You are on page 1of 37

Traditions of belief about right and wrong conduct are:

Select one:
a. laws
b. computer ethics
c. ethics 

d. Morals
Feedback

The correct answer is: Morals

Question 2
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which of these is not a computer crime?

Select one:
a. phone phreaking
b. salami slicing
c. All of these are types of computer crime 

d. dumpster diving
Feedback

The correct answer is: All of these are types of computer crime

Question 3
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is concerned with that information an individual should have to reveal to others
through the course of employment or though other transactions such as online
shopping?

Select one:
a. computer crime
b. digital divide
c. information privacy 

d. Ethics
Feedback

The correct answer is: information privacy

Question 4
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

In the Software Engineering Code of Ethics and Professional Practice which area falls
under the heading of professional performance?

Select one:
a. Profession 
b. Public
c. Management

d. Judgment
Feedback

The correct answer is: Judgment

Question 5
Correct
Mark 1.00 out of 1.00

Flag question
Question text

The analysis of the nature and social impact of computer technology as well as the
corresponding formulation and justification of policies for the ethical use of such
technology is referred to as:

Select one:
a. computer ethics 
b. corporate credo
c. ethical code

d. ethics
Feedback

The correct answer is: computer ethics

Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text

A suite of guiding beliefs, standards, or ideals that pervades an individual or a group or


community of people refers to:

Select one:
a. morals 
b. character
c. laws

d. ethics
Feedback

The correct answer is: morals

Question 7
Correct
Mark 1.00 out of 1.00
Flag question

Question text

A technology used to foil data snooping when the entire network does not consist of a
secure channel is called

Select one:
a. authentication
b. None of these
c. encryption 

d. Biometrics
Feedback

The correct answer is: encryption

Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Select one:
a. Inventions that feature some sort of utility function
b. Only brand names
c. Words, symbols or devices that differentiate goods or services from one another. 

d. Names of specific people and places


Feedback

The correct answer is: Words, symbols or devices that differentiate goods or services
from one another.

Question 9
Correct
Mark 1.00 out of 1.00
Flag question

Question text

Self-efficacy is one of the main components of self-esteem. If a person has high self-
efficacy he/she is likely to

Select one:
a. Ask for a considerable amount of help in determining how to start a difficult project.
b. Believe that he/she has the ability to do what necessary to accomplish the task. 
c. Believe that most assignments are difficult and confusing.

d. Feel that he/she lacks the skills necessary to carryout a specific task.
Feedback

The correct answer is: Believe that he/she has the ability to do what necessary to
accomplish the task.

Question 10
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which of these may represent a threat to a user's privacy from visiting Websites?

Select one:
a. tags
b. crawlers
c. Cookies 

d. worms
Feedback

The correct answer is: Cookies

Question 11
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Ethical issues in public relations would not include which of the following?

Select one:
a. Protecting the privacy rights of clients.
b. Hiring an assassin to silence opponents. 
c. Lying by omission or giving a misleading impression.

d. Safeguarding a client's confidential information.


Feedback

The correct answer is: Hiring an assassin to silence opponents.

Question 12
Correct
Mark 1.00 out of 1.00

Flag question

Question text

A mark that is used by a form for the purposes of distinguishing its goods and services
from those of another firm is called

Select one:
a. a patent
b. a trademark 
c. a copyright

d. a logo
Feedback

The correct answer is: a trademark

Question 13
Correct
Mark 1.00 out of 1.00
Flag question

Question text

A company wishes to ensure that no one else can use their logo.

Select one:
a. Copy rights
b. Industrial designs
c. Trade mark 

d. Patent
Feedback

The correct answer is: Trade mark

Question 14
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which of these is employed in user authentication and may employ scans of fingerprints,
irises, or voices?

