Professional Skills & Issues (H)
1. In UK law, which of the following is usually
not
an offence under the Computer Misuse Act 1990 (CMA)?
stealing commercially sensitive data
intentionally spreading a virus or worm
accessing pornography on work-place devices.
stealing sensitive personal data (e.g., for publication or blackmail)
2. In UK law, what is personal data?
data that any individual considers personal.
data that is unique to an individual, e.g. genetic information.
data that relates to a living person who can be identified.
data that relates to any person, dead or alive.
3. The contract for the development of a bespoke software system should define who will own the copyright in the software system. For which part of the system code could copyright reasonably be assigned to the customer?
all of the above.
library code
newly developed code
open-source code
4. Data protection laws were introduced to address concerns about the ways in which personal data might be misused. Which of the following was
not
such a concern?
Unauthorised persons might access the data.
The data might be used for unacceptable purposes.
The data might be used for purposes for which it was not intended.
The data might be stored in several different locations.
5. The principle known as "obligation of confidence" makes which of the following unlawful?
A software contractor exploits knowledge gained while working with a client, in the absence of a specific non-disclosure clause in the contract.
A software engineer moves from one employer to another, then exploits a technique developed by the first employer.
A software engineer working for a bank discovers a security weakness in the bank’s customer management system, but the bank refuses to address the problem, so the engineer discloses the problem to a professional body.
A software engineer moves from one employer to another, then exploits a technique learned from a book while working for the first employer.
6. A UK citizen has identified potentially unlawful content on the Internet, but is unsure that it is definitely unlawful. Which of the following actions would be the best first step?
consult a legal professional.
report the content to the Internet service provider (ISP).
report the content to the Internet Watch Foundation (IWF).
report the content to the local police office.
7. The (UK) Data Protection Act 1984 was primarily focused on addressing the concerns of data misuse by what entities?
private members’ clubs.
large organisations.
individuals.
small independent traders.
8. Nearly every country has laws restricting pornography, but what is legal varies enormously. Suppose that a pornographer based in country X has a website whose content is lawful in country X, but the website is frequently accessed by people in country Y where its content is unlawful. Which one of the following statements is
true
?
The pornographer could be extradited from country X and then prosecuted in country Y.
The pornographer is completely immune from prosecution.
The pornographer could be arrested and prosecuted if he visits country Y.
The pornographer could be prosecuted in country X for violating another country’s laws.
9. The (UK) Draft Investigatory Powers Bill would require communications service providers to:
keep communications data for a limited time
delete communications with unlawful content.
keep communications data indefinitely
inform the police immediately of any suspicious communications
10. In EU law, when is unsolicited email considered lawful?
when prior consent has been sought.
when the email address of the sender is not visible.
when the email address of the receiver is not visible.
when prior consent has been obtained.
11. The (UK) Computer Misuse Act 1990 was enacted to combat misuse. Which of the following is not a criminal offence under the act?
unauthorised modification of the contents of any computer.
intent to commit a serious offence with a computer.
unauthorised access to any program/data held in any computer.
building or selling hackers’ toolkits.
12. In UK law, what amendment did the Police and Justice Act 2006 (PJA)
not
introduce to the Computer Misuse Act 1990 (CMA)?
intent to impair operation of any computer.
denial-of-service attacks.
building or selling hackers’ toolkits.
using Facebook and Twitter to share abusive statements.
13. In terms of bespoke software development, what responsibility does a customer have in a contract-hire contract?
private healthcare for all supplied staff.
management of supplied staff.
ensuring the correct competences of supplied staff.
any associated legal cost of supplied staff.
14. Some unsolicited e-mail is intended to defraud you. In which one of the following cases would you be reasonably confident that an e-mail message is
genuine
?
The message appears to come from a bank, and invites you to confirm your account details.
The message appears to come from the same e-commerce site, and invites you to claim a free voucher by simply clicking on a link.
The message appears to come from an e-commerce site for which you have registered, and invites you to claim a free voucher by signing in to the site in the normal way.
The message comes from a sender unknown to you, and invites you to open an attached Word document.
