Recent orders
Module-4-Ethics
Ethics Module
Schedule:
After deadline.Ended 09/29/2013 11:59 PM EDT
Started:09/29/2013 1:28 AM EDT
Submitted:09/29/2013 5:34 PM EDT
Score:75%
Points:90 out of 120
Question 1
Points: 10 out of 10
Would the following be considered a violation of a user access agreement?
knowingly uploading or distributing files that contain viruses, spyware, or any other similar software or programs that may damage the operation of another’s computer
yes
no
maybe
Feedback
Correct. Any action which deliberately damages another’s computer is both illegal and a violation of any user access agreement.
Question 2
Points: 10 out of 10
Would the following be considered a violation of a user access agreement? In order to perform assigned job duties, accepting operating system updates daily after logging in to the company network.
Yes
No
Maybe
Feedback
Correct. Accepting system updates is part of keeping the company’s computer operating correctly and securely and is therefore NOT a violation of a user access agreement.
Question 3
Points: 0 out of 10
Would the following be considered a violation of user access agreement?
visiting social networking sites during lunch breaks
yes
no
maybe
Feedback
Incorrect. It depends on whether this activity is expressly forbidden by the user access agreement.
Question 4
Points: 10 out of 10
What is the purpose of a user access agreement?
to define all approved uses of the company’s IT resources
to define every sanction to be applied if a violation occurs
to outline in general the acceptable and unacceptable use of IT resources
to outline all acceptable and unacceptable behavior of all company employees
Feedback
Correct. The user access agreement gives sufficient detail for acceptable and unacceptable uses of IT resources, but it cannot identify every possible situation.
Question 5
Points: 10 out of 10
For the following scenario, indicate whether the activity would likely be or not be a violation of an employee code of conduct: John uses the color printer in his office to print copies of a flier he has created to publicize his company’s employee picnic.
likely a violation
likely not a violation
Feedback
Correct. John is not using the color printer for his own personal fliers, but for ones to promote the company’s employee picnic.
Question 6
Points: 0 out of 10
An employee Code of Conduct will list illegal behaviors, but it will not list unethical behaviors.
True
False
Feedback
Incorrect. Both illegal and unethical behaviors can be and frequently are included in an employee Code of Conduct.
Question 7
Points: 10 out of 10
Which aspect of social networking poses the most risk?
Disclosure of personal information
Communicating with people who share common interests
The ability to read others’ posts
Installing software to enable social networking
Feedback
Correct. Failure to understand and monitor privacy settings in social networking settings poses a risk that too much personal information will be disclosed.
Question 8
Points: 10 out of 10
Which of the following factors determine whether a specific instance of file sharing is legal?
Is the material being shared copyrighted?
Is the sharing part of a business operation?
Does the sharing result in monetary gain for the person doing the sharing?
Is the site that is being used for the sharing primarily used for illegal sharing?
Feedback
Correct. This is the sole criterion: if the material is copyrighted, then sharing it is illegal.
Question 9
Points: 10 out of 10
The Digital Millennium Copyright Act…
ensures that Internet service providers (ISPs) have no penalties or obligations resulting from illegal software being posted on their sites.
allows copying or distribution of copies of copyrighted software.
provides penalties for bypassing or providing tools to bypass protection mechanisms built into copyrighted software.
addresses only copyrighted software issues.
Feedback
Correct. The protection mechanisms that prevent a CD or DVD from being copied cannot be removed without penalty, and it is illegal to sell tools to accomplish this removal.
Question 10
Points: 10 out of 10
Using company-owned equipment and software, you write a software program as part of your job requirements. This is an original creation of yours, so are you free to use it outside of work and even sell it to others?
yes
no
Feedback
Correct. Typically, work done under company employment directives usually becomes the intellectual property of the company. Personal rights to copyright are ceded to the company.
Question 11
Points: 10 out of 10
In the list below, which online social networking activity might be considered dangerous and possibly result in a negative outcome?
Postings tips, project photos, and ideas on a hobby-related forum.
Posting your resume on a job-seeking or job-posting site.
Posting photos of oneself that might be considered risqué or offensive.
Posting vacation photos after you have returned home.
Feedback
Correct. What you post may be read by a current or future employer, endangering your current or future employability.
Question 12
Points: 0 out of 10
Which of the following statements is true?
Cyberbullies attack only minors.
Cyberstalking is the cyberbullying of an adult.
Cyberstalkers rarely request face-to-face meetings with their victims.
Feedback
Incorrect. This is the most dangerous outcome of cyberstalking or cyberharassment. The more vulnerable victims are minors.
Close
Module-3-Peripherals
Peripherals Module
Schedule:
After deadline.Ended 09/01/2013 11:59 PM EDT
Started:08/30/2013 10:27 PM EDT
Submitted:08/30/2013 11:40 PM EDT
Score:92%
Points:110 out of 120
Question 1
Points: 10 out of 10
In a situation where a handicapped person can only input data into the computer using a stylus or light pen, which keyboard configuration might be the solution?
A keyboard with internal lighting to support work in low-light conditions.
A keypad that is projected on an external flat surface.
A flat waterproof keyboard.
A split-style keyboard that separates and angles groups of keys into right- and left-hand portions.
