Professional Practices MCQs
1. Literal meaning listening or spying secretly
a. Output frauds
b. computer hacking
c. Eavesdropping
d. Input frauds
Correct Option: c
2. ____ is a self- replicating program that can cause damage to data and files stored on your computer.
a. Freeware
b. Piracy
c. errors
d. Virus
Correct Option: d
3. ____ is a set of rules for determining moral standards or socially acceptable behaviour.
a. rules
b. Ethics
c. Standard
d. protocol
Correct Option: b
4. ____ is the illegal access to the network or computer system.
a. security
b. Cracking
c. privacy
d. virus
Correct Option: b
5. ____ refers to software setups that permit only authorized access to the system.
a. Personal security
b. Physical security
c. physical security
d. none of these
Correct Option: a
6. _____ refers to protecting data and computer system against dishonesty or negligence of employees.
a. personnel security
b. physical security
c. Personal security
d. none of these
Correct Option: a
7. _______________is defined as the duty,obligation or even authority.
a. democracy
b. authority
c. responsibility
d. work
Correct Option: c
8. “Cracking” comes under ____
a. Transcription
b. Computer Crime
c. Website Service
d. Data Security
Correct Option: b
9. A hacker contacts your phone or E-mail and attempts to acquire your password is called
a. Phishing
b. Spoofing
c. Spamming
d. none of these
Correct Option: a
10. A trademark is a distinctive sign that identifies certain goods or services produced or provided by an individual or a company
a. TRUE
b. FALSE
Correct Option: a
11. Altruistic Style is ________________?
a. Promises only what can be delivered
b. Deals honestly with others
c. Contributes to knowledge base
d. Behaves unselfishly
Correct Option: d
12. Articulates the profession’s philosophy and practice to the public
a. Theoretical Style
b. Intellectual Style
c. Committed Style
d. Ethical Style
Correct Option: b
13. Can earn a fine or jail time
a. Breaking the law
b. Breaking an ethic
c. breaking a moral
d. none of these
Correct Option: a
14. Can ruin your reputation
a. Breaking an ethic
b. Breaking the law
c. Breaking a moral
d. none of these
Correct Option: a
15. Computer ethics has its roots in the work of ___ during World War II.
a. Norbert Wiener
b. Blaise Pascal
c. Charles Babbage
d. Hermen Horllerith
Correct Option: a
16. Copyright and related rights protection is an essential component in fostering human creativity and innovation
a. TRUE
b. FALSE
Correct Option: a
17. Copyright law gives _________ exclusive rights to the owner of copyright
a. 2
b. 4
c. 6
d. 3
Correct Option: c
18. Ethical Style is ________________?
a. Promises only what can be delivered
b. Deals honestly with others
c. Behaves unselfishly
d. Contributes to knowledge base
Correct Option: b
19. General guidelines of computer ethics are needed for ____
a. Computer crime
b. Protection of personal data
c. Cracking
d. All of these
Correct Option: d
20. Hackers try out all the combination of all keyboard letters
a. Brute force
b. Dictionary based
c. both a & b
d. none of these
Correct Option: a
21. __________ is a sign used on goods that have a specific geographical origin and possess qualities or a reputation due to that place of origin
a. intellectual property
b. ethics
c. Geographical Indication
d. trade mark
Correct Option: c
22. is defined as the right of a person to guide
a. democracy
b. freedom
c. responsibility
d. authority
Correct Option: d
23. Making and using duplicate hardware and software is called ___
a. trade
b. Privacy
c. Free copy
d. copyright
Correct Option: b
24. Patents are granted by national patent offices or by regional offices that carry out examination work for a group of countries
a. TRUE
b. FALSE
Correct Option: a
25. Plagiarism is __________?
a. turning in someone else’s work as your own
b. copying words or ideas from someone else without giving credit
c. failing to put a quotation in quotation marks
d. All of these
Correct Option: d
26. Presents the theoretical foundation of ideas and actions
a. Theoretical Style
b. Committed Style
c. Ethical Style
d. Intellectual Style
Correct Option: a
27. Recognizes professional biases
a. Ethical Style
b. Committed Style
c. Theoretical Style
d. Intellectual Style
Correct Option: a
28. Responsible Style is ____________?
a. Behaves unselfishly
b. Contributes to knowledge base
c. Promises only what can be delivered
d. Deals honestly with others
Correct Option: c
29. Rules that mandate or prohibit certain behavior in society
a. regulation
b. Law
c. rules
d. moral ethics
Correct Option: b
30. Running other software on idle computer without the knowledge of the organization is called theft of ____
a. Computer time
b. Computer
c. software
d. hardware
Correct Option: a
31. software can be protected by
a. trade mark
b. design Registry
c. copyright
d. patent
Correct Option: c
32. Strives toward self-improvement
a. Intellectual Style
b. Ethical Style
c. Committed Style
d. Theoretical Style
Correct Option: c
33. Taking control from the website owner
a. software Hacking
b. website hacker
c. Net Hacking
d. Password Hacking
Correct Option: b
34. Tester is told everything about the network topology and technology and is authorized to interview IT personnel
a. red box model
b. white box model
c. Black box model
d. gray box model
Correct Option: b
35. The code of behavior and courtesy is__________
a. rules
b. Ethics
c. moral
d. laws
Correct Option: b
36. The hardware or a process used in its manufacture may be protected by a
a. copyright
b. Design Registry
c. patent
d. trade mark
Correct Option: c
37. The look of the product may be registered in the
a. copyright
b. trade mark
c. patent
d. Designs Registry
Correct Option: d
38. The name under which a product is sold may be registered as a
a. copyright
b. Designs Registry
c. trade mark
d. patent
Correct Option: c
39. The protection of hardware, facilities magnetic disks, and other illegally accessed, stolen, damaged or destroyed items refers to ____
a. Physical security
b. Personal security
c. Personnel security
d. none of these
Correct Option: a
40. the quest to maximize profitability should be contained by
a. ethical obligations
b. stakeholders
c. unethical obligations
d. lack of social responsibility
Correct Option: a
41. The transition to —————- is generally an ambiguous concept for students at this stage in
spite of many great ideas that occupies their minds.
a. entrepreneurship
b. intellectual property rights
c. trade mark
d. none of these
Correct Option: a
42. Theoretical Style is _____________?
a. Promises only what can be delivered
b. Contributes to knowledge base
c. Behaves unselfishly
d. Deals honestly with others
Correct Option: b
43. Traits of a Profession
a. regulation
b. Personal standards of excellence
c. rules
d. moral ethics
Correct Option: b
44. what are the ethical and social issues?
a. Privacy and Confidentiality
b. free data
c. unauthorized data
d. none of these
Correct Option: a
45. What are the roles in the protection of geographical indications
a. WIPO’s
b. PIOW’s
c. WOIP’s
d. IOPW’s
Correct Option: a
46. What kinds of trademarks
can be registered
a. one or a combination of words
b. letters
c. numerals
d. All of these
Correct Option: d
47. Which of the following is not a way of protection?
a. Personnel security
b. physical security
c. personal security
d. Piracy
Correct Option: d
48. Which of the following is not related to security mechanism
a. ecash
b. encryption
c. decryption
d. all of these
Correct Option: a
49. Who among the following began to examine unethical and illegal uses of computers by computer professionals in mid 1960s Menlo Park, California?
a. Willion
b. Donn Parker
c. Norbert Wiener
d. Bill Gates
Correct Option: b
50. You can protect sensitive data from prying eyes using
a. Password Hacking
b. encryption
c. file permission
d. file locks
Correct Option: c