terms "Competitive Intelligence" and "Industrial Espionage" Question 5 a. What do you understand by the term 'Computer Forensics'? b. Give any three reasons why computer incidents are so prevalent in this age c. Differentiate between the following: i. A Trojan Horse and a Logic Bomb ii. Hackers and Lamers iii. Malicious Insiders and Industrial Spies d. What is Intellectual Property? e. Differentiate between Copyright Infringements and Patent Infringements f. Define the term "Plagiarism" 2 Page 1 Page 2