Professional Skills & Issues (H) - 2016 Exam
1. Data protection laws were introduced to address concerns about the ways in which personal data might be misused. Which of the following was
not
such a concern?
Unauthorised persons might access the data.
The data might be used for purposes for which it was not intended.
The data might be stored in several different locations.
The data might be used for unacceptable purposes.
2. The (UK) Data Protection Act 1998 defines sensitive personal data. Which of the following is
not
classified as sensitive personal data?
criminal record
ethnic origin.
religious beliefs
age
3. The (UK) Data Protection Act 1998 requires that personal data should be kept no longer than necessary. Which of the following is
false
?
A university may retain information on students who have graduated.
A restaurant may retain the phone number you used to book a table, after you have left the restaurant.
A police station may retain your phone number after you have called to make a complaint.
An on-line business may retain your e-mail address after it has dispatched your order to you.
4. The (UK) Freedom of Information Act 2000 gives every citizen the right to request information from certain organisations. Which of the following is
not
covered by the Act?
policy advice given by civil servants to a government minister
a private-sector energy company’s plans to drill for shale oil.
the salary and expenses paid to a university’s senior management
NHS policy on funding treatment for a particular disease
5. The (UK) Draft Investigatory Powers Bill would require communications service providers to:
keep communications data for a limited time
delete communications with unlawful content.
keep communications data indefinitely
inform the police immediately of any suspicious communications
6. Suppose that a business provides space for its employees’ personal web pages, and suppose that one employee uses this space to post an article that is alleged to be defamatory. In European law, which of the following statements is most accurate?
The business can be sued on the grounds that it hosts the article.
The business cannot be sued as long as it removes the article promptly.
The business can be sued on the grounds that it employs the author of the article.
The business cannot be sued if it believes that the article is actually not defamatory.
7. In European law, an internet service provider (ISP) could be prosecuted in which of the following circumstances?
The ISP caches content uploaded or downloaded by its customers, and accepts no liability for any unlawful content.
The ISP merely transmits content uploaded or downloaded by its customers, and accepts no liability for any unlawful content.
The ISP hosts content uploaded or downloaded by its customers, but blocks access to any content shown to be unlawful.
The ISP hosts content uploaded by its customers, but removes any content shown to be unlawful.
8. Controlling children’s access to internet pornography is difficult for a number of reasons. Which of the following is
false
?
Children can easily impersonate adults on the Internet.
Pornography laws vary enormously from one country to another.
ISPs are unwilling to filter access to pornography websites.
Pornography website owners cannot be trusted to block access by children.
9. There are some differences between European and US laws on unsolicited e-mail (spam). Which of the following is
true
?
Both European and US law require prior consent from individual recipients.
Both European and US law require every unsolicited e-mail to contain a valid address enabling the recipient to request the mailing to cease.
Both European and US law require every unsolicited e-mail to contain the sender’s true name.
Both European and US law apply to e-mails from senders in any country.
10. UK law defines various kinds of computer misuse offences. Which of the following is
not
such an offence?
using your work-place computer to play games
intentionally spreading a virus
a denial-of-service attack
development of software tools to facilitate unauthorised access to computers.
11. In the UK, if a person deliberately obtains unauthorised access to personal data stored on a computer, but makes no use of that data:
he/she can be prosecuted under the Freedom of Information Act
he/she can be prosecuted under the Computer Misuse Act
he/she cannot be prosecuted.
he/she can be prosecuted under the Data Protection Act
12. In the UK, computer fraud is covered by existing anti-fraud laws. Which of the following statements is
false
?
E-commerce increases opportunities for fraud.
Computer fraud is easier to detect than older forms of fraud.
ATMs increase opportunities for fraud.
A computer fraud trial requires specialist witnesses.
13. Which of the following is
not
covered by copyright law?
a game-playing program that you wrote in your spare time
a large-scale geographic database
a smartphone’s user interface
the business logic of an airline booking system.
14. The principle known as "obligation of confidence" makes which of the following unlawful?
A software contractor exploits knowledge gained while working with a client, in the absence of a specific non-disclosure clause in the contract.
A software engineer moves from one employer to another, then exploits a technique learned from a book while working for the first employer.
A software engineer moves from one employer to another, then exploits a technique developed by the first employer.
A software engineer working for a bank discovers a security weakness in the bank’s customer management system, but the bank refuses to address the problem, so the engineer discloses the problem to a professional body.
15. Software patenting is a difficult issue. Which of the following is
not
a reason for this difficulty?
It is always impossible to get a patent for software.
Patent practice does not always follow the law.
Small software companies could not afford to defend any patents that they own.
Most software lacks genuine novelty.
16. An application program downloaded from the Internet has no packaging on which its trade mark could be displayed. Which is the best way to get round this problem?
The application displays its trademark continuously when it is running.
The supplier’s download page displays the trade mark.
The application’s desktop icon is its trade mark.
The application displays its trademark briefly when it is launched.
17. Companies naturally want to use their trade marks in their domain names. Which of the following statements is
false
?
Domain names are allocated only for limited periods of time.
Domain names are allocated strictly on a first-come first-served basis, and can never be reallocated.
Cyber squatting is not an offence.
It is possible for two companies in different countries to hold identical trade marks, but domain names are globally unique.
18. In the development of a bespoke software system, what is the best way for the contractor to deal with the possibility that the client might request changes in the requirements during the term of the software contract?
Ensure that the initial contract formalises the conditions for accepting requirement changes.
Abandon the project.
Refuse to accept any requirement changes.
Negotiate a new contract.
19. Retail software licences and corporate software licences differ in several respects. Which one of the following is typical of a
corporate
software licence?
The licence covers user training free of charge.
The license fee depends on the number of users.
The licence covers maintenance free of charge.
The license does not cover maintenance.
20. A software supplier can legitimately include, in its terms and conditions, a clause that limits its liability in case of:
the software being unfit for purpose
the software causing financial loss to the buyer
the software causing death or injury to the buyer
the software causing death or injury to a third party.
Submit Quiz