Professional Documents
Culture Documents
Select one:
a. laws
b. computer ethics
c. ethics
d. Morals
Feedback
Question 2
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. phone phreaking
b. salami slicing
c. All of these are types of computer crime
d. dumpster diving
Feedback
The correct answer is: All of these are types of computer crime
Question 3
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is concerned with that information an individual should have to reveal to others
through the course of employment or though other transactions such as online
shopping?
Select one:
a. computer crime
b. digital divide
c. information privacy
d. Ethics
Feedback
Question 4
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
In the Software Engineering Code of Ethics and Professional Practice which area falls
under the heading of professional performance?
Select one:
a. Profession
b. Public
c. Management
d. Judgment
Feedback
Question 5
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The analysis of the nature and social impact of computer technology as well as the
corresponding formulation and justification of policies for the ethical use of such
technology is referred to as:
Select one:
a. computer ethics
b. corporate credo
c. ethical code
d. ethics
Feedback
Question 6
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. morals
b. character
c. laws
d. ethics
Feedback
Question 7
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A technology used to foil data snooping when the entire network does not consist of a
secure channel is called
Select one:
a. authentication
b. None of these
c. encryption
d. Biometrics
Feedback
Question 8
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. Inventions that feature some sort of utility function
b. Only brand names
c. Words, symbols or devices that differentiate goods or services from one another.
The correct answer is: Words, symbols or devices that differentiate goods or services
from one another.
Question 9
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Self-efficacy is one of the main components of self-esteem. If a person has high self-
efficacy he/she is likely to
Select one:
a. Ask for a considerable amount of help in determining how to start a difficult project.
b. Believe that he/she has the ability to do what necessary to accomplish the task.
c. Believe that most assignments are difficult and confusing.
d. Feel that he/she lacks the skills necessary to carryout a specific task.
Feedback
The correct answer is: Believe that he/she has the ability to do what necessary to
accomplish the task.
Question 10
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of these may represent a threat to a user's privacy from visiting Websites?
Select one:
a. tags
b. crawlers
c. Cookies
d. worms
Feedback
Question 11
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Ethical issues in public relations would not include which of the following?
Select one:
a. Protecting the privacy rights of clients.
b. Hiring an assassin to silence opponents.
c. Lying by omission or giving a misleading impression.
Question 12
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A mark that is used by a form for the purposes of distinguishing its goods and services
from those of another firm is called
Select one:
a. a patent
b. a trademark
c. a copyright
d. a logo
Feedback
Question 13
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A company wishes to ensure that no one else can use their logo.
Select one:
a. Copy rights
b. Industrial designs
c. Trade mark
d. Patent
Feedback
Question 14
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of these is employed in user authentication and may employ scans of fingerprints,
irises, or voices?
Select one:
a. Bionics
b. encoding
c. Encryption
d. Biometrics
Feedback
Question 15
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The altering of data so that it is not usable unless the changes are undone is
Select one:
a. ergonomics
b. compression
c. encryption
d. biometrics
Feedback
Question 16
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. information property
b. Trademark
c. Patent
d. Copyright
Feedback
Question 17
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
A person who breaks into a computer to cause damage or to steal something is called a
Select one:
a. None of these
b. cracker
c. hacker
d. spammer
Feedback
Question 18
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. hacker
b. cracker
c. None of these
d. spammer
Feedback
Question 19
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A company decides to use a logo that has the same shape as its competitor but with a
different color. It is a violation of:
Select one:
a. Trade mark
b. Copy rights
c. Industrial designs
d. Patent
Feedback
Question 20
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Formal rules of conduct that a sovereign authority, such as a government, imposes on its
subjects or citizens are:
Select one:
a. ethics
b. computer ethics
c. laws
d. morals
Feedback
Question 21
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
A new way to process milk so that there is no fat in any cheese made from it is covered
under:
Select one:
a. Industrial designs
b. Patent
c. Trade mark
d. Copy rights
Feedback
Question 22
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A ------- is a computer program that can invade computer and perform a variety of
functions ranging from annoying(e.g. popping up messages as a joke) to dangerous (e.g.
deleting files or destroying your hard disk).
Select one:
a. Antivirus
b. Ms Access
c. Ms Word
d. Computer Virus
Feedback
Flag question
Question text
A singer wishes to assign the rights to reproduce a video she has made of her concert.
Select one:
a. Copy rights
b. Industrial designs
c. Trade mark
d. Patent
Feedback
Question 24
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Ethical issues in entertainment media would not include which of the following?
