Module 1 Tutorial Questions
Ethics and Professional Code of Conduct
• You must answer all questions.
• The presentation of your document is to be of a professional nature. This means formatting and
styling is present, and for each question the question number and the related answer is clearly
present. If an answer is not clearly labelled with the question number it corresponds to, zero (0)
marks will be given for that answer.
• This assessment involves academic writing. This means all work must be in your own words, and any
ideas or knowledge you have used must be properly referenced using the APA style of referencing. A
reference list is to be included at the end of the document listing only those references cited within
your text – it is highly recommended to use a referencing tool. For more information please refer to
Lecture 1: Intro and 2: How to Succeed in this Unit on vUWS.
• All chapters referenced relate to the text Ethics in ICT: An Australian Perspective
• Although all questions must be attempted, only 3 questions will be assessed. The 3 questions
marked will not be identified until marks are released.
• Font: 12pt, Arial, Black, 1.5 line spacing for Body Text. Any headers are to be additional increments
of this font of your choosing.
Academic writing entails demonstrating your comprehension and understanding. For this assessment, the
knowledge area is Module 1: Ethics and Professional Code of Conduct.
Although some questions may appear to require an opinion-oriented answer, you are to take the persona of
an IT professional and answer accordingly.
Question 1 (Read chapter 2 – The Study of Ethics)
Identify and explain at least 4 key concepts of ethics.
Question 2 (Read chapter 2 – The Study of Ethics)
A computer technician working at a repair centre finds child pornography on a computer he is repairing. He
knows possession of child pornography is illegal, and that he should contact authorities, however he also
knows that he should not have been looking at the contents of the client’s hard drive for personal interest. He
thinks about how his snooping could cost him his job if his employer finds out. Because of this, he doesn’t
report the discovery to the police, instead, he deletes all the files he found containing child pornography and
continues to repair the computer.
In relation to this scenario answer these questions:
a) Do you agree with the computer technician’s actions?
b) What did he do right?
c) What did he do wrong?
d) If you were in the same position, what would you do?
Summer A 2021
Professional Development 300578
Page 2 of 2
Question 3 (Read chapter 6 – Computer Crime)
a) Explain what social engineering is in relation to computer crime
b) Find and describe a real-world example of computer crime using social engineering.
Question 4 (Read chapter 11 – Professional Ethics and Responsibilities)
You have been delegated to develop a component of a system in a language you have not previously
studied, using an environment you have never seen before. Your industry mentor is oblivious to this – indeed
they assume you must have studied this, ”after all, don’t they teach you all this stuff at uni?”. Your industry
mentor is obviously very busy, heavily committed to various meetings and you really don’t like to bother
In relation to this scenario answer the following questions:
a) What would you do?
b) Who would you speak to?
c) What would you say?
d) Does the ACS Code of Ethics, Code of Professional Conduct and Professional Practice support your
decisions? Cite the relevant codes and explain how?
Question 5 (Read chapter 4 – Privacy)
a) What organisations do the Australia Privacy Principles set out in Privacy Act 1988 – Schedule 1 apply to?
b) Does this legislation provide adequate privacy protection for Australians? Justify your answer.
Question 6 (Read chapter 4 – Privacy)
Research the laws and regulations in Australia around taking of photos/videos of a person, as well as
laws/regulations around publishing these. Answer the following questions and justify your answers.
a) Do you need to get consent before taking a photo of someone? Does it differ for different situations?
b) Are there situations where it is illegal to publish a picture you have taken of someone?
Question 7 (Read chapter 8 – Computer Law, Ethics and Intellectual Property)
a) Explain what intellectual property is?
b) Explain what is required to ensure you don’t breach someone’s intellectual property.
Question 8 (Read chapter 12 – Communication Skills)
Choosing the right channel to communicate is dependent on the message or purpose of communication.
What is meant by this statement and give at least two examples where this is true.
Question 9 (Read chapter 5 – Cyberspace)
Outline and explain the two actions discussed in chapter 5 that governments can impose to regulate the
Such a cheap price for your free time and healthy sleep
All online transactions are done using all major Credit Cards or Electronic Check through PayPal. These are safe, secure, and efficient online payment methods.