Recent orders

Module-4-Ethics

Ethics Module

Schedule:

After deadline.Ended 09/29/2013 11:59 PM EDT

Started:09/29/2013 1:28 AM EDT

Submitted:09/29/2013 5:34 PM EDT

Score:75%

Points:90 out of 120

Question 1

Points: 10 out of 10

Would the following be considered a violation of a user access agreement?

knowingly uploading or distributing files that contain viruses, spyware, or any other similar software or programs that may damage the operation of another’s computer

 yes

 no

 maybe

Feedback

Correct. Any action which deliberately damages another’s computer is both illegal and a violation of any user access agreement.

Question 2

Points: 10 out of 10

Would the following be considered a violation of a user access agreement? In order to perform assigned job duties, accepting operating system updates daily after logging in to the company network.

 Yes

 No

 Maybe

Feedback

Correct. Accepting system updates is part of keeping the company’s computer operating correctly and securely and is therefore NOT a violation of a user access agreement.

Question 3

Points: 0 out of 10

Would the following be considered a violation of user access agreement?

visiting social networking sites during lunch breaks

 yes

 no

 maybe

Feedback

Incorrect. It depends on whether this activity is expressly forbidden by the user access agreement.

Question 4

Points: 10 out of 10

What is the purpose of a user access agreement?

 to define all approved uses of the company’s IT resources

 to define every sanction to be applied if a violation occurs

 to outline in general the acceptable and unacceptable use of IT resources

 to outline all acceptable and unacceptable behavior of all company employees

Feedback

Correct. The user access agreement gives sufficient detail for acceptable and unacceptable uses of IT resources, but it cannot identify every possible situation.

Question 5

Points: 10 out of 10

For the following scenario, indicate whether the activity would likely be or not be a violation of an employee code of conduct: John uses the color printer in his office to print copies of a flier he has created to publicize his company’s employee picnic.

 likely a violation

 likely not a violation

Feedback

Correct. John is not using the color printer for his own personal fliers, but for ones to promote the company’s employee picnic.

Question 6

Points: 0 out of 10

An employee Code of Conduct will list illegal behaviors, but it will not list unethical behaviors.

 True

 False

Feedback

Incorrect. Both illegal and unethical behaviors can be and frequently are included in an employee Code of Conduct.

Question 7

Points: 10 out of 10

Which aspect of social networking poses the most risk?

 Disclosure of personal information

 Communicating with people who share common interests

 The ability to read others’ posts

 Installing software to enable social networking

Feedback

Correct. Failure to understand and monitor privacy settings in social networking settings poses a risk that too much personal information will be disclosed.

Question 8

Points: 10 out of 10

Which of the following factors determine whether a specific instance of file sharing is legal?

 Is the material being shared copyrighted?

 Is the sharing part of a business operation?

 Does the sharing result in monetary gain for the person doing the sharing?

 Is the site that is being used for the sharing primarily used for illegal sharing?

Feedback

Correct. This is the sole criterion: if the material is copyrighted, then sharing it is illegal.

Question 9

Points: 10 out of 10

The Digital Millennium Copyright Act…

 ensures that Internet service providers (ISPs) have no penalties or obligations resulting from illegal software being posted on their sites.

 allows copying or distribution of copies of copyrighted software.

 provides penalties for bypassing or providing tools to bypass protection mechanisms built into copyrighted software.

 addresses only copyrighted software issues.

Feedback

Correct. The protection mechanisms that prevent a CD or DVD from being copied cannot be removed without penalty, and it is illegal to sell tools to accomplish this removal.

Question 10

Points: 10 out of 10

Using company-owned equipment and software, you write a software program as part of your job requirements. This is an original creation of yours, so are you free to use it outside of work and even sell it to others?

 yes

 no

Feedback

Correct. Typically, work done under company employment directives usually becomes the intellectual property of the company. Personal rights to copyright are ceded to the company.

Question 11

Points: 10 out of 10

In the list below, which online social networking activity might be considered dangerous and possibly result in a negative outcome?

 Postings tips, project photos, and ideas on a hobby-related forum.

 Posting your resume on a job-seeking or job-posting site.

 Posting photos of oneself that might be considered risqué or offensive.

 Posting vacation photos after you have returned home.

Feedback

Correct. What you post may be read by a current or future employer, endangering your current or future employability.

Question 12

Points: 0 out of 10

Which of the following statements is true?

 Cyberbullies attack only minors.

 Cyberstalking is the cyberbullying of an adult.

 Cyberstalkers rarely request face-to-face meetings with their victims.

Feedback

Incorrect. This is the most dangerous outcome of cyberstalking or cyberharassment. The more vulnerable victims are minors.

Close

Module-3-Peripherals

Peripherals Module

Schedule:

After deadline.Ended 09/01/2013 11:59 PM EDT

Started:08/30/2013 10:27 PM EDT

Submitted:08/30/2013 11:40 PM EDT

Score:92%

Points:110 out of 120

Question 1

Points: 10 out of 10

In a situation where a handicapped person can only input data into the computer using a stylus or light pen, which keyboard configuration might be the solution?

 A keyboard with internal lighting to support work in low-light conditions.

 A keypad that is projected on an external flat surface.

 A flat waterproof keyboard.

 A split-style keyboard that separates and angles groups of keys into right- and left-hand portions.