Select one:
a. All of the above.
b. Actors portraying characters in stereotypical roles in TV shows or movies.
c. Product placements in children's programs on TV.
Question 25
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following is a private Search-engine and do not track our searching data?
Select one:
a. Google
b. Search Encrypt
c. Yahoo
d. Bing
Feedback
Question 26
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Select one:
a. Talk and socialize frequently with people who boost your self-esteem.
b. Take action to become aware of your personal strengths.
c. All of the above are ways to enhance one's self-esteem.
d. Minimize settings and interactions that detract from your feelings of competence.
Feedback
The correct answer is: All of the above are ways to enhance one's self-esteem.
Question 27
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
The major benefits of studying human relations involves all of the following except:
Select one:
a. Acquiring invalid information about human relation.
b. Coping with job problems
c. Coping with personal problems.
Question 28
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. Digital privacy
b. Digital protection
c. Digital Integrity
d. Digital secrecy
Feedback
Question 29
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Select one:
a. time bomb
b. trojan horse
c. time related bomb sequence
d. virus
Feedback
Question 30
Correct
Mark 1.00 out of 1.00
Flag question
Question text
It is reported that people who have high self-esteem themselves can generally increase
your self-esteem because these individuals usually
Select one:
a. Respect others.
b. All of the above are correct.
c. Give honest feedback.
d. Respect themselves.
Feedback
Question 31
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. employees
b. outside hackers/crackers
c. competitors
d. None of these
Feedback
Question 32
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. Digital agony
b. Digital secrecy
c. Digital protection
d. Digital privacy
Feedback
Question 33
Correct
Mark 1.00 out of 1.00
Flag question
Question text
-------- are often delivered to a PC through an email attachment and are often designed
to do harm.
Select one:
a. Virus
b. Portals
c. Email
d. Spam
Feedback
Question 34
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Another component of self-esteem is self-respect. This refers to how you think and feel
about yourself. A person with high self-esteem would also have high self-respect and
could be expected to exhibit the following behaviors:
Select one:
a. Stay in relationships where one is mentally or physically abused.
b. Highly self absorbed with personal interests.
c. Focus on the needs of others
d. Beg others for things that could be obtained from one's own efforts.
Feedback
Question 35
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A company has decided to invest in outer shape design of bottle in which they would fill
the perfume produced by them, and which is distinctive, and they wish to ensure that
they have sole use.
Select one:
a. Industrial designs
b. Copy rights
c. Patent
d. Trade mark
Feedback
Question 36
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The gap between those individuals in our society who are computer literate and have
access to information resources like the Internet and those who do not is referred to as
the
Select one:
a. digital divide
b. privacy divide
c. computer crime
d. computer literacy
Feedback
The correct answer is: privacy divide
Question 37
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. Basic human behavior.
b. Human relations principles.
c. Yourself.
Question 38
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is the science of human duty that encompasses a system of principles and rules
cornering duty?
Select one:
a. systems development and design
b. digital divide
c. ethics
d. information privacy
Feedback
The correct answer is: ethics
Question 39
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Your body image, or your perception of your body, also contributes to your self-concept.
Having a __________body image is related to feeling confident in jobs where customer
contact is required
Select one:
a. Negative
b. Positive
c. Neutral
d. Unfavorable
Feedback
Question 40
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. Uninstall Antivirus
b. Use private Browser-window
c. Disable cookies
d. Use privacy-focussed SE
Feedback
The correct answer is: Uninstall Antivirus
Select one:
a. The person who created the work wanted to register their name so they could
become famous
b. Since young people don’t have much money, it’s okay to copy anything
c. As long as you buy it, you can make as many copies as you want
Question 2
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Select one:
a. Inventions
b. Paintings
c. Signatures
d. Clothing designs
Feedback
Flag question
Question text
Select one:
a. A party knowingly makes false statements to induce another party into a contract
b. A party unknowingly provides false information about a portion of a contract
c. A party is coerced into signing a contract by means of intimidation
Question 4
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Select one:
a. Reviewing the work of another member with that member’s consent
b. Signing plans prepared by an unknown person without thoroughly reviewing those
plans
c. Providing professional services as a consultant
Question 5
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Select one:
a. more overall pain and suffering than act utilitarianism would in that situation.
b. All the options
c. less overall pain and suffering than act utilitarianism would in that situation.
Question 6
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Select one:
a. Using the computer catalog in the media center to search for a book
b. Breaking into a government database and reading confidential information
c. Changing a misspelled word on the school’s web site
d. Going into the main office at school and changing your grades
Feedback
Question 7
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Select one:
a. virus.
b. Trojan Horse.
c. None of these.
d. worm.
