1.7 Ethics and Ownership
1.7 Ethics and Ownership
STUDENTS NAME:
SCHOOL NAME:
shahzadah.ashraf 03332076121
@gmail.com
A Levels With
Sir Bande'Shah
Page 1 of 52
Cambridge International AS & A Level Computer Science 9618 syllabus for 2021, 2022 and 2023. Subject content
Page 2 of 52
Page 3 of 52
Chapter 7 Ethics and Ownership
Artificial intelligence (AI)
Artificial intelligence (AI) depends on and draws from many other disciplines including: philosophy,
psychology, neuroscience, mathematics, linguistics and control engineering. The only definitions of AI
that are acceptable are at the same time so generalized that they are not very practical. The following
is a typical example:
AI concerns the use of a computer or computer-controlled device to perform tasks normally associated
with intelligent behavior by humans.
We will consider five aspects of intelligent human behavior and discuss some applications of AI that
mimic this human behavior.
Problem solving
One example is the development of a system that can play chess. This can be considered as displaying
artificial intelligence but this is only demonstrated because the rules of chess are limited. A computer
with sufficient storage capacity and processing power can investigate so many options for a possible
sequence of moves that a human cannot compete.
A second example is the traditional form of expert system that, for example, has been developed to
aid medical diagnosis. This is supplied with data and rules from living medical experts. The expert
system contains more knowledge than is possible for an individual doctor to have. However, if the
expert system is given a new situation that is not covered by the data and rules it has been given, it
cannot attempt a new or creative approach – unlike a human.
Linguistics
Voice recognition and voice synthesis techniques are already developed and in use. One example is if
you phone a help line where you might be answered by a computer. Provided that you answer
questions clearly the computer might be able to identify your needs and pass you on to an appropriate
human who can help. However, this is a long way away from the computer itself creating new
questions based on your answers and providing the help you need.
Perception
Traditionally robots have been used in manufacturing processes. Here the robot is programmed to
perform repetitive tasks. The action of the robot each time is triggered by some mechanism. However,
if anything unexpected happens the robot continues to operate as normal, regardless of any damage
being caused.
There is now much research focused on the development of autonomous robots. These have to be
fitted with sensors to enable the robot to take appropriate action depending on the information
received from the sensors. This is an example of perception in AI.
A development of this concept is the driverless car. There are several examples available or in
development but so far they have only been able to perform limited tasks. An example is the capability
for a car to park itself in a vacant parking space.
Page 4 of 52
Reasoning
There are examples of the application of AI where a program has been able to draw inferences (reach
conclusions based on evidence) which is a requirement for reasoning. The best examples concern the
proving of mathematical theorems. Attempts have also been made to develop techniques that can
verify that software that has been created does indeed correctly and fully match the documented
specification.
Learning
This is currently a very active area for the application of AI techniques. Machine learning is said to take
place if a system that has a task to perform is seen to improve its performance as it gains experience.
The AI system has access to ‘experience’ in the form of a massive set of data. By the use of appropriate
statistical algorithms the system learns from this data.
One example is when the actions of users visiting websites to buy products are stored. The AI system
then attempts to identify appropriate products to be advertised when a user returns to the website.
If sales progressively increase there is evidence that learning is taking place.
Another example is the program that investigates incoming emails and makes decisions as to whether
these can be classified as spam and therefore should be refused entry to the user inbox.
The impact of AI
The use of the Internet dominates the lives of a large proportion of the world’s population. Global
organizations that provide the systems underpinning this user activity are collecting and storing
massive amounts of data concerning how the Internet is being used. If this data is only being used to
enable the organization to increase its profits, this could be seen as normal business practice.
However, if the data is not being securely stored it could get into the wrong hands and be used for
criminal or subversive activity.
There are different concerns with respect to the introduction of autonomous mechanical products
such as robots, robotic devices and driverless vehicles into our daily lives. There are arguments that
technological developments lead to employment of more people to manufacture, service and install
the new products. There is a further argument that more technology leads to less manual labour and
therefore to increased leisure time. One counter argument is that more technology leads to fewer
jobs because machines are doing the work. Another is that such developments simply make the rich
richer and the poor poorer.
