本答案对应课程为:点我自动跳转查看
本课程起止时间为:2020-02-24到2020-06-30
本篇答案更新状态:已完结

Unit 2. Personal Information and Privacy Personal Information and Privacy 1

1、 问题:What are the possible risks of personal information in the network or software?
选项:
A:Once information goes on the Internet or into a database. It is almost impossible to remove them.
B:We often cannot directly protect information about ourselves. We depend on the businesses and organizations that manage it to protect it.
C:Potential risk of information abuse (滥用) and other uncertainties
D:Identification of a person has become much easier.
E:Due to software leaks (漏洞) , personal data may be stolen and lost.
答案: 【Once information goes on the Internet or into a database. It is almost impossible to remove them.;
We often cannot directly protect information about ourselves. We depend on the businesses and organizations that manage it to protect it.;
Potential risk of information abuse (滥用) and other uncertainties;
Identification of a person has become much easier.;
Due to software leaks (漏洞) , personal data may be stolen and lost.

2、 问题:The right of privacy is an important right of an individual. But in some cases, there is immunity(免除) to privacy, that is, reasonable use of private information. What are these reasonable circumstances?
选项:
A:Related to national security
B:Related to public health and safety
C:Related to other people’s right to know and happiness
D:Investigation and disclosure of crimes and serious violations
E:Under personal informed consent
答案: 【Related to national security;
Related to public health and safety;
Investigation and disclosure of crimes and serious violations;
Under personal informed consent

3、 问题:Which of the following situations are invisible information collection?
选项:
A:Spyware
B:User’s browsing logs
C:User’s Cookies
D:Mobile APP automatically turns on GPS positioning function
答案: 【Spyware;
User’s browsing logs ;
User’s Cookies;
Mobile APP automatically turns on GPS positioning function

4、 问题:Which of the following statements about the secondary use of personal information is correct?
选项:
A:Secondary use is the use of personal information for a purpose other than the one for which the person supplied it.
B:Transfer the personal information provided by the user at the time of registration to other companies. This is a kind of secondary use.
C:The common technologies involved in the secondary use of personal information include data mining and user characteristics analysis etc.
D:The second use of user’s personal information on the network platform is completely unnecessary for users to know.
答案: 【Secondary use is the use of personal information for a purpose other than the one for which the person supplied it.;
Transfer the personal information provided by the user at the time of registration to other companies. This is a kind of secondary use.;
The common technologies involved in the secondary use of personal information include data mining and user characteristics analysis etc.

5、 问题:What are the ethical principles for personal information?
选项:
A:Collect only the data needed.
B:Users’ personal data can be retained for indefinite (无限的) duration.
C:Maintain accuracy of data.
D:Offer a way for people to choose or control personal information from using in mailing lists service, advertising service, and other secondary uses.
E:Provide stronger protection for sensitive data.
答案: 【Collect only the data needed.;
Maintain accuracy of data.;
Offer a way for people to choose or control personal information from using in mailing lists service, advertising service, and other secondary uses. ;
Provide stronger protection for sensitive data.

6、 问题:Information that cannot directly or indirectly point to a certain person accurately does not belong to personal information and privacy, and belongs to the category of big data.
选项:
A:正确
B:错误
答案: 【正确

7、 问题:If a user shares personal information to a network platform, he or she is legally considered to have no strong expectation of privacy to protect this information.
选项:
A:正确
B:错误
答案: 【正确

8、 问题:In China, personal information and privacy are the same concepts in law.
选项:
A:正确
B:错误
答案: 【错误

9、 问题:The first ethical principle of privacy is
答案: 【(以下答案任选其一都对)Informed Consent;
right to know