15. In UK law, under what circumstances may personal data be transferred to a country or territory outside the European Economic Area (EEA)?
it may be permitted, if the country or territory have a specific trade agreement with the EU.
it is not permitted under any circumstances.
it may be permitted, if the country or territory ensure adequate levels of protection for the rights and freedoms of data subjects.
it may be permitted, if the consent of the data subject is obtained prior to transfer of data.
16. The (UK) Computer Misuse Act and Police & Justice Act have proved to be less effective than expected. Which one of the following is
not
a reason for this problem?
Judges have tended to impose light sentences.
Juries are reluctant to convict because they do not regard computer misuse as a real crime.
Companies are reluctant to report computer security breaches for fear of damaging publicity.
The police lack the expertise and resources to investigate computer misuse properly.
17. What is a fixed-price software contract?
all costs agreed prior to commencement of software development, no additional charges may be applied.
costs agreed prior to commencement of software development, penalty costs permitted in specific situations.
all costs agreed prior to commencement of software development, but all intellectual rights reside with the developer.
costs are fixed for specific time-period of software development, beyond agreed time period costs can be renegotiated.
18. In terms of intellectual property rights, what is the ‘obligation of confidence’ principle?
the right to copy documents, images, audio/video recordings, programs.
that employees are expected to report potentially unlawful activity with management, prior to reporting it to the media.
protection for confidential information received but not intended to be passed on to others.
the expectation that consumers should have with regards to their personal data.
19. In UK law, under what circumstances may whistle blowers
not
be protected under the Public Interest Disclosure Act 1998 (PIDA)?
when they expose failure of employer to comply with legal obligations.
when they expose environmental damage caused by employer.
when they approach the media, prior to the employer.
when they expose dangers to health and safety caused by employer.
20. Software patenting is a difficult issue. Which of the following is
not
a reason for this difficulty?
It is always impossible to get a patent for software.
Small software companies could not afford to defend any patents that they own.
Most software lacks genuine novelty.
Patent practice does not always follow the law.
21. The (UK) Sale of Goods Act 1979 requires that goods sold must be fit for purpose. Under which of the following scenarios could a customer demand a refund, under the act?
customer purchases software designed for a specific platform (e.g. Microsoft Windows), but is unable to use it as they own a different platform (e.g. Mac OS).
customer discovers the software does not function as purported on the retail box.
customer purchases software, but discovers a more up-to-date version is available for purchase.
customer discovers within 3 days of purchase they can purchase the same software from an Internet-based vendor for significantly less.
22. The (UK) Data Protection Act 1998 defines various terms. Which of the following accurately describes the role of the data controller?
the person who processes personal data within an organisation.
the person that the data refers to.
the person who determines how or why personal data is processed.
the person who has access to personal data within an organisation.
23. What is a professional body?
an organisation that requires specialist qualifications to be a member.
an organisation that has complete control over the training and education of all individuals employed in a specific area.
an organisation that promotes high standards in a particular profession.
an organisation that controls the minimum payment and entitlements for professionals in a specific area.
24. In UK law, under what circumstances may it be permitted for employees to override an obligation of confidence?
expose failure to comply with legal obligations in the public interest.
expose lawful business practices in the public interest.
expose excessive earnings in the public interest.
expose private conversations with customers in the public interest.
25. The (UK) Regulation of Investigatory Powers Act 2000 grants certain agencies the right to seek a warrant to monitor telephone communications to or from a named person or organisation suspected of certain offences. Which one of the following agencies is
not
granted such a right?
the police force, investigating suspected drug dealers
HM Revenue & Customs (the agency responsible for tax collection), investigating suspected tax evasion.
a private detective agency, investigating suspected marital infidelity
the intelligence services, investigating suspected terrorists
26. What is the primary purpose of the Internet Watch Foundation (IWF)?
minimise the availability of potentially unlawful content on the Internet.
defends UK corporations from legal action regarding Internet content.
dictates UK government policy on inoffensive Internet content.
offers legal advice to parents in the UK seeking damages against Internet service providers.