Select one:
a. Bionics
b. encoding
c. Encryption

d. Biometrics 
Feedback

The correct answer is: Biometrics

Question 15
Correct
Mark 1.00 out of 1.00
Flag question

Question text

The altering of data so that it is not usable unless the changes are undone is

Select one:
a. ergonomics
b. compression
c. encryption 

d. biometrics
Feedback

The correct answer is: encryption

Question 16
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is a right to exclusively manufacture an invention for a specified time?

Select one:
a. information property
b. Trademark
c. Patent 

d. Copyright
Feedback

The correct answer is: Patent

Question 17
Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

A person who breaks into a computer to cause damage or to steal something is called a

Select one:
a. None of these
b. cracker
c. hacker 

d. spammer
Feedback

The correct answer is: cracker

Question 18
Correct
Mark 1.00 out of 1.00

Flag question

Question text

A person who breaks into a computer for fun or curiosity is called a

Select one:
a. hacker 
b. cracker
c. None of these

d. spammer
Feedback

The correct answer is: hacker

Question 19
Correct
Mark 1.00 out of 1.00
Flag question

Question text

A company decides to use a logo that has the same shape as its competitor but with a
different color. It is a violation of:

Select one:
a. Trade mark 
b. Copy rights
c. Industrial designs

d. Patent
Feedback

The correct answer is: Trade mark

Question 20
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Formal rules of conduct that a sovereign authority, such as a government, imposes on its
subjects or citizens are:

Select one:
a. ethics
b. computer ethics
c. laws 

d. morals
Feedback

The correct answer is: laws

Question 21
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

A new way to process milk so that there is no fat in any cheese made from it is covered
under:

Select one:
a. Industrial designs
b. Patent 
c. Trade mark

d. Copy rights
Feedback

The correct answer is: Copy rights

Question 22
Correct
Mark 1.00 out of 1.00

Flag question

Question text

A ------- is a computer program that can invade computer and perform a variety of
functions ranging from annoying(e.g. popping up messages as a joke) to dangerous (e.g.
deleting files or destroying your hard disk).

Select one:
a. Antivirus
b. Ms Access
c. Ms Word

d. Computer Virus 
Feedback

The correct answer is: Computer Virus


Question 23
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

A singer wishes to assign the rights to reproduce a video she has made of her concert.

Select one:
a. Copy rights 
b. Industrial designs
c. Trade mark

d. Patent
Feedback

The correct answer is: Patent

Question 24
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Ethical issues in entertainment media would not include which of the following?

Select one:
a. All of the above. 
b. Actors portraying characters in stereotypical roles in TV shows or movies.
c. Product placements in children's programs on TV.

d. Gratuitous depictions of sex or violence in TV shows or movies.


Feedback

The correct answer is: All of the above.

Question 25
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which of the following is a private Search-engine and do not track our searching data?

Select one:
a. Google
b. Search Encrypt 
c. Yahoo

d. Bing
Feedback

The correct answer is: Search Encrypt

Question 26
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

All of the following are suggested ways of enhancing/developing one's self-esteem


except:

Select one:
a. Talk and socialize frequently with people who boost your self-esteem. 
b. Take action to become aware of your personal strengths.
c. All of the above are ways to enhance one's self-esteem.

d. Minimize settings and interactions that detract from your feelings of competence.
Feedback

The correct answer is: All of the above are ways to enhance one's self-esteem.

Question 27
Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

The major benefits of studying human relations involves all of the following except:

Select one:
a. Acquiring invalid information about human relation. 
b. Coping with job problems
c. Coping with personal problems.

d. Developing skills in dealing with people


Feedback

The correct answer is: Coping with personal problems.

Question 28
Correct
Mark 1.00 out of 1.00

Flag question

Question text

_______________ is a combined term which encompasses 3 sub-pillars; information privacy,


individual privacy, and communication privacy.