Some people are excited by the introduction of driverless vehicles, but other people believe that the
potential for accidents will be increased and that there are not enough measures to prevent accidents.
Robots can be used in environments that would be dangerous for humans to enter. Giving the robot
the capability to act autonomously would make it more useful in such environments.
The environmental impact of robot manufacture and disposal is probably the most significant issue.
Robots are manufactured and require materials for their construction. There is only a limited supply
of the raw materials needed. Also, all mechanical and electronic devices eventually end up on the
scrap heap contributing to the already serious problem of waste products harming the environment
and creatures living in this environment.
The use of improved expert systems to aid practicing doctors and nurses is clearly a benefit. However,
if these systems came to replace doctors and nurses the social consequences are difficult to predict.
Page 5 of 52
1.7.1 Ethics And The Computing Professional
Code Of Conduct
A Code of Conduct is not law, but it is a set of rules that apply when you
are in an organization such as your college. Examples might include "Don't
look at pornography at work". This would be legal at home, but if you did it at work you could be sacked. In
addition, a code of conduct may contain laws such as "Don't install pirated software".
The British Computer Society has produced a list of standards for the training and development of
Information Technology workers.
It covers the following issues:
The Public Interest - safeguarding public health; respecting rights of 3rd parties, applying a
knowledge of relevant regulation.
Duty to employers and clients - carrying out work according to the requirements, and not abusing
employers' or clients' trust in any way.
Professional duty - uphold the reputation of the profession through good practice, support fellow
members in professional development
Professional Integrity and Competence - maintain standards of professional skill and practice,
accepting responsibility for work done, avoiding conflicts of interest with clients.
Each of these might be perfectly legal at home, but they might get you sacked at work
“Codes of Conduct may also include laws, as a way of reminding employees what is legal and what isn't
legal”
Page 6 of 52
IEEE CS/ACM Code of Ethics and Professional Practice
The Software Engineering Code of Ethics and Professional Practice, produced by the Institution of Electrical
and Electronic Engineers Computer Society (IEEE CS) and the Association for Computing Machinery (ACM),
acts as a professional standard for teaching and practicing software engineering. It specifies ethical and
professional obligations of software engineers and states the standards that standards society at large
expects them to meet and what they should expect of one another. The code also tells the public what
they should expect from software engineers. The code was produced by a multinational task force which
considered input from a variety of sources including industrial, government and military installations and
educational professions. An informative article of about the development of the code, which includes a full
copy of the code itself was published in the October 1999 issue of ACM Computer.
Software engineers shall commit themselves to making the analysis, specification, design,
development, testing and maintenance of software a beneficial and respected profession. In
accordance with their commitment to the health, safety and welfare of the public, software
engineers shall adhere to the following Eight Principles:
Public: Software engineers shall act consistently with the public interest.
Client and Employer: Software engineers shall act in a manner that is in the best interests of their client
and employer, consistent with the public interest.
Product: Software engineers shall ensure that their products and related modifications meet the highest
professional standards possible.
Judgment: Software engineers shall maintain integrity and independence in their professional judgment.
Management: Software engineering managers and leaders shall subscribe to and promote an ethical
approach to the management of software development and maintenance.
Profession: Software engineers shall advance the integrity and reputation of the profession consistent
with the public interest.
Self: Software engineers shall participate in lifelong learning regarding the practice of their profession and
shall promote an ethical approach to the practice of the profession.
Page 7 of 52
1.7.2 Ownership of software and data
Ownership of copyright
Copyright is generally owned by the creator of the work in the first instance. However, copyright
ownership depends on a number of different things such as the type of work created or how the work was
created, for example by an employee as part of their job.
The law grants to owners a set of specified rights: reproduction of works; distribution of copies; making of
derivative works; and the public performance and display of works. Some artworks have "moral
rights" regarding the name of the artist on the work, or preventing destruction of some works. Owners
may also have rights to prevent anyone from circumventing technological protection systems that control
access to the works.
As a general rule, the initial owner of the copyright is the person who does the creative work. If you wrote
the book or took the photograph, you are the copyright owner.
