Documente Academic
Documente Profesional
Documente Cultură
________
Karunya University
(Karunya Institute of Technology and Sciences)
2. Define whistle-blowing.
6. Define plagiarism.
9. Define Cyberstalking.
PART – B (5 x 3 = 15 MARKS)
14. Write few uses of wireless technology in the health care field.
PART – C (5 x 15 = 75 MARKS)
16. a. What are Ethics? Why fostering good business ethics is important?
(10)
(OR)
17. Explain in detail on the professional relationship that must be managed between employers
clients, suppliers, and other professionals.
18. Explain in detail on the different types of exploits that can harm your computer.
(OR)
19. Write in detail on the different Key Privacy and Anonymity Issues. How can you protect your
personal data? Give a suitable real-time scenario.
(OR)
21. a. Discuss in detail on the different aspects of patents and explain its types.
(7)
(OR)
23. Describe in detail on the impact of IT on the standard of living and worker productivity.
24. What are some of the key ethical issues associated with the use of social networking web
sites?
(OR)
25. a. What is meant by Outsourcing? Write about Offshore outsourcing, also give the pros
and
5. Making either an oral or a written statement of an alleged fact that is false and that harms
another person is __________.
6. ___________ is the process of taking something apart in order to understand it, build a
copy of it, or improve it.
8. __________ is defined as the amount of output produced per unit of input, and it is
measured
10. ___________ is a long term business arrangement in which a company contracts for services
PART – B (5 x 3 = 15 MARKS)
12. How can you safeguard your data through information privacy?
14. Write the common use of wireless technology in the health care field.
PART – C (5 x 15 = 75 MARKS)
16. Write about the decision making process in an ethical consideration. Explain about the steps to
be taken. Also give their different approaches to deal with moral issues.
(OR)
17. Write about the common ethical issues for IT users that they face in real time systems. Explain
about the different steps that can be taken to support the ethical practices of IT users.
18. How can different types of perpetrators who launch different kinds of computer attacks harm
the system? Explain in detail about their types of motives.
(OR)
19. Write in detail on the different key privacy and anonymity issues that harm your personal data.
Give a suitable real-time scenario for safeguarding your data.
20. Explain in detail about the key issues focusing on the freedom of expression. Give a detailed
note on its different aspects.
(OR)
[P.T.O.]
22. Explain about the software development process and state how different types of testing
phases will be done in each process.
(OR)
24. Write about the key ethical issues in Social Networking. Give reasons to state how this can
influence the real world.
(OR)
25. Explain in detail about Whistle Blowing. Write the major aspects involved in it.