Professional Practices

1.Literal meaning listening or spying secretly

a. Output frauds

b. computer hacking

c. Eavesdropping

d. Input frauds

Correct Answer: c

2.____ is a self- replicating program that can cause damage to data and files stored on your computer.

a. Freeware

b. Piracy

c. errors

d. Virus

Correct Answer: d

3.____ is a set of rules for determining moral standards or socially acceptable behaviour.

a. rules

b. Ethics

c. Standard

d. protocol

Correct Answer: b

4.____ is the illegal access to the network or computer system.

a. security

b. Cracking

c. privacy

d. virus

Correct Answer: b

5.____ refers to software setups that permit only authorized access to the system.

a. Personal security

b. Physical security

c. physical security

d. none of these

Correct Answer: a

6._____ refers to protecting data and computer system against dishonesty or negligence of employees.

a. prosonnel security

b. physical security

c. Personol security

d. none of these

Correct Answer: a

7._______________is defined as the duty,obligation or even authority.

a. democracy

b. authority

c. responsibility

d. work

Correct Answer: c

8.“Cracking” comes under ____

a. Transcription

b. Computer Crime

c. Website Service

d. Data Security

Correct Answer: b

9.A hacker contacts your phone or E-mail and attempts to acquire your password is called

a. Phishing

b. Spoofing

c. Spamming

d. none of these

Correct Answer: a

10.A trademark is a distinctive sign

that identifies certain goods or

services produced or provided by

an individual or a company

a. TRUE

b. FALSE

c.

d.

Correct Answer: a

11.Altruistic Style is ________________?

a. Promises only what can be delivered

b. Deals honestly with others

c. Contributes to knowledge base

d. Behaves unselfishly

Correct Answer: d

12.Articulates the profession’s philosophy and practice to the public

a. Theoretical Style

b. Intellectual Style

c. Committed Style

d. Ethical Style

Correct Answer: b

13.Can earn a fine or jail time

a. Breaking the law

b. Breaking an ethic

c. breaking a moral

d. none of these

Correct Answer: a

14.Can ruin your reputation

a. Breaking an ethic

b. Breaking the law

c. Breaking a moral

d. none of these

Correct Answer: a

15.Computer ethics has its roots in the work of ___ during World War II.

a. Norbert Wiener

b. Blaise Pascal

c. Charles Babbage

d. Hermen Horllerith

Correct Answer: a

16.Copyright and related rights

protection is an essential component

in fostering human creativity and

innovation

a. TRUE

b. FALSE

c.

d.

Correct Answer: a

17.Copyright law gives _________ exclusive rights to the owner of copyright

a. 2

b. 4

c. 6

d. 3

Correct Answer: c

18.Ethical Style is ________________?

a. Promises only what can be delivered

b. Deals honestly with others

c. Behaves unselfishly

d. Contributes to knowledge base

Correct Answer: b

19.General guidelines of computer ethics are needed for ____

a. Computer crime

b. Protection of personal data

c. Cracking

d. All of these

Correct Answer: d

20.Hackers try out all the combination of all keyboard letters

a. Brute force

b. Dictionary based

c. both a & b

d. none of these

Correct Answer: a

21.is a sign

used on goods that have a specific

geographical origin and possess

qualities or a reputation due

to that place of origin

a. intellectual property

b. ethics

c. Geographical

Indication

d. trade mark

Correct Answer: c

22.is defined as the right of a person to guide

a. democracy

b. freedom

c. responsibility

d. authority

Correct Answer: d

23.Making and using duplicate hardware and software is called ___

a. trade

b. Privacy

c. Free copy

d. copyright

Correct Answer: b

24.Patents are granted by national

patent offices or by regional

offices that carry out examination

work for a group of countries

a. TRUE

b. FALSE

c.

d.