Select one:
a. Digital privacy 
b. Digital protection
c. Digital Integrity

d. Digital secrecy
Feedback

The correct answer is: Digital privacy

Question 29
Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

When a logic bomb is activated by a time related event, it is known as -------

Select one:
a. time bomb
b. trojan horse
c. time related bomb sequence 

d. virus
Feedback

The correct answer is: trojan horse

Question 30
Correct
Mark 1.00 out of 1.00

Flag question

Question text

It is reported that people who have high self-esteem themselves can generally increase
your self-esteem because these individuals usually

Select one:
a. Respect others.
b. All of the above are correct. 
c. Give honest feedback.

d. Respect themselves.
Feedback

The correct answer is: All of the above are correct.

Question 31
Correct
Mark 1.00 out of 1.00
Flag question

Question text

The group that is most likely to be behind a computer security breach is

Select one:
a. employees 
b. outside hackers/crackers
c. competitors

d. None of these
Feedback

The correct answer is: employees

Question 32
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Select one:
a. Digital agony
b. Digital secrecy
c. Digital protection

d. Digital privacy 
Feedback

The correct answer is: Digital privacy

Question 33
Correct
Mark 1.00 out of 1.00
Flag question

Question text

-------- are often delivered to a PC through an email attachment and are often designed
to do harm.

Select one:
a. Virus 
b. Portals
c. Email

d. Spam
Feedback

The correct answer is: Virus

Question 34
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Another component of self-esteem is self-respect. This refers to how you think and feel
about yourself. A person with high self-esteem would also have high self-respect and
could be expected to exhibit the following behaviors:

Select one:
a. Stay in relationships where one is mentally or physically abused.
b. Highly self absorbed with personal interests.
c. Focus on the needs of others 

d. Beg others for things that could be obtained from one's own efforts.
Feedback

The correct answer is: Focus on the needs of others

Question 35
Correct
Mark 1.00 out of 1.00

Flag question

Question text

A company has decided to invest in outer shape design of bottle in which they would fill
the perfume produced by them, and which is distinctive, and they wish to ensure that
they have sole use.

Select one:
a. Industrial designs
b. Copy rights
c. Patent

d. Trade mark 
Feedback

The correct answer is: Trade mark

Question 36
Correct
Mark 1.00 out of 1.00

Flag question

Question text

The gap between those individuals in our society who are computer literate and have
access to information resources like the Internet and those who do not is referred to as
the

Select one:
a. digital divide
b. privacy divide 
c. computer crime

d. computer literacy
Feedback
The correct answer is: privacy divide

Question 37
Correct
Mark 1.00 out of 1.00

Flag question

Question text

The first step in understanding others is to begin by getting an understanding of

Select one:
a. Basic human behavior.
b. Human relations principles.
c. Yourself. 

d. Basic cognitive psychology.


Feedback

The correct answer is: Yourself.

Question 38
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is the science of human duty that encompasses a system of principles and rules
cornering duty?

Select one:
a. systems development and design
b. digital divide
c. ethics 

d. information privacy
Feedback
The correct answer is: ethics

Question 39
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

Your body image, or your perception of your body, also contributes to your self-concept.
Having a __________body image is related to feeling confident in jobs where customer
contact is required

Select one:
a. Negative
b. Positive 
c. Neutral

d. Unfavorable
Feedback

The correct answer is: Negative

Question 40
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which of the following is not an appropriate solution for preserving privacy?

Select one:
a. Uninstall Antivirus 
b. Use private Browser-window
c. Disable cookies

d. Use privacy-focussed SE
Feedback
The correct answer is: Uninstall Antivirus

What does it mean if something has a copyright symbol?

Select one:
a. The person who created the work wanted to register their name so they could
become famous
b. Since young people don’t have much money, it’s okay to copy anything
c. As long as you buy it, you can make as many copies as you want 

d. It is the work and property of the person who created it


Feedback

Your answer is incorrect.


The correct answer is: It is the work and property of the person who created it

Question 2
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

Which type of original work below is automatically protected by copyright upon


creation?

Select one:
a. Inventions
b. Paintings
c. Signatures 

d. Clothing designs
Feedback

Your answer is incorrect.


