1.Literal meaning listening or spying secretly
a. Output frauds
b. computer hacking
c. Eavesdropping
d. Input frauds
Correct Answer: c
2.____ is a self- replicating program that can cause damage to data and files stored on your computer.
a. Freeware
b. Piracy
c. errors
d. Virus
Correct Answer: d
3.____ is a set of rules for determining moral standards or socially acceptable behaviour.
a. rules
b. Ethics
c. Standard
d. protocol
Correct Answer: b
4.____ is the illegal access to the network or computer system.
a. security
b. Cracking
c. privacy
d. virus
Correct Answer: b
5.____ refers to software setups that permit only authorized access to the system.
a. Personal security
b. Physical security
c. physical security
d. none of these
Correct Answer: a
6._____ refers to protecting data and computer system against dishonesty or negligence of employees.
a. prosonnel security
b. physical security
c. Personol security
d. none of these
Correct Answer: a
7._______________is defined as the duty,obligation or even authority.
a. democracy
b. authority
c. responsibility
d. work
Correct Answer: c
8.“Cracking” comes under ____
a. Transcription
b. Computer Crime
c. Website Service
d. Data Security
Correct Answer: b
9.A hacker contacts your phone or E-mail and attempts to acquire your password is called
a. Phishing
b. Spoofing
c. Spamming
d. none of these
Correct Answer: a
10.A trademark is a distinctive sign
that identifies certain goods or
services produced or provided by
an individual or a company
a. TRUE
b. FALSE
c.
d.
Correct Answer: a
11.Altruistic Style is ________________?
a. Promises only what can be delivered
b. Deals honestly with others
c. Contributes to knowledge base
d. Behaves unselfishly
Correct Answer: d
12.Articulates the profession’s philosophy and practice to the public
a. Theoretical Style
b. Intellectual Style
c. Committed Style
d. Ethical Style
Correct Answer: b
13.Can earn a fine or jail time
a. Breaking the law
b. Breaking an ethic
c. breaking a moral
d. none of these
Correct Answer: a
14.Can ruin your reputation
a. Breaking an ethic
b. Breaking the law
c. Breaking a moral
d. none of these
Correct Answer: a
15.Computer ethics has its roots in the work of ___ during World War II.
a. Norbert Wiener
b. Blaise Pascal
c. Charles Babbage
d. Hermen Horllerith
Correct Answer: a
16.Copyright and related rights
protection is an essential component
in fostering human creativity and
innovation
a. TRUE
b. FALSE
c.
d.
Correct Answer: a
17.Copyright law gives _________ exclusive rights to the owner of copyright
a. 2
b. 4
c. 6
d. 3
Correct Answer: c
18.Ethical Style is ________________?
a. Promises only what can be delivered
b. Deals honestly with others
c. Behaves unselfishly
d. Contributes to knowledge base
Correct Answer: b
19.General guidelines of computer ethics are needed for ____
a. Computer crime
b. Protection of personal data
c. Cracking
d. All of these
Correct Answer: d
20.Hackers try out all the combination of all keyboard letters
a. Brute force
b. Dictionary based
c. both a & b
d. none of these
Correct Answer: a
21.is a sign
used on goods that have a specific
geographical origin and possess
qualities or a reputation due
to that place of origin
a. intellectual property
b. ethics
c. Geographical
Indication
d. trade mark
Correct Answer: c
22.is defined as the right of a person to guide
a. democracy
b. freedom
c. responsibility
d. authority
Correct Answer: d
23.Making and using duplicate hardware and software is called ___
a. trade
b. Privacy
c. Free copy
d. copyright
Correct Answer: b
24.Patents are granted by national
patent offices or by regional
offices that carry out examination
work for a group of countries
a. TRUE
b. FALSE
c.
d.