If you created the work as an employee, acting within the scope of your employment, the work may be
a "work made for hire." In that event, the copyright owner is the employer. If you are an employee, and
your job is to create software code, the copyright probably belongs to your employer.
The law may make you or your employer the copyright owner, but the law also allows the owner
to transfer the copyright. With a written and signed instrument, your employer can give you the
copyright. In the academic setting, we are frequently asked to transfer copyrights in our books and articles
to publishers. The ability to transfer or retain our copyrights is an opportunity to be good stewards of our
intellectual works.
A copyright owner may grant rights to the public to use a protected work. That grant could be a simple
statement on the work explaining the allowed uses, or it may be a selection of a Creative
Commons license. Similarly, the movement to make works "open access" or "open source" is a choice by
the owner of rights to make works available to the public.
Page 8 of 52
Legislation
The way you use data and computers is subject to the law of the country you are living in. Across the world
different countries have different laws, for the exam you only need to learn about the laws that affect the
United Kingdom.
You must be familiar with the following legislation:
Copyright
Software copyright refers to the law regarding the copying of computer software. Many companies and
individuals write software and sell it for money, these products are copyrighted and you cannot copy the
code or the program without the permission of the maker. This, they believe protects the work of the
programmers, rewarding them for their efforts
Other companies and individuals release software under Free and Open Source software (FOSS) licenses.
These licenses allow users the right to use, study, change, and improve a program's design through the
availability of its source code. Some adherents of FOSS believe it creates better software in the long term,
and others believe that no software should be copyrighted. FOSS licensed products are heavily used in
running the World Wide Web and in the creation of popular websites such as Facebook. Open Source
licenses generally mean that if you create software that makes changes to open source code, and choose
to release it, you must release your new code under the same Open Source license, this is called Copy-Left.
Some free software is in the public domain, meaning that you can use it for whatever purpose you wish, if
you make a software product involving changes to public domain sources code, you don't have to release
your code into the public domain.
Copyright in most works lasts until 70 years after the death of the creator if known, otherwise 70 years
after the work was created or published (fifty years for computer-generated works).
In summary the act specifies that users are not allowed to:
use copyright material without permission
use patented design without permission
edit programs without permission
copy or distribute software when you don't have permission
Page 9 of 52
Computer Misuse Act 1990
The Computer Misuse Act 1990 deals with people who crack computer programs or systems. Crimes might
include removing the Copyright protective measures from a commercial software product, breaking into a
school database to change grades, hacking into a companies' website and stealing customer credit card
details, creating viruses and Trojans, and so on. It was recognized in the late 1980s that the increase in
business and home use of computers required legislation in order to protect against their exploitation. To
this end, in 1990 the Computer Misuse Act was established.
Under the act, three new offences were created:
It prohibits:
"Obtaining access" means; "Causing the computer to perform any action the results in it": Copying/moving
data, Erasing/altering data, using a program; or causing the computer to output programs or data.
A difficulty with computer crime is that it can cross physical and national borders, the Computer Misuse
Act recognizes this fact and gives British Courts the jurisdiction where a "significant link" with Britain can be
demonstrated in instances of computer-related crime. America has its own Computer Fraud and Abuse
Act.
Page 10 of 52
Data Protection Act 1998
The Data Protection Act 1998 controls the way that companies, organizations and individuals handle
personal data. It states that:
1. Data may only be used for the specific purposes for which it was collected.
2. Data must not be disclosed to other parties without the consent of the individual whom it is about,
unless there is legislation or other overriding legitimate reason to share the information (for
example, the prevention or detection of crime). It is an offence for Other Parties to obtain this
personal data without authorization.
3. Individuals have a right of access to the information held about them, subject to certain exceptions
(for example, information held for the prevention or detection of crime).
4. Personal information may be kept for no longer than is necessary and must be kept up to date.
5. Personal information may not be sent outside the European Economic Area unless the individual
whom it is about has consented or adequate protection is in place, for example by the use of a
prescribed form of contract to govern the transmission of the data.
6. Subject to some exceptions for organizations that only do very simple processing, and for domestic
use, all entities that process personal information must register with the Information
Commissioner's Office.