Correct Answer: a

25.Plagiarism is…..?

a. turning in someone else’s work as your own

b. copying words or ideas from someone else without giving credit

c. failing to put a quotation in quotation marks

d. All of these

Correct Answer: d

26.Presents the theoretical foundation of ideas and actions

a. Theoretical Style

b. Committed Style

c. Ethical Style

d. Intellectual Style

Correct Answer: a

27.Recognizes professional biases

a. Ethical Style

b. Committed Style

c. Theoretical Style

d. Intellectual Style

Correct Answer: a

28.Responsible Style is ____________?

a. Behaves unselfishly

b. Contributes to knowledge base

c. Promises only what can be delivered

d. Deals honestly with others

Correct Answer: c

29.Rules that mandate or prohibit certain behavior in society

a. regulation

b. Law

c. rules

d. moral ethics

Correct Answer: b

30.Running other software on idle computer without the knowledge of the organization is called theft of ____

a. Computer time

b. Computer

c. software

d. hardware

Correct Answer: a

31.software can be protected by

a. trade mark

b. design Registry

c. copyright

d. patent

Correct Answer: c

32.Strives toward self-improvement

a. Intellectual Style

b. Ethical Style

c. Committed Style

d. Theoretical Style

Correct Answer: c

33.Taking control from the website owner

a. software Hacking

b. website hacker

c. Net Hacking

d. Password Hacking

Correct Answer: b

34.Tester is told everything about the network topology and technology and is authorized to interview IT personnel

a. red box model

b. white box model

c. Black box model

d. gray box model

Correct Answer: b

35.The code of behavior and courtesy is__________

a. rules

b. Ethics

c. moral

d. laws

Correct Answer: b

36.The hardware or a process used in its manufacture may be protected by a

a. copyright

b. Design Registry

c. patent

d. trade mark

Correct Answer: c

37.The look of the product may be registered in the

a. copyright

b. trade mark

c. patent

d. Designs Registry

Correct Answer: d

38.The name under which a product is sold may be registered as a

a. copyright

b. Designs Registry

c. trade mark

d. patent

Correct Answer: c

39.The protection of hardware, facilities magnetic disks, and other illegally accessed, stolen, damaged or destroyed items refers to ____

a. Physical security

b. Personal security

c. Personnel security

d. none of these

Correct Answer: a

40.the quest to maximize profitability should be contrained by

a. ethical obligations

b. stakeholders

c. unethical obligations

d. lack of social responsibility

Correct Answer: a

41.The transition to —————- is generally an ambiguous concept for students at this stage in

spite of many great ideas that occupies their minds.

a. entrepreneurship

b. intellectual property rights

c. trade mark

d. none of these

Correct Answer: a

42.Theoretical Style is _____________?

a. Promises only what can be delivered

b. Contributes to knowledge base

c. Behaves unselfishly

d. Deals honestly with others

Correct Answer: b

43.Traits of a Profession

a. regulation

b. Personal standards of excellence

c. rules

d. moral ethics

Correct Answer: b

44.what are the ethical and social issues?

a. Privacy and Confidentiality

b. free data

c. unauthorized data

d. none of these

Correct Answer: a

45.What are the roles in the protection of geographical indications

a. WIPO’s

b. PIOW’s

c. WOIP’s

d. IOPW’s

Correct Answer: a

46.What kinds of trademarks

can be registered

a. one or a combination of words

b. letters

c. numerals

d. All of these

Correct Answer: d

47.Which of the following is not a way of protection?

a. Personnel security

b. physical security

c. personal security

d. Piracy

Correct Answer: d

48.Which of the following is not related to security mechanism

a. ecash

b. encryption

c. decryption

d. all of these

Correct Answer: a

49.Who among the following began to examine unethical and illegal uses of computers by computer professionals in mid 1960s Menlo Park, California?

a. willion

b. Donn Parker

c. Norbert Wiener

d. Bill Gates

Correct Answer: b

50.You can protect sensitive data from prying eyes using

a. Password Hacking

b. encryption

c. file permission

d. file locks

Correct Answer: c