27. The Internet transcends national boundaries and jurisdictions. The Council of Europe (CoE) have approved a convention on cybercrime. Which of the following is not covered by the convention?
child pornography.
smartphone ownership, e.g. prisoners are not permitted to own one.
computer-related fraud.
criminal copyright infringement.
28. In European law, unsolicited e-mail is considered unlawful in which of the following scenarios?
the sender does not share the email address of the recipient with government organisations.
the sender has made it clear where they obtained the email address of the recipient.
the sender has concealed their email address.
the sender has attached images to the email.
29. Gary McKinnon (a UK citizen) openly admitted unauthorised access to US Department of Defense computers, but he was never brought to trial. Which one of the following statements is
false
?
He was attempting to find information on UFOs suppressed by the US government.
He suffered from Asperger’s Syndrome.
A UK citizen suspected of unauthorised access to a computer in another country cannot be tried either in the UK or in the other country.
He claimed no malicious intent.
30. In the UK, computer fraud is covered by existing anti-fraud laws. Which of the following statements is
false
?
A computer fraud trial requires specialist witnesses.
E-commerce increases opportunities for fraud.
Computer fraud is easier to detect than older forms of fraud.
ATMs increase opportunities for fraud.
31. An application program downloaded from the Internet has no packaging on which its trade mark could be displayed. Which is the best way to get round this problem?
The application displays its trademark briefly when it is launched.
The application’s desktop icon is its trade mark.
The supplier’s download page displays the trade mark.
The application displays its trademark continuously when it is running.
32. Controlling children’s access to internet pornography is difficult for a number of reasons. Which of the following is
false
?
Pornography website owners cannot be trusted to block access by children.
Children can easily impersonate adults on the Internet.
ISPs are unwilling to filter access to pornography websites.
Pornography laws vary enormously from one country to another.
33. The (UK) Freedom of Information Act 2000 gives every citizen the right to request information from certain organisations. Which of the following is covered by the act?
expenses paid to a university’s senior management.
environmental policies for any oil companies operating in the United Kingdom.
the financial details of any scholarships provided by private businesses for children to attend private schools.
financial holdings for financial institutions, headquartered in the United Kingdom with more than 5,000 employees.
34. The (US) Computer Fraud and Abuse Act 1986 was enacted to combat misuse. What are the limits of penalties for first offences?
1 year in prison.
20 years in prison.
10 years in prison.
5 years in prison.
35. The (UK) Data Protection Act 1998 requires that personal data should be kept no longer than necessary. Which of the following is
false
?
A police station may retain your phone number after you have called to make a complaint.
A university may retain information on students who have graduated.
An on-line business may retain your e-mail address after it has dispatched your order to you.
A restaurant may retain the phone number you used to book a table, after you have left the restaurant.
36. UK law defines various kinds of computer misuse offences. Which of the following is
not
such an offence?
a denial-of-service attack
development of software tools to facilitate unauthorised access to computers.
intentionally spreading a virus
using your work-place computer to play games
37. The (UK) Data Protection Act 1998 defined various personal data as sensitive. Which of the following is not considered sensitive data?
physical health.
gender.
sexual orientation.
mental health.
38. In the development of a bespoke software system, what is the best way for the contractor to deal with the possibility that the client might request changes in the requirements during the term of the software contract?
Refuse to accept any requirement changes.
Abandon the project.
Negotiate a new contract.
Ensure that the initial contract formalises the conditions for accepting requirement changes.
39. In the (UK) Data Protection Act 1998, which one of the following is
not
classified as sensitive personal data?
the data subject’s religious beliefs
the data subject’s race
the data subject’s conviction for a criminal offence.
a reference letter sent in connection with the data subject’s application for a job
40. There are some differences between European and US laws on unsolicited e-mail (spam). Which of the following is
true
?
Both European and US law require prior consent from individual recipients.
Both European and US law require every unsolicited e-mail to contain a valid address enabling the recipient to request the mailing to cease.
Both European and US law apply to e-mails from senders in any country.
Both European and US law require every unsolicited e-mail to contain the sender’s true name.