7. The departments of a company that are holding personal information are required to have
adequate security measures in place. Those include technical measures (such as firewalls) and
organizational measures (such as staff training).
8. Subjects have the right to have factually incorrect information corrected (note: this does not extend
to matters of opinion)
Page 11 of 52
Regulation of Investigatory Powers Act 2000
The Regulation of Investigatory Powers Act was passed in 2000, and introduces the power to intercept
communications with the aim of taking into account the growth of the Internet. It regulates the manner in
which certain public bodies may conduct surveillance and access a person's electronic communications.
Supporters of the act claimed this was an excuse to introduce new measures, some of these included being
able to force someone to reveal a cryptographic key for their data, with failure to do so resulting in up to 2
years imprisonment. As we have seen in packet switching, data can be read in transit between hosts.
However, the act goes further than allowing this:
enables certain public bodies to demand that an ISP provide access to a customer's
communications in secret;
enables certain public bodies to demand ISPs fit equipment to facilitate surveillance;
enables certain public bodies to demand that someone hand over keys to protected information;
Prevents the existence of interception warrants and any data collected with them from being
revealed in court.
Software License
A software license is a legally binding agreement that specifies the terms of use for an application and
defines the rights of the software producer and of the end-user.
All software must be legally licensed before it may be installed. Proof of purchase (purchase orders,
receipts, invoices or similar documentation are acceptable) must be maintained by individuals or
departments.
Software licensing can be a confusing subject. There are different types of licenses and licensing contracts,
and different vendors may use different terms to describe their licenses. Here are some key terms to help
you navigate through these murky waters.
1. Freeware
In general, freeware is available at no cost and with no restrictions. Freeware tends to be simple software
designed to perform one or two tasks.
2. Shareware
Shareware is free to try out. You usually have to pay if you want to continue using it. Some shareware
relies on the honesty of users to pay up when they should.
Page 12 of 52
3. Open source business software
Open source software can be freely adapted by anyone with the knowledge and inclination to do so. The
open source system has created many useful pieces of software that are the product of loose collaboration
between many people, all over the world.
Commercial/Proprietary Software
Proprietary software consists of software that is licensed by the copyright holder under very specific
conditions. In general, you can use the software, but you are not allowed to modify the software or
distribute it to others.
Many proprietary software applications are also commercial, meaning that you have to pay for a license.
However, many other proprietary software applications are free. The fact that software is free does not
mean it is not proprietary.
Page 13 of 52
Page 14 of 52
5 Three types of software licensing and four descriptions are shown in the table below.
Put a tick (✓) in each row to match each description to the appropriate type of software licensing.
Type of software
Software is purchased
before it can be used
Source code comes with
the software
Software is provided free
on a trial basis
[4]
State three of the principles of the ACM/IEEE Software Engineering Code of Ethics. Illustrate
each one, with an example, describing how it will influence their working practices.
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
9608/12/M/J/16 Page 15 of 52
3 A company needs new software to manage its accounts. It is evaluating two different options. One
option is open source software and the other is commercial software.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
Identify four benefits to the company in choosing the commercial software option.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...............................................................................................................................................[4]
9608/13/M/J/16 Page 16 of 52
4
2 A software company produces software and distributes it under different software licences.
Write the type of software licence that best fits each description. Use a different type of licence
for each description.
1. The software can be legally used, only after a fee has been paid.
2. The source code comes with the software. If the software is modified, the edited source
code must be released under the same conditions as the original software.
3. The software is free for a trial period and then a fee is requested, or expected, if the user
wants to continue to use the software.
4. The source code comes with the software. The software is free to be downloaded, edited,
and distributed, possibly without restriction.
(b) The software company stores information about customers and the software licences they
have purchased. The company considers a file-based approach for the storage and retrieval
of data.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(a) Two principles of the ACM/IEEE Software Engineering Code of Ethics are:
Name and describe three other principles in the ACM/IEEE Software Engineering Code of
Ethics.
Principle 1 .................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Principle 2 .................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Principle 3 .................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
(b) The software development company uses data backup and disk-mirroring to keep their data
secure.
