0% found this document useful (0 votes)
196 views14 pages

IS1108 Question Bank

Uploaded by

sikka.arshin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
196 views14 pages

IS1108 Question Bank

Uploaded by

sikka.arshin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Digital ethics

1 )Which of the following is not a concern of digital ethics


a. Emotional
b. Moral
c. Political
d. Social

2) What is an example of maintaining consideration of digital ethics


a. Do not provide information on what your software is tracking when it’s operating
b. Collect only data required for the scope of your product or service
c. Creating software that can crawl web data and by bypassing permission and cookies
D. Ensuring that your software’s thoroughly secured with layers of security
implemented

3) Which of the following best describes the importance of maintaining a clearly defined
A. It helps to drive the growth of a smart nation
B. Developers would feel more entrusted to the organizations push out more code
changes
C. Having properly defined ethics will mean newer technologies can emerge to address
quality
D. Having a properly defined code of digital ethics to govern an organization as
newer technology rise

4)which of the following is not considered as part of the need of digital ethics
A. Lack of human safety and rights
B. Lack of trust in legal protections within the use of technology
C. Lack of newer technologies to address problem
D. Lack of community buyers

5) Which of these are not examples of fostering digital ethics in an organisation, team or
world?
a. Incorporate ethical considerations into governmental organizations and public sector
decisions make
b. Implementing newer solutions before applying relevant regulations and ethical
concepts
c. Be aware of and observe relevant government wide arrangements for trustworthy
data access
d. Monitor and retain control over data inputs in particular those used to inform the
development of decisions
6) which of these are not the focus areas of digital ethics
a)Documenting processes for transparent audits
b) elaborating on the design for transparent audits
c)identifying the ethical requirements and values
d)defining of stakeholders ,application domain and framing for ethical considerations

7)which of these are not part of the R&D phase as mentioned in the framework
a)Important to conduct development in short phase so that there is no progressive
checking
b)Check against these ethical requirements periodically
c)Identify ethical requirements and translate them to ethical values
d)reassess the ethical definitions and rewrite them if something is amiss

8) which of the following are not parts of considerations for ethical requirements and values
a)Ease of use
b)transparency
c) responsiveness
d)data protection & privacy

9) which of the following is not part of the Scope and Application of Domain of digital ethics
a) avoid areas where ethical considerations do not cover
b)identify the scope and stakeholders of the application context
c)come up with emergency management and decision support systems
d)train the organisation on digital ethics

10)which of the following statement best describes the framework for adopting digital ethics
a)It is a set of design principles and guidelines so that the software and technology
itself abide by the ethical rules
b)it is an advised guideline that organisations could follow to develop ethical software and
c)they are defined by IEEE and other technological audit firms as part of a scheme to
enforce better
d) the framework is a set of design principles and guidelines so that the software and
technology itself abide by ethical
HUMAN-COMPUTER INTERACTION

1. Which area is not under the definition of Human–Computer Interaction


a. Prototyping
b. Designing
c. Implementing
d. Evaluating

2. Which of these examples are not part of the goals of Human-Computer Interaction?
a. Making it easier for users to onboard a product/service
b. Creating secure systems that are fault tolerant
c. Providing an enjoyable and unique experience within the product or service offered
d. Organizing the overall layout, design, concepts and other elements to make the goal
of the system accomplishable

3. Which of these does not describes the importance of UX designers and proper UI Design
a. UX designers think about how to design and implement computer systems that
satisfy human users
b. UX It aims to provide great interactive experiences that keep users loyal to the
product or brand
c. UX Designers know and understand that the user is at the heart of what they do
when it comes to designing and building solutions around UE
d. User Experience Design focuses on how a product or service is graphically
represented

4. Which of these is not true of Automation & Autonomy


a. Automation and autonomy are the same, that is, they have the same definitions
b. Autonomy is done with systems that can be built with human-like intelligent abilities
c. Automation is the ability of a system to perform well-defined tasks and to produce
deterministic results
d. Automation relies on a fixed sets of rules and algorithms without AI technologies

5. Which of these are not the issues faced by Supervised Autonomy when building reliable,
safe and trustworthy systems?
A. Spending more efforts to monitor autonomous systems rather than have the systems
run autonomously. Leading to adverse effects such as inferior performance
B. The increased dependencies on different technologies to achieve autonomy
C. Making the autonomous system as complex as possible, to tackle complex
tasks
D. Human nature to want to exploit technology to make lives easier

6. Which of these is true


a. One of the goals of supervised autonomy is to have high levels of computer
automation
b. One of the goals of supervised autonomy is to offer low levels of human control
(THIS NOT THE ANSWER)
c. One of the goals of supervised autonomy is to have high levels of technical
dependencies (THIS NOT THE ANSWER)
d. One of the goals of supervised autonomy is to decrease human performance(DIS
NOT ANSWER)