41. In the UK, if a person deliberately obtains unauthorised access to personal data stored on a computer, but makes no use of that data:
he/she can be prosecuted under the Computer Misuse Act
he/she can be prosecuted under the Data Protection Act
he/she can be prosecuted under the Freedom of Information Act
he/she cannot be prosecuted.
42. Suppose that a university hosts its students’ personal web pages. A student posts a defamatory article on his web page, and the defamed person complains to the university. What if anything should the university do to comply with the law??
take no action
close the student’s web page permanently.
ask the student to remove the article
require the student to remove the article
43. Which of the following is
not
an offence under the (UK) Computer Misuse Act 1990?
unauthorised modification of a computer’s hardware
unauthorised access to the data stored in a computer, motivated by searching for sensitive data
unauthorised access to the data stored in a computer, motivated by simple curiosity
unauthorised changes to the data stored in a computer.
44. What is considered cyber-squatting?
maliciously redirecting individuals to another domain name.
duplicating a website and hosting under another domain name.
registering a trademark as your domain name and refusing to sell it to another individual at any price.
registering a trade mark as your own domain name and selling it to the trade mark owner at an inflated price.
45. When should a contract for bespoke software development specify surcharges for the customer?
for when the customer changes requirements.
for customers who want to lease software to other users.
for when the customer pays in a foreign currency (e.g. US dollars).
for a solution expected to operate across multiple territories.
46. In UK law, what may
not
be permitted for license holders under the Copyright, Design and Patents Act 1988 (CDPA)?
decompiling a program to understand how to write another program to inter-operate with it.
installing a program on multiple machines.
making one backup copy of a program.
decompiling a program to fix bugs.
47. In Europe, when is adult pornography usually deemed lawful?
when it is non-violent, consensual and inaccessible to minors.
when it is not disrespectful to religious beliefs.
when it takes the form of free speech.
when it is accessible to all European citizens.
48. In United States law, unsolicited email is considered lawful in which of the following scenarios?
unsolicited email contains no abusive or offensive language.
the sender is a registered charity.
the recipient has not asked the sender to stop.
the recipient has been offered compensation for receiving unsolicited email.
49. In EU law, an Internet service provider (ISP) in the UK is
not
liable for damages or criminal sanctions when transmitting data, under what circumstances?
the ISP hosts data by permanently storing data uploaded by its customers.
the ISP uses caching to speed up downloading of future data by temporarily storing downloaded data.
the ISP only transmits data to systems outside the UK.
the ISP acts as a mere conduit and simply transmits data up/downloaded by the customer.
50. The (UK) Freedom of Information Act 2000 is based on certain principles. Which one of the following is
not
one of these principles?
Any member of the public is entitled to request specified information, subject to an administration charge approved by the Information Commissioner.
The government may refuse to disclose specified information, provided that it can convince the Information Commissioner that disclosure would not be in the public interest.
Civil servants’ advice to government ministers remains completely confidential.
Whilst individuals have a right to privacy, the government does not.
51. In European law, an Internet service provider (ISP) could be considered a mere conduit in which of the following circumstances?
they store downloaded data for no more than 12 weeks, to speed up future downloading of the same data.
they permanently store data uploaded by the customer.
they temporarily store downloaded data, to speed up future downloading of the same data.
they only transmit data up/downloaded by the customer.
52. Retail software licences and corporate software licences differ in several respects. Which one of the following is typical of a
corporate
software licence?
The license fee depends on the number of users.
The licence covers user training free of charge.
The licence covers maintenance free of charge.
The license does not cover maintenance.
53. The (UK) Data Protection Act 1998 requires explicit consent for use of sensitive personal data. Suppose that an on-line service requires users to register, entering personal data including some data that is sensitive. Which one of the following is generally regarded as providing explicit consent?
The registration form contains a statement that, by registering for the service, the client is assumed to grant consent.
The registration form makes no mention of consent, but refuses to allow the client to register if any field is not correctly filled.
The registration form requires the user to tick a check-box to grant consent.
The registration form requires the user to untick a check-box to withhold consent.
