IS1108 Question Bank
IS1108 Question Bank
3) Which of the following best describes the importance of maintaining a clearly defined
A. It helps to drive the growth of a smart nation
B. Developers would feel more entrusted to the organizations push out more code
changes
C. Having properly defined ethics will mean newer technologies can emerge to address
quality
D. Having a properly defined code of digital ethics to govern an organization as
newer technology rise
4)which of the following is not considered as part of the need of digital ethics
A. Lack of human safety and rights
B. Lack of trust in legal protections within the use of technology
C. Lack of newer technologies to address problem
D. Lack of community buyers
5) Which of these are not examples of fostering digital ethics in an organisation, team or
world?
a. Incorporate ethical considerations into governmental organizations and public sector
decisions make
b. Implementing newer solutions before applying relevant regulations and ethical
concepts
c. Be aware of and observe relevant government wide arrangements for trustworthy
data access
d. Monitor and retain control over data inputs in particular those used to inform the
development of decisions
6) which of these are not the focus areas of digital ethics
a)Documenting processes for transparent audits
b) elaborating on the design for transparent audits
c)identifying the ethical requirements and values
d)defining of stakeholders ,application domain and framing for ethical considerations
7)which of these are not part of the R&D phase as mentioned in the framework
a)Important to conduct development in short phase so that there is no progressive
checking
b)Check against these ethical requirements periodically
c)Identify ethical requirements and translate them to ethical values
d)reassess the ethical definitions and rewrite them if something is amiss
8) which of the following are not parts of considerations for ethical requirements and values
a)Ease of use
b)transparency
c) responsiveness
d)data protection & privacy
9) which of the following is not part of the Scope and Application of Domain of digital ethics
a) avoid areas where ethical considerations do not cover
b)identify the scope and stakeholders of the application context
c)come up with emergency management and decision support systems
d)train the organisation on digital ethics
10)which of the following statement best describes the framework for adopting digital ethics
a)It is a set of design principles and guidelines so that the software and technology
itself abide by the ethical rules
b)it is an advised guideline that organisations could follow to develop ethical software and
c)they are defined by IEEE and other technological audit firms as part of a scheme to
enforce better
d) the framework is a set of design principles and guidelines so that the software and
technology itself abide by ethical
HUMAN-COMPUTER INTERACTION
2. Which of these examples are not part of the goals of Human-Computer Interaction?
a. Making it easier for users to onboard a product/service
b. Creating secure systems that are fault tolerant
c. Providing an enjoyable and unique experience within the product or service offered
d. Organizing the overall layout, design, concepts and other elements to make the goal
of the system accomplishable
3. Which of these does not describes the importance of UX designers and proper UI Design
a. UX designers think about how to design and implement computer systems that
satisfy human users
b. UX It aims to provide great interactive experiences that keep users loyal to the
product or brand
c. UX Designers know and understand that the user is at the heart of what they do
when it comes to designing and building solutions around UE
d. User Experience Design focuses on how a product or service is graphically
represented
5. Which of these are not the issues faced by Supervised Autonomy when building reliable,
safe and trustworthy systems?
A. Spending more efforts to monitor autonomous systems rather than have the systems
run autonomously. Leading to adverse effects such as inferior performance
B. The increased dependencies on different technologies to achieve autonomy
C. Making the autonomous system as complex as possible, to tackle complex
tasks
D. Human nature to want to exploit technology to make lives easier
8. Which of the following are not the focus area of HCI Ethical Considerations
A) System Extensibility
B) System vulnerabilities
C) Data privacy issues
D) Data transparency
10. Which of the following statement best describes HCI and BCI
All of the above
( a. HCI and BCI will minimize human interaction in daily routine tasks, however, it cannot
relinquish human intervention, especially in the management of autonomous systems, AI
and smart technologies
C. With improvements in technologies such as AI and VR, many organisations are working
towards commercial BCI technology. However, like HCI, there are considerations towards
ethical issues that needs to be addressed before taking the step toward BCi
D. There are numerous key ethic issues and considerations when implementing HCI)
WHERE WAS THIS FROM
Which of the following ethical issue is the best example of a computing professional's
responsibility to the public?
a. Quality and Risk
b. Whistle-blowing
c. Social impact
d. Intellectual property
Digital Intellectual Property Rights
1. What do Intellectual Property Rights protect?
a. Creative works
b. Commercial goodwill
c. Inventions
d. All of the above
3. Do you need to go through any registration process or application for copyright to exist for
the works to be protected?
a. Yes
b. No
4. Works can exist in more than one category (eg literary work, artistic work, dramatic work,
performances). True or false?
a. True
b. False
8. Your invention is patented in Singapore and Bob from another country copied your idea
and developed it. Did he infringe your patent rights?
a. No
b. Yes
3. Which of the following are exempted from the Data Protection provisions of the PDPA?
a. Public agencies
b. Individuals acting in a personal and domestic capacity
c. Societies and clubs
d. Voluntary welfare organisation
6. Which of the following are considered appropriate technical measures to protect personal
data held by an organisation?
a. Ensure that employees are bound by confidentiality obligations in their employment
contract
b. Ensure that consumer database can only be accessed by authorised staff only
c. Ensure that storage devices containing personal data are encrypted
d. Ensure that staff are all sent for data protection training
7. Which of the statements below is correct the moment an organisation detects a possible
data breach incident?
a. Assess if data breach is notifiable within 30 calendar days and if so, notify
PDPC and/or affected individuals within 3 calendar days
b. Notify PDPC and affected individuals within 3 calendars
c. Notify PDPC immediately, then conduct assessment (within 72 hours) to determine if
it is necessary to notify affected individuals
d. Notify PDPC immediately
8. What are some of the good practices that developers must incorporate into ICT systems
when it comes to housekeeping of personal data?
a. Ensure that files created for an ad hoc purpose and stored on user devices are
routinely removed
b. Ensure that temporary files such as interface files must be protected while in
use
c. Document a list of temporary files used by the system in case of audits
d. Ensure that temporary files such as data migration files must be removed
when no longer required
9. In the area of ICT controls, developers must ensure that authentication and authorisation
processes in ICT systems include which of the following:
a. Regular review of user accounts to ensure all the accounts are active and
access rights are appropriately assigned
b. Conduct data protection impact assessments
c. Log successful and failed logins to assist detection of hacking attempts
d. Communicate ICT security policies to both internal and external stakeholders
10. In the area of SOP/IT Operations, IT department must ensure that personal data stored
in personal computing devices issued to employees for work purposes are properly
safeguarded. Which of the following are considered good practices in this area?
a. Password protected: during boot-up, access to operating system
b. Perform regular anti-virus and anti-malware scans and software updates
c. Allow employees to install productivity software of their choice as long as it can help
improve their productivity
d. Give employees the option of working from home using their home personal
computer
Automation and Autonomous System