Computer Ethics & Security Assignment

Answer the following questions using the resources listed on the class webpage, in particular Trinity's Code of Ethics for Computing and the University of Texas at Austin Acceptable Use Policy. Type the answers in a MS Word document, save it on your Y drive and upload it to TLEARN no later than class time Jan. 23 . Your Word document should be saved as yourlastnameethics (e.g., Jungmanethics). It should include your name in a header and page numbers in a footer. Be prepared to discuss your answers in class. 

  1. What is an AUP? What purpose does it serve for a school or company?
  2. May you log onto someone else's account or sign someone else's name on your e-mail? Why or why not? Explain your answer completely.
  3. Are your files and email private? Explain.
  4. Why is it important to you and the University that you protect your password?
  5. May you send or forward a chain letter? Why?
  6. May you lend software that you legally purchased yourself to someone else? Explain.
  7. May you copy software which isn't copy-protected?  Explain.
  8. How might you know that there is spyware on your computer, i.e., how might your computer behave?
  9. How might spyware affect your personal security?
  10. What is a trojan horse virus? What is a worm?

This assignment is worth 10 points.