Feedback
Correct. This seems to be the best solution since the user could use the stylus or light pen to tap on the displayed keys.
Question 2
Points: 10 out of 10
If you use your desktop computer only for doing schoolwork, which input and output device combination would be best from the options below (considering the best combination of cost, screen resolution, and keyboard design)?
a gaming keyboard and a 27″ LCD monitor
a foldable keyboard and a 15″ LCD monitor
a wireless keyboard and a 24″ LED monitor
a split-style keyboard and a 30″ LED monitor
Feedback
Correct. The wireless keyboard will work nicely in this situation; and the LED monitor is a very good size.
Question 3
Points: 10 out of 10
You need to back up (make copies of) your critical documents and pictures on your desktop. Which of the following statements would be true for using cloud storage for backups in case your computer experiences a complete failure (will not boot and all files have been lost from the internal hard drive)?
If your desktop computer or your internal hard drive is not functioning, you can still access those backed up files via another computer with access to the internet.
You would not need to carry external storage media with you when you use another computer.
When data is distributed (stored on multiple external websites) there is greater risk of unauthorized physical access to the data.
All of the above.
None of the above.
Feedback
Correct. All three statements are true as applied to cloud storage.
Question 4
Points: 10 out of 10
Which device would not be appropriate for holding data, instructions, and information for future use?
8Gb RAM
1Tb external hard drive.
CD or DVD
Cloud storage
Feedback
Correct. RAM is volatile memory, and all data and instructions will be lost when the computer is turned off.
Question 5
Points: 10 out of 10
Which device would be used to hold data, instructions, and information for future use?
flash drive
cloud storage
hard drive
none of the above; these are volatile storage devices
all of the above; these are nonvolatile storage devices
Feedback
Correct. Flash drives, cloud storage, and hard drives are all examples of nonvolatile storage devices.
Question 6
Points: 10 out of 10
Which of the following can be considered an output device?
stylus
speaker
wireless mouse
microphone
Feedback
Correct. The speaker is used to provide sound data to the user. It is an output device.
Question 7
Points: 10 out of 10
In this diagram of a simple home network, what appears to be missing?
a server
an adapter card
a modem
a router
Feedback
Correct. Even though this is a wired network, data needs to be sent from and received by the correct computer. The router handles this task.
Question 8
Points: 0 out of 10
In this diagram of a simple home network, what appears to be missing?
a router
a server
an adapter card
a modem
Feedback
Incorrect. Adapter cards are certainly needed, but they are internal components in each computer and, as such, would not be represented in a diagram of the network
Question 9
Points: 10 out of 10
If you are going to install a completely wireless network in your home, each computer must have:
a router
an Ethernet card
a modem
a wireless adapter card
Feedback
Correct. This internal component must be found in each computer that needs to connect to the router, and then to the Internet via the modem.
Question 10
Points: 10 out of 10
If you are going to network two computers together using cable connections, each computer must have:
a modem
an Ethernet interface card
a router
a wireless adapter card
Feedback
Correct. Ethernet interface cards are required to suppport the Ethernet cables which connect the two machine.
Question 11
Points: 10 out of 10
How is data entered into the computer?
using the circuit board that interfaces with all external components attached to the CPU
using an electronic device that controls the timing of all peripherals connected to the system unit
using any type of hardware component that conveys information to one or more people
using a hardware component that allows submission of data or instructions.
Feedback
Correct. A keyboard, a mouse, a stylus, and a microphone are examples of hardware components that allow the user to enter data or instructions into the computer.
Question 12
Points: 10 out of 10
A webcam would be considered an input device.
True
False
Feedback
Correct. A webcam takes an image as input. The webcam itself does not display the image (that is done by an output device such as a monitor).
Close
Moral Reform or Reforming the System in Egypt
Moral Reform or Reforming the System in Egypt
Name
Institution
Date
On The State of Egypt by Alaa Al Aswany
The author, Alaa, recalls the two incidences that happened to him during his university education in Cairo and in the U.S. when undertaking his master’s degree. He recognized the differences in the two education system by citing a lack of civilian protection in Egypt as the case in the United States where the students are protected by the institutional policies and regulation. Unlike in the U.S. where the system defines the expected code of conducts, Egypt lacks protection as the power is vested in authority and individuals sitting in those positions have the autonomy and authority to dictate their subjects (Alaa 181). As the author describes it “many people obtain things they do not deserve as a result of their personal connections or their ability to pay bribes, or because the security agencies or the ruling part have selected them.” (Alaa 182).
The above statement described the lack of democracy and moral standing in Egypt as the “the law in Egypt is usually applied only against the weak, who cannot escape it of obstruct it”. Given these statements by the author, I strongly support the need for institutional reforms in Egypt. Reforming the systems and institutions would be an important step toward the creation of a fair and just society for all Egyptians irrespective of one’s social, economic, and religious status. Besides, moral reform is also important as this would bring a change in the moral status of the Egyptian authorities. To make Egypt an equal nation, both moral and institutional reforms must be undertaken.
Reference
Alaa Al A. (2012). On The State of Egypt: A Novelist’s Provocative Reflection. Cairo: The American University of Cairo Press.