Explain how data backup and disk-mirroring allow the company to recover from data loss.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Disk-mirroring ...........................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
................................................................................................................................................... [4]
(c) Shazia’s computer has Dynamic RAM (DRAM) and Static RAM (SRAM).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Shazia does not want to release the software as open source.
Explain why Shazia does not want to use an open source licence.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(iii) Name and describe two software licences, other than open source that Shazia could
use.
Licence 1 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Licence 2 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(d) One principle of the ACM/IEEE Software Engineering Code of Ethics is to always act in the
best interest of the client.
Explain how Frankie can ensure that he is acting in the best interest of his client.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(e) When the program is complete, Frankie uses a compiler to prepare the program for the client.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(i) State one ethical action that Sophie can take to help her to feel more confident about
starting work.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) State two ethical actions that Sophie’s manager can take to help Sophie to feel more
confident about starting work.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(iii) State one ethical action that Sophie’s new colleagues can take to help Sophie to feel
more confident about starting work.
...........................................................................................................................................
..................................................................................................................................... [1]
(b) Explain why Sophie is asked to sign a professional code of conduct before starting work.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) Annchi needs to decide which type of software licence to use for the game.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(ii) Give one benefit to the customers of the game being released using a commercial
licence.
...........................................................................................................................................
..................................................................................................................................... [1]
(iii) Describe one benefit to the customers of the game being released using a shareware
licence.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(a) He wants to make sure the source code is secure on his laptop.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Wei wants to compress the source code to transport it to another computer.
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
The following table shows seven activities which Bobby carries out.
Put a tick (✓) in the appropriate column to identify if the activity is ethical or unethical.
9608/12/O/N/15 Page 24 of 52
4 Paul works part-time for a large software company. The company sells security software to
a number of banks. He also runs his own software company that produces and sells computer
games.
Draw lines to indicate whether each statement describes ethical or unethical behaviour.
Statement
Ethical
Unethical
Because his work load is increasing, Paul
is now using overseas companies to write
some of the routines used in his games
software.
[6]
9608/13/O/N/15 Page 25 of 52
5 The IEEE Software Engineering Code of Ethics uses eight key principles shown in the right-hand
column of the following diagram.
Tom is employed as a tester with a software company. He is keen to become a trainee programmer.
The middle column in the diagram labels six incidents which have happened to Tom this week.
The table that follows the diagram describes each incident.
IEEE category
Public
Incident C Judgement
Incident D Management
Self
Incident Description
Tom has received some phishing emails. He reported this to the bank they were
A
supposed to have come from.
B Tom has asked his manager if they will pay for him to attend a programming course.
Tom is testing beta versions of new games software at work. He copies the software on
C
to CD-Rs and sells them to his friends.
D Tom has completed the application forms to join the Chartered Institute for IT.
Tom finds it difficult to work with one of his colleagues. His way of dealing with this has
E
been to refuse to speak with the colleague.
Tom’s manager had considered the testing of a new game was completed. Tom reported
F
to his manager that he thought there were still bugs which needed to be rectified.
(a) Draw a line on the diagram to link each of the six incidents to either ethical behaviour or
unethical behaviour. [2]
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
In his first week, Raj feels uncomfortable working with one of his colleagues. He is unfamiliar
with the programming language used by the team. Next week, he will be working on the site
of one of the company’s clients with a colleague. Raj is very nervous about working in an
unfamiliar workplace.
Raj has a review with his manager after his first three weeks.
The Code of Conduct document was produced by the Human Resources section. It closely
follows the ACM/IEEE Software Engineering Code of Ethics that uses these eight key
principles:
There are issues Raj will want to raise with his manager.
Issue 1
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
9608/13/O/N/17 Page 27 of 52
Issue 2
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
9608/13/O/N/17 Page 28 of 52
9
5 Mica has created some software and has copyrighted it. She wants to stop other people from
copying and changing it illegally.
(a) Identify two ways Mica can prevent illegal copies of the software being installed.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Identify one way Mica can distribute the software without the source code.
...................................................................................................................................................
............................................................................................................................................. [1]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
3 Ria manages a team of software developers. The team is creating a mobile application game for a
client.
