it485.new

This
work is important to me. Solve it correctly, without mistakes, without

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

plagiarism. Follow the instructions. There is no chance to repeat it.

Therefore, you must do a complete and correct work 100%.If you are sure you can do it, accept it put the solve in the cover College of Computing and Informatics
Assignment 2
Deadline: Day 27/11/2023 @ 23:59
[Total Mark for this Assignment is 8]
Student Details:
Name: ###
ID: ###
CRN: ###
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the
cover page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Question One
Pg. 01
Learning
Outcome(s):
CLO3: The
students will be
able to recognize
the importance of
Ethics and
Computing
Question One
2 Marks
1- Briefly summarize in your own words the differences between the
following:

Family Education Rights and Privacy Act

Video Privacy Protection Act
2- In your opinion, are there ways to improve the rights of family
education?
Question Two
Pg. 02
Learning
Outcome(s):
CLO4: The
students will be
able to apply
decision making
power by using
Virtue Ethics.
2 Marks
Question Two
Sometimes people are not aware of the security risk. For example, some of
them use public Wi-Fi to purchase goods for their home. Others share their
network information with strangers.
1- Public Wi-Fi can pose risks to your security in your opinion what are the
consequences of using Public Wi-Fi?
2- In your own words, what would you do to improve the awareness of those
people?
Question Three
Pg. 03
Learning
Outcome(s):
CLO6: The
students will be
able to illustrate
social and ethical
issues in
computing as a
computer
professional.
2 Marks
Question Three
Computer Systems are not 100% reliable, you studied some real-life examples
in the lecture. Give a real-life example for a computer system error and how
much damage it caused. Analyze the error using one of the ethical theories.
(not mentioned in the lecture)
Question Four
Pg. 04
Learning
Outcome(s):
CLO5: The
students will be
able to apply
Ethics in
Computing
Profession.
2 Marks
Question Four
A mature profession has eight attributes that enable it to certify new members
and support existing members. List them and explain each attribute?

Still stressed with your coursework?
Get quality coursework help from an expert!