【作业】Unit 4. Intellectual Property 知识产权 Legal Case Study

1、 问题:作业要求:法律案例研究 《法律案例研究》作业共30分。 要求:在软件及互联网相关的三个法律领域,每个领域选取1个法律案例进行研究。这三个法律领域是:(一)信息的公开与保密 (二)知识产权领域 (三)破坏计算机系统或安全。每个领域的案例分析是10分,共30分。案例可以选取中国案例或国外案例。但报告内容全部要求用英文撰写。 每个法律案例要求按下面的内容进行撰写分析。(对应内容要求同时见英文报告模板) 1. 案由(Cause of Action):这部分是案件内容的缩写,写明原告、起诉事由及被告。2. 案件涉及的法律领域:请用几个短语,列出本案涉及的法律领域。3. 案件简介(Case Introduction):请用简短的语言描述与本案有关的事实情况。案情介绍一般包括:时间、地点、人物、事件、经过、目的、手段、损害或结果等。4. 案件分析(Case Analysis):对案件中的被告行为(或违法行为)进行分析;也可以包括对案件中的争议焦点进行分析。在分析中,应引用相关的法律条款。(注意:在提到法律条款时,请做中英文法条对照。)5. 案件总结:陈述法院的结论。谈谈你从这个案子中学到的东西。 提交形式:电子版报告文档,提交到中国慕课大学平台相应作业处。截止提交时间:2020年4月18日(周六)23:00
评分规则: 【 每个案例,案件陈述2分,三个案件共6分。
每个案例,案件分析(含争议焦点分析)5分,三个案件共15分。
每个案例,案件总结和收获 3分,三个案件共9分。

【作业】Unit 6. Technology, Quality and Responsibilities 技术、质量与责任 Essay

1、 问题:According to the requirements of the template, this Essay should expounds how the software engineer should use the professional ethics consciousness to improve the software quality and avoid risks.
评分规则: 【 论点合理,阐述和分析充分。

【作业】Unit 6. Technology, Quality and Responsibilities 技术、质量与责任 Final Report

1、 问题: Select a software (enterprise application software, app, service platform, etc.) as the research object, apply the relevant knowledge of software ethics and law learned in this semester, analyze the ethical and legal risks of the software or platform, and put forward targeted suggestions. Please see attached report document for the work requirements.
评分规则: 【 1.Analyze at least 3 possible moral issues or impacts.2. Write at least 4 relevant legal issues.3.At least 2 suggestions for software design improvement.4.At least 3 suggestions for software strategies and management.

Unit 5. Crime and Security 犯罪与安全 Quiz 2

1、 问题:Sometimes it is legal to reproduce a copyrighted work without permission, that calls ‘Fair Use Concept’. but ‘Fair Use Concept’ should consider some factors includes( ).
选项:
A:Purpose and character of use 使用目的、用途
B:Nature of work 作品的性质
C:Amount of work being copied 被复制的工作量和重要性
D:(4) Affect on market for work 对市场的影响
答案: 【Purpose and character of use 使用目的、用途;
Nature of work 作品的性质;
Amount of work being copied 被复制的工作量和重要性;
(4) Affect on market for work 对市场的影响

2、 问题:Main Types of Intellectual Property includes ( ).
选项:
A:Copyright
B:Patent
C:Trade Secret
D:Trade Mark
答案: 【Copyright ;
Patent ;
Trade Secret ;
Trade Mark

3、 问题:The correct statements about the principle of Copyright Safe Harbor (避风港原则) are ( ).
选项:
A:A safe harbor is a legal provision to reduce or eliminate legal or regulatory liability in certain situations as long as certain conditions are met.
B:It includes two steps-’Notice’ and ‘Take down’.
C:It refers to that if an ISP (network service provider) only provides space services and does not make web content, when copyright infringement cases occur, if ISP is informed of infringement, it has the obligation to delete it, otherwise it will be deemed as infringement.
D:ISP (network service provider) must “not know and have no reasonable reason to know” the existence of piracy(盗版), in order to obtain the protection of “safe harbor principle”.
答案: 【A safe harbor is a legal provision to reduce or eliminate legal or regulatory liability in certain situations as long as certain conditions are met.;
It includes two steps-’Notice’ and ‘Take down’.;
It refers to that if an ISP (network service provider) only provides space services and does not make web content, when copyright infringement cases occur, if ISP is informed of infringement, it has the obligation to delete it, otherwise it will be deemed as infringement.;
ISP (network service provider) must “not know and have no reasonable reason to know” the existence of piracy(盗版), in order to obtain the protection of “safe harbor principle”.

本门课程剩余章节答案为付费内容
本文章不含期末不含主观题!!
本文章不含期末不含主观题!!
支付后可长期查看
有疑问请添加客服QQ 2356025045反馈
如遇卡顿看不了请换个浏览器即可打开
请看清楚了再购买哦,电子资源购买后不支持退款哦

   

发表回复

您的电子邮箱地址不会被公开。 必填项已用 * 标注