Ria wants to ensure that her team works to the ACM/IEEE Software Engineering Code of Ethics.
(a) Explain the ways in which Ria and her team can ensure that they follow the Code of Ethics in
relation to the product and their colleagues.
(i) Product
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Colleagues
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(b) Ria’s client wants to sell the game for a profit. The client cannot decide which type of software
licence to use to distribute the game.
Identify two types of licence that Ria could recommend to her client and justify the use of
each licence.
Licence 1 ..................................................................................................................................
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Licence 2 ..................................................................................................................................
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(a) Malika’s manager has asked her to work with a senior software engineer for the first week.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Malika researched the company and the programming languages used by the company
before she started the job.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) Malika thinks that her colleagues do not like her, so she asks her manager for help.
Describe the actions the manager could take to support Malika in an ethical way.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
6 Lara is managing a team of software developers who are writing a computer program.
(a) Benedict is one of the developers. He is struggling to keep up with his workload.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Lara has identified that when a specific sequence of actions is performed in the program, a
run-time error causes the program to crash.
She has decided there is not enough time to debug the code because the client needs the
system urgently, and there is a possibility that the client may never perform this sequence of
actions.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) The client wants to copyright the final program so that no one else can copy or amend it.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Identify two software licences that would be appropriate for the program.
Licence 1 ...........................................................................................................................
Licence 2 ...........................................................................................................................
[2]
(iii) Identify one software licence that would not be appropriate for the program. Justify your
choice.
Justification .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
© UCLES 2020 9608/13/O/N/20 Page 32 of 52
Page 33 of 52
Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9608 12
5 One mark per row. [4]
6 One mark for identifying the principle, one mark for an example that is in the context of this
scenario.
• PUBLIC / Software engineers shall act consistently with the public interest.
o Example in context
• CLIENT AND EMPLOYER / Software engineers shall act in a manner that is in the best
interests of their client and employer (consistent with the public interest.)
o Example in context
• PRODUCT / Software engineers shall ensure that their products and related modifications
meet the highest professional standards possible.
o Example in context
• JUDGEMENT / Software engineers shall maintain integrity and independence in their
professional judgment.
o Example in context
• MANAGEMENT / Software engineering managers and leaders shall subscribe to and
promote an ethical approach to the management of software development and maintenance.
o Example in context
• PROFESSION / Software engineers shall advance the integrity and reputation of the
profession (consistent with the public interest).
o Example in context
• COLLEAGUES / Software engineers shall be fair to and supportive of their colleagues.
o Example in context
• SELF / Software engineers shall participate in lifelong learning regarding the practice of their
profession and shall promote an ethical approach to the practice of the profession.
o Example in context
Page 34 of 52
Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9608 13
Page 35 of 52
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED
• Commercial Licence
• Free Software Licence
• Shareware Licence
• Open Source Licence
2(b)(ii) 1 mark for each correct name, 1 mark for each matching description, max 2 4
marks per level
• External
• The individual’s view(s) of the database
• Conceptual
• Describes the data as seen by the applications making use of the
DBMS
• Describes the ‘views’ which users of the database might have
• Physical / Internal
• Describes how the data will be stored on the physical media
• Logical
• Describes how the relationships will be implemented in the logical
structure of the database
• Product
• Software engineers shall ensure that their products and related
modifications meet the highest professional standards possible.
• Judgement
• Software engineers shall maintain integrity and independence in their
professional judgement.
• Management
• Software engineering managers and leaders shall subscribe to and
promote an ethical approach to the management of software
development and maintenance.
• Profession
• Software engineers shall advance the integrity and reputation of the
profession consistent with the public interest.
• Colleagues
• Software engineers shall be fair to and supportive of their colleagues.
• Self
• Software engineers shall participate in life-long learning regarding the
practice of their profession and shall promote an ethical approach to the
practice of the profession.
Data backup
• A copy of data will have been made and stored elsewhere.
• If the original is lost, the backup can be used to restore the data.
Disk-mirroring
• The data is stored on two disks simultaneously.
• If the first disk drive fails, the data is accessed from the second disk.