7. Which of these best describes Brain-COmputer Interfaces (BCI)


a. Having communication pathway between a functional brain and an electronic
device like a computer, which captures brain signals and sends them to the
computer
b. Capturing bodily movements and reactions towards a product or system and altering
the system to match the bodily reactions
c. An interface that UX designers create to best suit design principle to make better
user experiences
d. An interface that depicts the brainwaves and activities of a user

8. Which of the following are not the focus area of HCI Ethical Considerations
A) System Extensibility
B) System vulnerabilities
C) Data privacy issues
D) Data transparency

9. Which of the following is not true


a)HCI and UX are two independent areas that do not overlap
b)In the future, user interfaces are expected to be integrated into everyday life
c)Although brain computer interface may have many applications, there are numerous
ethical considerations that arise from such intrusive technologies
d) data privacy and security are concepts of evolving hci technologies of the future

10. Which of the following statement best describes HCI and BCI
All of the above
( a. HCI and BCI will minimize human interaction in daily routine tasks, however, it cannot
relinquish human intervention, especially in the management of autonomous systems, AI
and smart technologies
C. With improvements in technologies such as AI and VR, many organisations are working
towards commercial BCI technology. However, like HCI, there are considerations towards
ethical issues that needs to be addressed before taking the step toward BCi
D. There are numerous key ethic issues and considerations when implementing HCI)
WHERE WAS THIS FROM
Which of the following ethical issue is the best example of a computing professional's
responsibility to the public?
a. Quality and Risk
b. Whistle-blowing
c. Social impact
d. Intellectual property
Digital Intellectual Property Rights
1. What do Intellectual Property Rights protect?
a. Creative works
b. Commercial goodwill
c. Inventions
d. All of the above

2. What is the purpose of having copyright protection?


a. Protect originality
b. Encourage creative work
c. All of the above

3. Do you need to go through any registration process or application for copyright to exist for
the works to be protected?
a. Yes
b. No

4. Works can exist in more than one category (eg literary work, artistic work, dramatic work,
performances). True or false?
a. True
b. False

5. Can you identify what type of work is portrayed in the following?


HARRY POTTER
a. Artistic work
b. Literary work
c. Dramatic work
d. Performances

6. What does copyright NOT protect?


a. Architectural drawing
b. Ideas
c. Software codes
d. Music
e. Art work

7. Did I infringe copyright if I shared a photo of myself without permission or authorisation


which was taken by someone else?
a. Yes
b. No

8. Your invention is patented in Singapore and Bob from another country copied your idea
and developed it. Did he infringe your patent rights?
a. No
b. Yes

9. What is the trademark symbol to differentiate your brand?


a. TM
10. What is/are the best practice(s) to prevent IP rights infringement?
a. Do not plagarize works, albeit with or without permissions
b. Always credit the owner/author of an origin of work
c. Do not steal revenue or gain profit by free-riding on others’ works
d. All of the above
Data Protection in ICT
1. The PDPA is:
a. Compliant based
b. Based on principle of reasonableness
c. Technology neutral
d. Audit based

2. Which of the following would be considered as personal data?


a. Information about a health tracker product
b. Paid advertisement congratulating a National Day Award recipient
c. Information about a customer who purchased an electronic gadget from an
online store
d. Survey results showing e-commerce shopping patterns by age groups

3. Which of the following are exempted from the Data Protection provisions of the PDPA?
a. Public agencies
b. Individuals acting in a personal and domestic capacity
c. Societies and clubs
d. Voluntary welfare organisation

4. Which of the statements is INCORRECT with respect to the Retention Limitation


obligation?
a. Organisations can retain personal data only for as long as there is legal or business
reasons for doing so
b. Data intermediary must comply with this obligation
c. Organisations are allowed to retain personal data just in case they need them
in the future
d. PDPA does not prescribe a certain retention period

5. Which are obligations that a Data Intermediary must comply with?


a. Retention limitation
b. Data breach notification
c. Protection
d. Accuracy

6. Which of the following are considered appropriate technical measures to protect personal
data held by an organisation?
a. Ensure that employees are bound by confidentiality obligations in their employment
contract
b. Ensure that consumer database can only be accessed by authorised staff only
c. Ensure that storage devices containing personal data are encrypted
d. Ensure that staff are all sent for data protection training

7. Which of the statements below is correct the moment an organisation detects a possible
data breach incident?
a. Assess if data breach is notifiable within 30 calendar days and if so, notify
PDPC and/or affected individuals within 3 calendar days
b. Notify PDPC and affected individuals within 3 calendars
c. Notify PDPC immediately, then conduct assessment (within 72 hours) to determine if
it is necessary to notify affected individuals
d. Notify PDPC immediately

8. What are some of the good practices that developers must incorporate into ICT systems
when it comes to housekeeping of personal data?
a. Ensure that files created for an ad hoc purpose and stored on user devices are
routinely removed
b. Ensure that temporary files such as interface files must be protected while in
use
c. Document a list of temporary files used by the system in case of audits
d. Ensure that temporary files such as data migration files must be removed
when no longer required