Correct Answer: a
25.Plagiarism is…..?
a. turning in someone else’s work as your own
b. copying words or ideas from someone else without giving credit
c. failing to put a quotation in quotation marks
d. All of these
Correct Answer: d
26.Presents the theoretical foundation of ideas and actions
a. Theoretical Style
b. Committed Style
c. Ethical Style
d. Intellectual Style
Correct Answer: a
27.Recognizes professional biases
a. Ethical Style
b. Committed Style
c. Theoretical Style
d. Intellectual Style
Correct Answer: a
28.Responsible Style is ____________?
a. Behaves unselfishly
b. Contributes to knowledge base
c. Promises only what can be delivered
d. Deals honestly with others
Correct Answer: c
29.Rules that mandate or prohibit certain behavior in society
a. regulation
b. Law
c. rules
d. moral ethics
Correct Answer: b
30.Running other software on idle computer without the knowledge of the organization is called theft of ____
a. Computer time
b. Computer
c. software
d. hardware
Correct Answer: a
31.software can be protected by
a. trade mark
b. design Registry
c. copyright
d. patent
Correct Answer: c
32.Strives toward self-improvement
a. Intellectual Style
b. Ethical Style
c. Committed Style
d. Theoretical Style
Correct Answer: c
33.Taking control from the website owner
a. software Hacking
b. website hacker
c. Net Hacking
d. Password Hacking
Correct Answer: b
34.Tester is told everything about the network topology and technology and is authorized to interview IT personnel
a. red box model
b. white box model
c. Black box model
d. gray box model
Correct Answer: b
35.The code of behavior and courtesy is__________
a. rules
b. Ethics
c. moral
d. laws
Correct Answer: b
36.The hardware or a process used in its manufacture may be protected by a
a. copyright
b. Design Registry
c. patent
d. trade mark
Correct Answer: c
37.The look of the product may be registered in the
a. copyright
b. trade mark
c. patent
d. Designs Registry
Correct Answer: d
38.The name under which a product is sold may be registered as a
a. copyright
b. Designs Registry
c. trade mark
d. patent
Correct Answer: c
39.The protection of hardware, facilities magnetic disks, and other illegally accessed, stolen, damaged or destroyed items refers to ____
a. Physical security
b. Personal security
c. Personnel security
d. none of these
Correct Answer: a
40.the quest to maximize profitability should be contrained by
a. ethical obligations
b. stakeholders
c. unethical obligations
d. lack of social responsibility
Correct Answer: a
41.The transition to —————- is generally an ambiguous concept for students at this stage in
spite of many great ideas that occupies their minds.
a. entrepreneurship
b. intellectual property rights
c. trade mark
d. none of these
Correct Answer: a
42.Theoretical Style is _____________?
a. Promises only what can be delivered
b. Contributes to knowledge base
c. Behaves unselfishly
d. Deals honestly with others
Correct Answer: b
43.Traits of a Profession
a. regulation
b. Personal standards of excellence
c. rules
d. moral ethics
Correct Answer: b
44.what are the ethical and social issues?
a. Privacy and Confidentiality
b. free data
c. unauthorized data
d. none of these
Correct Answer: a
45.What are the roles in the protection of geographical indications
a. WIPO’s
b. PIOW’s
c. WOIP’s
d. IOPW’s
Correct Answer: a
46.What kinds of trademarks
can be registered
a. one or a combination of words
b. letters
c. numerals
d. All of these
Correct Answer: d
47.Which of the following is not a way of protection?
a. Personnel security
b. physical security
c. personal security
d. Piracy
Correct Answer: d
48.Which of the following is not related to security mechanism
a. ecash
b. encryption
c. decryption
d. all of these
Correct Answer: a
49.Who among the following began to examine unethical and illegal uses of computers by computer professionals in mid 1960s Menlo Park, California?
a. willion
b. Donn Parker
c. Norbert Wiener
d. Bill Gates
Correct Answer: b
50.You can protect sensitive data from prying eyes using
a. Password Hacking
b. encryption
c. file permission
d. file locks
Correct Answer: c