54. In UK law, which of the following is not an offence under the Computer Misuse Act (CMA) 1990?
stealing commercially sensitive data
disrupting operations of an organisation that is unlawfully harming the environment.
unauthorised modification of a company’s or individual’s web pages
accidentally spreading a virus or worm
55. In UK law, what is the basic principle of freedom of information?
that the information held by public bodies and private companies should be available to the public with certain exceptions.
that the information held by public bodies should be available to the public with certain exceptions.
that the information held by public bodies and private companies should always be available to the public.
that the information held by public bodies should always be available to the public.
56. The (UK) Data Protection Act 1998 defines sensitive personal data. Which of the following is
not
classified as sensitive personal data?
age
religious beliefs
criminal record
ethnic origin.
57. In UK law, when is processing sensitive data lawful?
when the data subject is a UK citizen and is at least 15 years old.
when explicit consent is sought from the data subject.
when the data subject grants explicit consent.
when the data subject has not stated they would not grant consent.
58. Under current European law, an internet service provider (ISP) can be sued for damages for transmitting a defamatory article in which one of the following circumstances?
The ISP cached the article and, when requested by a court to remove the article, uncached it immediately.
The ISP merely transmitted the article.
The ISP cached the article and, when requested by a court to remove the article, responded that it would follow its normal caching policy. (Its policy is to uncache all items more than one month old).
The ISP hosted the article and, when requested by a court to remove the article, removed it immediately.
59. In which one of the following circumstances does a company own the rights to a software product?
The author is an employee working in the company’s time.
The author is a freelance programmer working for the company (under a contract that does not specifically address copyright).
The author is an employee working in his/her own time.
The author is an independent contractor working for the company (under a contract that does not specifically address copyright).
60. The (UK) Police and Justice Act 2006 (PJA) enhanced the (UK) Computer Misuse Act (CMA) 1990. Which of the following was not directly addressed in the PJA act?
denial-of-service attacks
advanced persistent threats.
amended CMA to cover software tools intended to facilitate computer misuse.
increased maximum penalties for CMA offences
61. In European law, an internet service provider (ISP) could be prosecuted in which of the following circumstances?
The ISP hosts content uploaded or downloaded by its customers, but blocks access to any content shown to be unlawful.
The ISP hosts content uploaded by its customers, but removes any content shown to be unlawful.
The ISP caches content uploaded or downloaded by its customers, and accepts no liability for any unlawful content.
The ISP merely transmits content uploaded or downloaded by its customers, and accepts no liability for any unlawful content.
62. If a software product is found to be defective, the supplier can limit their liability to pay damages (under UK law) in which one of the following circumstances?
Whilst the software does have defects, they do not create a risk of death or injury.
The software licence limits the supplier’s liability to a specified maximum amount of money.
The software licence limits the supplier’s liability to the purchase price.
Whilst the software does have defects, they do not make the software unfit for purpose.
63. The contract for the development of a bespoke software system always includes the requirements for that system. Which one of the following is the most suitable way to do this?
The contract specifies the requirements precisely, with no allowance for change.
The contract specifies the requirements, but allows the client to make a limited number of changes in return for an additional charge.
The contract specifies the requirements, but allows the client freely to make a limited number of changes.
The contract specifies the requirements, but allows the client to negotiate with the developers to make a limited number of changes.
64. Suppose that a business provides space for its employees’ personal web pages, and suppose that one employee uses this space to post an article that is alleged to be defamatory. In European law, which of the following statements is most accurate?
The business can be sued on the grounds that it hosts the article.
The business cannot be sued as long as it removes the article promptly.
The business cannot be sued if it believes that the article is actually not defamatory.
The business can be sued on the grounds that it employs the author of the article.
65. In UK law, who does the Computer Misuse Act 1990 (CMA) apply to in the following circumstances?
anyone, anywhere, who unlawfully accesses a computer anywhere in the world.
only EU citizens who unlawfully access a computer in the UK.
only UK citizens who unlawfully access a computer in the UK.
anyone, anywhere, who unlawfully accesses a computer in the United Kingdom.
66. Companies naturally want to use their trade marks in their domain names. Which of the following statements is
false
?