9. In the area of ICT controls, developers must ensure that authentication and authorisation
processes in ICT systems include which of the following:
a. Regular review of user accounts to ensure all the accounts are active and
access rights are appropriately assigned
b. Conduct data protection impact assessments
c. Log successful and failed logins to assist detection of hacking attempts
d. Communicate ICT security policies to both internal and external stakeholders

10. In the area of SOP/IT Operations, IT department must ensure that personal data stored
in personal computing devices issued to employees for work purposes are properly
safeguarded. Which of the following are considered good practices in this area?
a. Password protected: during boot-up, access to operating system
b. Perform regular anti-virus and anti-malware scans and software updates
c. Allow employees to install productivity software of their choice as long as it can help
improve their productivity
d. Give employees the option of working from home using their home personal
computer
Automation and Autonomous System

1. Regarding automated vs autonomous systems, which of the following statement is


true?
a. Both automated and autonomous system relies on a fixed set of rules
regardless of the environment.
b. Automated systems rely on a fixed set of rules, while autonomous
systems rely on dynamic rules which depend on the environment.
Correct!
c. Automated system relies on a dynamic set of rules depending on the
environment, while autonomous system relies on a fixed set of rules.
d. Both automated and autonomous system relies on a dynamic set of rules
regardless of the environment.
2. Which of the following device(s) is a type of autonomous system
a. RFID tray return system, roaming robot
b. Robot Vacuum
c. Drones
d. All of the above
e. NUS Driver-less Shuttle Bus
3. Autonomous systems make informed decisions for themselves in complex
environments
a. True
b. False
4. Bob, as a developer needs to ensure the Technical Domain is well covered with the
computations and models developed well. However, he is not responsible to ensure
the safety and assurance of the autonomous systems.
a. True
b. False
5. Bob, as a developer needs to encourage the best practices for safety protocols in the
autonomous system as it falls under his Professional Responsibility.
a. True
b. False
6. Bob would like to build an autonomous system but he is unsure of the regulations to
proceed. However, since he is just building the system itself that will help the
community, he thought that there will be no issue as they will be highly sought after.
Is this perspective of Bob correct?
a. Correct
b. Incorrect
7. Which of the following issue that needs to be addressed within the Oversight aspect
of the Ethical Framework to build an autonomous system?
a. Liability issues
b. Compliance Issues
c. Authority Issues
d. Profitability Issues
8. Which of the following factor(s) does not fulfil the Public Acceptance Area aspect of
the Ethical Framework to build an autonomous system?
a. All of the above
b. Inconvenience brought to end users
c. Safety of the autonomous system
d. Data Theft
9. Which of the following factor(s) will ensure you fulfil the Ethics aspect of the Ethical
Framework to build an autonomous system?
a. Ensure proper adherence to proper safety regulations
b. Provide proper and sufficient documentation
c. Test thoroughly of the system prior to deployment
d. All of the above
10. Do you have to cover everything in the Ethical Framework to build an autonomous
system?
a. Yes. I have to cover all grounds otherwise I cannot deploy the systems.
b. No. However, I will cover as much ground as I can.
Artificial Intelligence Ethics and Governance
1. What is/are AI-based decisions susceptible to?
a. Bias
b. Discriminatory outcomes
c. All Of The Above
d. Inaccuracies
2. Which of the following is/are not an AI flaw?
a. Neutral Decisions
b. Non-neutral Decisions
c. Intelligible Decisions
d. Unintelligible Decisions
3. Which of the following is the biggest ethical concern of AI?
a. Privacy and Surveillance
b. Human Judgment
c. Bias and Discrimination
4. Which of the following does Facial Recognition under Apple’s Face ID fall under?
a. Privacy and Surveillance
b. Bias and Discrimination
c. Human Judgement
5. Which of the following is not an element of AI?
a. Knowledge
b. Perceptual analysis
c. Computing power
d. Algorithms
6. What is Artificial Intelligence (AI)?
a. AI is a term to describe a branch of computer science that is dedicated to
creating unintelligent machines that can do work and react like humans
b. AI is a term to describe a branch of computer science that is dedicated to
creating intelligent machines that can do work and react like machines
c. AI is a term to describe a branch of computer science that is dedicated
to creating intelligent machines that can do work and react like humans.
7. Which of the following is not a pillar of Trustworthy AI?
a. Robustness
b. Transparency
c. Explainability
d. Fairness
e. Privacy
8. What could be a way to maintain social engagement among users to use chatbots?
a. Do not censor hateful speech
b. Do not ensure the code of conduct of the chatbot
c. Restrict the scope of conversation and guide users to stay within a
conversational context
d. Do not censor sensitive information and disclose them to users
9. Why is/are AI Ethics and Governance important?
a. All of the above
b. There is an impact on humans
c. Allow users to make more informed decisions based on predictions
d. Ensure responsible deployment
10. Which of the following is not part of the National AI Strategy?
a. Becoming a global hub for developing, test-bedding, deploying and scaling AI
solutions.
b. Learning how to govern and manage the impact of AI.
c. Using AI to generate social value and improve lives
Computing for Social Good

How this one i think just refer to slides

You might also like