Feedback

Correct. This seems to be the best solution since the user could use the stylus or light pen to tap on the displayed keys.

Question 2

Points: 10 out of 10

If you use your desktop computer only for doing schoolwork, which input and output device combination would be best from the options below (considering the best combination of cost, screen resolution, and keyboard design)?

 a gaming keyboard and a 27″ LCD monitor

 a foldable keyboard and a 15″ LCD monitor

 a wireless keyboard and a 24″ LED monitor

 a split-style keyboard and a 30″ LED monitor

Feedback

Correct. The wireless keyboard will work nicely in this situation; and the LED monitor is a very good size.

Question 3

Points: 10 out of 10

You need to back up (make copies of) your critical documents and pictures on your desktop. Which of the following statements would be true for using cloud storage for backups in case your computer experiences a complete failure (will not boot and all files have been lost from the internal hard drive)?

 If your desktop computer or your internal hard drive is not functioning, you can still access those backed up files via another computer with access to the internet.

 You would not need to carry external storage media with you when you use another computer.

 When data is distributed (stored on multiple external websites) there is greater risk of unauthorized physical access to the data.

 All of the above.

 None of the above.

Feedback

Correct. All three statements are true as applied to cloud storage.

Question 4

Points: 10 out of 10

Which device would not be appropriate for holding data, instructions, and information for future use?

 8Gb RAM

 1Tb external hard drive.

 CD or DVD

 Cloud storage

Feedback

Correct. RAM is volatile memory, and all data and instructions will be lost when the computer is turned off.

Question 5

Points: 10 out of 10

Which device would be used to hold data, instructions, and information for future use?

 flash drive

 cloud storage

 hard drive

 none of the above; these are volatile storage devices

 all of the above; these are nonvolatile storage devices

Feedback

Correct. Flash drives, cloud storage, and hard drives are all examples of nonvolatile storage devices.

Question 6

Points: 10 out of 10

Which of the following can be considered an output device?

 stylus

 speaker

 wireless mouse

 microphone

Feedback

Correct. The speaker is used to provide sound data to the user. It is an output device.

Question 7

Points: 10 out of 10

In this diagram of a simple home network, what appears to be missing?

 a server

 an adapter card

 a modem

 a router

Feedback

Correct. Even though this is a wired network, data needs to be sent from and received by the correct computer. The router handles this task.

Question 8

Points: 0 out of 10

In this diagram of a simple home network, what appears to be missing?

 a router

 a server

 an adapter card

 a modem

Feedback

Incorrect. Adapter cards are certainly needed, but they are internal components in each computer and, as such, would not be represented in a diagram of the network

Question 9

Points: 10 out of 10

If you are going to install a completely wireless network in your home, each computer must have:

 a router

 an Ethernet card

 a modem

 a wireless adapter card

Feedback

Correct. This internal component must be found in each computer that needs to connect to the router, and then to the Internet via the modem.

Question 10

Points: 10 out of 10

If you are going to network two computers together using cable connections, each computer must have:

 a modem

 an Ethernet interface card

 a router

 a wireless adapter card

Feedback

Correct. Ethernet interface cards are required to suppport the Ethernet cables which connect the two machine.

Question 11

Points: 10 out of 10

How is data entered into the computer?

 using the circuit board that interfaces with all external components attached to the CPU

 using an electronic device that controls the timing of all peripherals connected to the system unit

 using any type of hardware component that conveys information to one or more people

 using a hardware component that allows submission of data or instructions.

Feedback

Correct. A keyboard, a mouse, a stylus, and a microphone are examples of hardware components that allow the user to enter data or instructions into the computer.

Question 12

Points: 10 out of 10

A webcam would be considered an input device.

 True

 False

Feedback

Correct. A webcam takes an image as input. The webcam itself does not display the image (that is done by an output device such as a monitor).

Close

Moral Reform or Reforming the System in Egypt

Moral Reform or Reforming the System in Egypt

Name

Institution

Date

On The State of Egypt by Alaa Al Aswany

The author, Alaa, recalls the two incidences that happened to him during his university education in Cairo and in the U.S. when undertaking his master’s degree. He recognized the differences in the two education system by citing a lack of civilian protection in Egypt as the case in the United States where the students are protected by the institutional policies and regulation. Unlike in the U.S. where the system defines the expected code of conducts, Egypt lacks protection as the power is vested in authority and individuals sitting in those positions have the autonomy and authority to dictate their subjects (Alaa 181). As the author describes it “many people obtain things they do not deserve as a result of their personal connections or their ability to pay bribes, or because the security agencies or the ruling part have selected them.” (Alaa 182).

The above statement described the lack of democracy and moral standing in Egypt as the “the law in Egypt is usually applied only against the weak, who cannot escape it of obstruct it”. Given these statements by the author, I strongly support the need for institutional reforms in Egypt. Reforming the systems and institutions would be an important step toward the creation of a fair and just society for all Egyptians irrespective of one’s social, economic, and religious status. Besides, moral reform is also important as this would bring a change in the moral status of the Egyptian authorities. To make Egypt an equal nation, both moral and institutional reforms must be undertaken.

Reference

Alaa Al A. (2012). On The State of Egypt: A Novelist’s Provocative Reflection. Cairo: The American University of Cairo Press.