Commercial Software
• The program is purchased for a fee
• It restricts the number of users/possible time period for use // Limited
number of installations allowed // Software key needed to install
• Source code not provided // source code protected / cannot be edited
• Anyone can purchase/download if agree to the terms
Shareware
• The program is free for a trial period // The (free) program may have
limited functionality // Need to purchase / enter details after trial
• Users do not have access to the source code // source code may not be
edited
• Users may re-distribute the software.
Freeware
• There is no charge for the software
• The software could still be copyrighted
• She can set her own restrictions on what a user can do with the
program
• Security ensures that data is safe from unauthorised access // safe from
loss
• Integrity ensures that data is accurate / consistent / up to date
By example:
• Identification of a primary key in a table
• Describing that primary key in another table as a foreign key
2(c)(iii) 1 mark for benefit, 1 mark for expansion for max 2 benefits 4
For example:
• Prepare an induction
• Invite Sophie in before starting
• Introduce Sophie to the team
• Give Sophie a mentor
• Prepare a greeting/introduction
• Provide structured support
• Invite Sophie to social event(s) before/at the start to meet people
5(a) 1 mark for one letter in the correct place, 2 marks for all three correct 2
2 B
4 A
5 C
5(b)(i) 11000010 1
5(b)(ii) CD 1
• The maximum range for an 8-bit two's complement binary number is −128
to +127
• … 200 is outside of the maximum range
Page 44 of 52
Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9608 13
Unethical
1 mark for each correct line, two lines from one box is incorrect [6]
Page 45 of 52
9608/12 October/November
Cambridge International AS/A Level – Mark Scheme
PUBLISHED 2017
5
Public
Incident B Product
Ethical
Incident C Judgement
Incident D Management
Unethical
Incident E Profession
Incident F Colleagues
Self
Page 46 of 52
9608/13 October/November
Page 47 of 52
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019
• Encryption
• Assign a unique code so it will not install without this // product key
• Limit the number of times that version of the software can be installed
• Set a time limit within which the software must be installed
5(b) • Provide an .exe file // Compile the source code // Use a compiler 1
• So that she can sell the software for a fee // make money from the software
• A commercial licence prohibits unauthorised/further copies being made
and/or distributed
• A commercial licence prohibits any changes to the software
• Open Source
• Free Software
• Shareware
• Freeware
Product:
For example:
• Ensure product is of a high standard
• Ensure product meets requirements
• Ensure the product is delivered within time
• Ensure the product is delivered within budget
• Ensure product development is well-documented
• Ensure product is tested thoroughly // free of bugs
Colleagues:
For example:
• Need to be fair// do not show any prejudices
• To be supportive of colleagues
• Work together as a team
• Listen to each other’s ideas
• Assist colleagues in professional development
• Fully credit the work of other members of the team
• Make colleagues aware of expected standard ways of working
3(b) 1 mark for naming licence, 1 mark for description to max 2 per licence 4
• Commercial / proprietary...
• ...Software is sold for a fee therefore giving the client the income
• Shareware...
• ...Free for a trial period / limited features, and then users must pay for it
For example:
• The manager is supporting her professional development
• The manager is working in the best interest of his/her colleague (Malika)
• This will ensure she is introduced to all aspects of the job
• The manager is offering appropriate support
For example:
• She is acting in her own best interest
• … by taking responsibility for her own professional development
• She is acting in the best interests of her colleagues
• … by ensuring she is up-to-date and does not need further training
For example:
• Discuss the problems with her
• Discuss the concerns with her colleagues
• Assign her a mentor who can reassure her
• Team building exercises
7(a) 1 mark for correct lines from IPv4, 1 mark for correct lines from IPv6 2
Characteristic IP address
Can use hexadecimal
notation
IPv6
Uses double colons (::)
e.g.
• Reduce his workload // Review his work demands
• Redistribute his work
• Arrange a meeting with him
• ... to discuss the reasons why he is struggling
e.g.
• Not acting in best interest of the client
• ... The error could cause significant problems for the client if encountered
• The product does not meet the highest possible standard
• Not acting in the best interest of the development company
• … if the error occurs, it could lead to repercussions for the development
company
• Commercial
• Shareware