It is possible for two companies in different countries to hold identical trade marks, but domain names are globally unique.
Domain names are allocated strictly on a first-come first-served basis, and can never be reallocated.
Cyber squatting is not an offence.
Domain names are allocated only for limited periods of time.
67. In terms of bespoke software development to what type of code does copyright apply?
boiler-platecode.
code generated specifically for the customer.
open-source code.
standard library code.
68. The (UK) Freedom of Information Act 2000 gives every citizen the right to request information from certain organisations. Which of the following is
not
covered by the Act?
NHS policy on funding treatment for a particular disease
policy advice given by civil servants to a government minister
the salary and expenses paid to a university’s senior management
a private-sector energy company’s plans to drill for shale oil.
69. The (UK) Data Protection Act 1998 introduced changes to data protection laws in the United Kingdom. What significant change did the act introduce?
personal data should not be transferred outside the United Kingdom, unless guaranteed adequate protection.
personal data could be repurposed for other uses, in specific cases.
religious views were reclassified as personal data.
personal data should not be transferred outside the European Economic Area (EEA), unless guaranteed adequate protection.
70. An application program downloaded from the Internet has no packaging on which its trade mark could be displayed. Which is the best way to get round this problem?
The supplier’s download page displays the trade mark.
The application’s desktop icon is its trade mark.
The application displays its trademark briefly when it is launched.
The application displays its trademark continuously when it is running.
71. A cost-plus contract expects customers to pay supplier’s actual costs and what else?
all associated legal fees.
integration costs with existing customer systems.
an enduring annual license fee.
an appropriate profit margin.
72. A software supplier can legitimately include, in its terms and conditions, a clause that limits its liability in case of:
the software causing death or injury to the buyer
the software causing death or injury to a third party.
the software causing financial loss to the buyer
the software being unfit for purpose
73. The (UK) Copyright, Design and Patents Act 1988 is the primary copyright law in the United Kingdom. Which of the following is accurate in the case of source code?
original source code is protected under the act.
closed source code is protected under the act.
open source code is protected under the act.
boilerplate source code is protected under the act.
74. Which one of the following statements is most accurate about European law on software patents?
Software can be patented in order to encourage innovative software development.
Software is specifically excluded by the European Patent Convention.
Software cannot be patented because in practice small software developers cannot afford to defend their patents against large competitors.
Software cannot be patented because there is no clear basis for defining what is inventive.
75. The (UK) Data Protection Act 1998 grants certain rights to every data subject. Which one of the following rights is
not
granted to a data subject?
the right to know whether his/her personal data has been disclosed to any other person or organisation.
the right to see his/her personal data
the right to see his/her children’s personal data
the right to have any inaccurate personal data corrected or deleted
76. Intellectual property is:
intangible property
property owned by an intelligent person
property created by an intelligent person
property that cannot be stolen.
77. Which one of the following statements about internet domain names is
false
?
No-one owns a particular domain name.
It is unlawful for a domain name incorporating a company’s trade mark to be registered by anyone except that company.
Domain names are global, whereas trade marks are registered in specific countries.
Domain names and trade marks are covered by completely different laws.
78. In US law, which of the following is usually
not
an offence under the Computer Fraud and Abuse Act (CFAA)?
denial-of-service attacks
unauthorised access to any "protected computer"
selling a physical textbook bought in the UK to a US customer through the Internet.
trafficking in passwords.
79. Which of the following is
not
covered by copyright law?
the business logic of an airline booking system.
a smartphone’s user interface
a game-playing program that you wrote in your spare time
a large-scale geographic database
80. The (UK) Public Interest Disclosure Act 1998 (PIDA) provides protection for whistle-blowers. Which of the following scenarios would not be covered by the act?
whistle-blower reveals danger to health and safety in their workplace to their line-manager.
whistle-blower reveals the concealment of illegal activity to upper management and a professional body.
whistle-blower reveals the failure of the organisation to comply with legal obligations to upper management.
whistle-blower exposes unlawful environmental damage by the organisation to the national media.
Submit Quiz