Final Exam Study Guide
CS 105 Summer 1999

What is Aristotle's Golden Mean?

What is utilitarianism? What is the deontological theory of ethics?

What are the ACM and IEEE?  Be able to give examples of some of their 
ethical codes.

Define the terms virus, worm, and trojan horse.  What is a rogue program?
How would you classify Melissa and Chernobyl?

What is a firewall?  What is "hard verification?"

Define the terms hacker, cracker, and phreak.

Describe the "Internet Worm" incident.

What is the CDA?  COPA?

What is the significance of the Computer Fraud and Abuse Act (CFAA)?

Tell the Cliff Stoll "Cuckoo's Egg" story.  Who is Kevin Mitnick?

Briefly describe the difference between copyrights and patents as they 
apply to hardware and software.  How long do patent rights last?  How 
long do copyright protections last?  What is "fair use"?  What is the
significance of the 1997 NET Act?

What is a digital watermark?  What does it protect?

What was the Therac-25 incident?  What mistakes were made by the 
manufacturers of this machine?

What are some examples of good software engineering practices?

What is the significance of the Y2K problem?

What is "profiling" or "computer matching"?  What is NCIC?

What is the significance of the 1974 Privacy Act and the 1984 Deficit 
Reduction Act?

What is the significance of the Electronic Communications Privacy Act?
(ECPA?)

What is the "Clipper chip?"

What is PGP?  What is RSA?  What is a digital signature?

What is the CERT?

What is the EFF?

What is the CPSR?

What are RSIs?  Identify some health and environmental concerns 
associated with computer use in our society.

What is ISO 9000?  What is CMM?

What provisions in the US Constitution relate to privacy, intellectual
property, and freedom of speech?

Standard Disclaimer:  This is a guide only and is not
comprehensive.