Feedback
Question 8
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A mark that is used by a form for the purposes of distinguishing its goods and services
from those of another firm is called
Select one:
a. logo
b. trademark
c. copyright
d. patent.
Feedback
Question 9
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Select one:
a. outside hackers/crackers.
b. None of these.
c. competitors
d. employees.
Feedback
Question 10
Correct
Mark 1.00 out of 1.00
Flag question
Question text
In what way might a believer in divine command theory argue that belief in God is
different than belief in a sea monster?
Select one:
a. God's existence can be proven with physical evidence while there is no evidence of a
sea monster.
b. All of the answers are correct.
c. God is more than just one individual object or creature. God is the nature of the
universe.
Question 11
Correct
Mark 1.00 out of 1.00
Flag question
Question text
If you want to use one program on thirty different computers, you should
Select one:
a. Buy one copy and put it on all the computers
b. Borrow it from another school, copy it, and send it back promptly
c. Buy two copies, in case one becomes damaged, and load it on all the computers
Flag question
Question text
Select one:
a. Maintain professional standards in practice
b. Pursue continuing educational opportunities
c. Provide clients with frequent progress reports
Question 13
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Select one:
a. Are out to destroy other people’s computer systems
b. Access databases that they have no right to be in
c. Create programs intending to destroy other computer systems
d. All of the above
Question 14
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
A person who breaks into a computer to cause damage or to steal something is called a
Select one:
a. None of these
b. hacker.
c. cracker.
d. spammer.
Feedback
Question 15
Correct
Mark 1.00 out of 1.00
Flag question
Question text
All of the answers below are advantages to buying your own software EXCEPT
Select one:
a. Getting expert help from the software company.
b. Having instruction manuals or documentation
c. Giving free copies to your friends.
Question 16
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. phone phreaking
b. All of these are types of computer crime
c. salami slicing
d. dumpster diving
Feedback
Question 17
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Select one:
a. People will get what they deserve in the end - punishment or reward.
b. God provides a good explanation for the existence of feelings of obligation.
c. The origins of morality can be identified.
Question 18
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
What is concerned with that information an individual should have to reveal to others
through the course of employment or though other transactions such as online
shopping?
Select one:
a. information privacy
b. digital divide
c. ethics
d. computer crime
Feedback
Question 19
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Which of the following is the most common job activity of top-level managers?
Select one:
a. Directing and interacting with people
b. Writing and reading corporate financial reports
c. Designing and implementing production systems
Question 20
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
The professional’s standard of care and skill establishes the point at which a professional:
Select one:
a. May or may not charge a fee for services
b. Has met the minimum requirements for registration
c. May be judged negligent in the performance of services
Question 21
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A person who breaks into a computer for fun or curiosity is called a
Select one:
a. None of these.
b. cracker.
c. hacker.
d. spammer.
Feedback
Question 22
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Select one:
a. small
b. specific
c. mixed
d.
large
Feedback
Question 23
Correct
Mark 1.00 out of 1.00
Flag question
Question text
On a school computer, Mary learned how to copy programs. A classmate asked her to
copy a program for his home use. Her most ethical response would be which of the
following?
Select one:
a. I don’t know how to copy diskettes
b. I’ll copy it for you, but you can’t copy it for anyone else
c. I’ll copy it, but you have to promise not to tell anybody
Question 24
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. patent
b. information property
c. copyright
d. trademark
Feedback
Your answer is correct.
The correct answer is: patent
Question 25
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. necessary and apply to all rational beings.
b. culturally relative.
c. contingent and apply only to human beings.
Question 26
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
The gap between those individuals in our society who are computer literate and have
access to information resources like the Internet and those who do not is referred to as
the
Select one:
a. privacy divide
b. digital divide.
c. computer literacy.
d. computer crime.
Feedback
Question 27
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. Using a gift registry online to pick out a gift for someone getting married
b. Opening America Online using someone else’s screen name and password
c. Accessing your banking statement online
Question 28
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
The objection that, by following rule utilitarianism, we will sometimes fail to maximize
utility in specific situations is called the __________ objection.
Select one:
a. justice
b. dilemma
c. inconsistency
d. collapse
Feedback
Question 29
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
What is the science of human duty that encompasses a system of principles and rules
cornering duty?
Select one:
a. information privacy
b. digital divide
c. systems development and design
d. ethics
Feedback
Question 30
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. extensions to animals
b. worries about hedonism
c. the calculation problem