Professional Practices

Professional Practices MCQs

1. Literal meaning listening or spying secretly

a. Output frauds

b. computer hacking

c. Eavesdropping

d. Input frauds

Correct Option: c

2. ____ is a self- replicating program that can cause damage to data and files stored on your computer.

a. Freeware

b. Piracy

c. errors

d. Virus

Correct Option: d

3. ____ is a set of rules for determining moral standards or socially acceptable behaviour.

a. rules

b. Ethics

c. Standard

d. protocol

Correct Option: b

4. ____ is the illegal access to the network or computer system.

a. security

b. Cracking

c. privacy

d. virus

Correct Option: b

5. ____ refers to software setups that permit only authorized access to the system.

a. Personal security

b. Physical security

c. physical security

d. none of these

Correct Option: a

6. _____ refers to protecting data and computer system against dishonesty or negligence of employees.

a. personnel security

b. physical security

c. Personal security

d. none of these

Correct Option: a

7. _______________is defined as the duty,obligation or even authority.

a. democracy

b. authority

c. responsibility

d. work

Correct Option: c

8. “Cracking” comes under ____

a. Transcription

b. Computer Crime

c. Website Service

d. Data Security

Correct Option: b

9. A hacker contacts your phone or E-mail and attempts to acquire your password is called

a. Phishing

b. Spoofing

c. Spamming

d. none of these

Correct Option: a

10. A trademark is a distinctive sign that identifies certain goods or services produced or provided by an individual or a company

a. TRUE

b. FALSE

Correct Option: a

11. Altruistic Style is ________________?

a. Promises only what can be delivered

b. Deals honestly with others

c. Contributes to knowledge base

d. Behaves unselfishly

Correct Option: d

12. Articulates the profession’s philosophy and practice to the public

a. Theoretical Style

b. Intellectual Style

c. Committed Style

d. Ethical Style

Correct Option: b

13. Can earn a fine or jail time

a. Breaking the law

b. Breaking an ethic

c. breaking a moral

d. none of these

Correct Option: a

14. Can ruin your reputation

a. Breaking an ethic

b. Breaking the law

c. Breaking a moral

d. none of these

Correct Option: a

15. Computer ethics has its roots in the work of ___ during World War II.

a. Norbert Wiener

b. Blaise Pascal

c. Charles Babbage

d. Hermen Horllerith

Correct Option: a

16. Copyright and related rights protection is an essential component in fostering human creativity and innovation

a. TRUE

b. FALSE

Correct Option: a

17. Copyright law gives _________ exclusive rights to the owner of copyright

a. 2

b. 4

c. 6

d. 3

Correct Option: c

18. Ethical Style is ________________?

a. Promises only what can be delivered

b. Deals honestly with others

c. Behaves unselfishly

d. Contributes to knowledge base

Correct Option: b

19. General guidelines of computer ethics are needed for ____

a. Computer crime

b. Protection of personal data

c. Cracking

d. All of these

Correct Option: d

20. Hackers try out all the combination of all keyboard letters

a. Brute force

b. Dictionary based

c. both a & b

d. none of these

Correct Option: a

21. __________ is a sign used on goods that have a specific geographical origin and possess qualities or a reputation due to that place of origin

a. intellectual property

b. ethics

c. Geographical Indication

d. trade mark

Correct Option: c

22. is defined as the right of a person to guide

a. democracy

b. freedom

c. responsibility

d. authority

Correct Option: d

23. Making and using duplicate hardware and software is called ___

a. trade

b. Privacy

c. Free copy

d. copyright

Correct Option: b

24. Patents are granted by national patent offices or by regional offices that carry out examination work for a group of countries

a. TRUE

b. FALSE

Correct Option: a

25. Plagiarism is __________?

a. turning in someone else’s work as your own

b. copying words or ideas from someone else without giving credit

c. failing to put a quotation in quotation marks

d. All of these

Correct Option: d

26. Presents the theoretical foundation of ideas and actions

a. Theoretical Style

b. Committed Style

c. Ethical Style

d. Intellectual Style

Correct Option: a

27. Recognizes professional biases

a. Ethical Style

b. Committed Style

c. Theoretical Style

d. Intellectual Style

Correct Option: a

28. Responsible Style is ____________?

a. Behaves unselfishly

b. Contributes to knowledge base

c. Promises only what can be delivered

d. Deals honestly with others

Correct Option: c

29. Rules that mandate or prohibit certain behavior in society

a. regulation

b. Law

c. rules

d. moral ethics

Correct Option: b

30. Running other software on idle computer without the knowledge of the organization is called theft of ____

a. Computer time

b. Computer

c. software

d. hardware

Correct Option: a

31. software can be protected by

a. trade mark

b. design Registry

c. copyright

d. patent

Correct Option: c

32. Strives toward self-improvement

a. Intellectual Style

b. Ethical Style

c. Committed Style

d. Theoretical Style

Correct Option: c

33. Taking control from the website owner

a. software Hacking

b. website hacker

c. Net Hacking

d. Password Hacking

Correct Option: b

34. Tester is told everything about the network topology and technology and is authorized to interview IT personnel

a. red box model

b. white box model

c. Black box model

d. gray box model

Correct Option: b

35. The code of behavior and courtesy is__________

a. rules

b. Ethics

c. moral

d. laws

Correct Option: b

36. The hardware or a process used in its manufacture may be protected by a

a. copyright

b. Design Registry

c. patent

d. trade mark

Correct Option: c

37. The look of the product may be registered in the

a. copyright

b. trade mark

c. patent

d. Designs Registry

Correct Option: d

38. The name under which a product is sold may be registered as a

a. copyright

b. Designs Registry

c. trade mark

d. patent

Correct Option: c

39. The protection of hardware, facilities magnetic disks, and other illegally accessed, stolen, damaged or destroyed items refers to ____

a. Physical security

b. Personal security

c. Personnel security

d. none of these

Correct Option: a

40. the quest to maximize profitability should be contained by

a. ethical obligations

b. stakeholders

c. unethical obligations

d. lack of social responsibility

Correct Option: a

41. The transition to —————- is generally an ambiguous concept for students at this stage in

spite of many great ideas that occupies their minds.

a. entrepreneurship

b. intellectual property rights

c. trade mark

d. none of these

Correct Option: a

42. Theoretical Style is _____________?

a. Promises only what can be delivered

b. Contributes to knowledge base

c. Behaves unselfishly

d. Deals honestly with others

Correct Option: b

43. Traits of a Profession

a. regulation

b. Personal standards of excellence

c. rules

d. moral ethics

Correct Option: b

44. what are the ethical and social issues?

a. Privacy and Confidentiality

b. free data

c. unauthorized data

d. none of these

Correct Option: a

45. What are the roles in the protection of geographical indications

a. WIPO’s

b. PIOW’s

c. WOIP’s

d. IOPW’s

Correct Option: a

46. What kinds of trademarks

can be registered

a. one or a combination of words

b. letters

c. numerals

d. All of these

Correct Option: d

47. Which of the following is not a way of protection?

a. Personnel security

b. physical security

c. personal security

d. Piracy

Correct Option: d

48. Which of the following is not related to security mechanism

a. ecash

b. encryption

c. decryption

d. all of these

Correct Option: a

49. Who among the following began to examine unethical and illegal uses of computers by computer professionals in mid 1960s Menlo Park, California?

a. Willion

b. Donn Parker

c. Norbert Wiener

d. Bill Gates

Correct Option: b

50. You can protect sensitive data from prying eyes using

a. Password Hacking

b. encryption

c. file permission

d. file locks

Correct Option: c