The correct answer is: Paintings
Question 3
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

Which of the following is an example of a fraudulent, contractual misrepresentation?

Select one:
a. A party knowingly makes false statements to induce another party into a contract
b. A party unknowingly provides false information about a portion of a contract 
c. A party is coerced into signing a contract by means of intimidation

d. A party induces his son-in-law to sign an unfair contract


Feedback

Your answer is incorrect.


The correct answer is: A party knowingly makes false statements to induce another party
into a contract

Question 4
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

According to most Provincial and Territorial Acts, which activity by a professional


member would be considered UNETHICAL?

Select one:
a. Reviewing the work of another member with that member’s consent
b. Signing plans prepared by an unknown person without thoroughly reviewing those
plans
c. Providing professional services as a consultant 

d. Not charging a fee for presenting a speech


Feedback
Your answer is incorrect.
The correct answer is: Signing plans prepared by an unknown person without thoroughly
reviewing those plans

Question 5
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

Following rule utilitarianism in a given situation can sometimes produce

Select one:
a. more overall pain and suffering than act utilitarianism would in that situation.
b. All the options 
c. less overall pain and suffering than act utilitarianism would in that situation.

d. would most increase the overall utility in that situation.


Feedback

Your answer is incorrect.


The correct answer is: more overall pain and suffering than act utilitarianism would in
that situation.

Question 6
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

Which of the following would be considered ethical access of a computer database?

Select one:
a. Using the computer catalog in the media center to search for a book
b. Breaking into a government database and reading confidential information
c. Changing a misspelled word on the school’s web site

d. Going into the main office at school and changing your grades 
Feedback

Your answer is incorrect.


The correct answer is: Using the computer catalog in the media center to search for a
book

Question 7
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

A malicious program that copies itself from computer to computer is called a

Select one:
a. virus. 
b. Trojan Horse.
c. None of these.

d. worm.
Feedback

Your answer is incorrect.


The correct answer is: worm.

Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A mark that is used by a form for the purposes of distinguishing its goods and services
from those of another firm is called

Select one:
a. logo
b. trademark 
c. copyright

d. patent.
Feedback

Your answer is correct.


The correct answer is: trademark

Question 9
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

The group that is most likely to be behind a computer security breach is

Select one:
a. outside hackers/crackers. 
b. None of these.
c. competitors

d. employees.
Feedback

Your answer is incorrect.


The correct answer is: employees.

Question 10
Correct
Mark 1.00 out of 1.00

Flag question
Question text

In what way might a believer in divine command theory argue that belief in God is
different than belief in a sea monster?

Select one:
a. God's existence can be proven with physical evidence while there is no evidence of a
sea monster.
b. All of the answers are correct. 
c. God is more than just one individual object or creature. God is the nature of the
universe.

d. Belief in God is actually no different than belief in a sea monster.


Feedback

Your answer is correct.


The correct answer is: All of the answers are correct.

Question 11
Correct
Mark 1.00 out of 1.00

Flag question

Question text

If you want to use one program on thirty different computers, you should

Select one:
a. Buy one copy and put it on all the computers
b. Borrow it from another school, copy it, and send it back promptly
c. Buy two copies, in case one becomes damaged, and load it on all the computers

d. Purchase a site license or buy enough copies for every computer 


Feedback

Your answer is correct.


The correct answer is: Purchase a site license or buy enough copies for every computer
Question 12
Correct
Mark 1.00 out of 1.00

Flag question

Question text

To effectively reduce liability exposure, the professional engineer or geoscientist should:

Select one:
a. Maintain professional standards in practice 
b. Pursue continuing educational opportunities
c. Provide clients with frequent progress reports

d. Work under the supervision of a senior engineer or geoscientist


Feedback

Your answer is correct.

Question 13
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

Hackers are unethical people who

Select one:
a. Are out to destroy other people’s computer systems
b. Access databases that they have no right to be in
c. Create programs intending to destroy other computer systems
d. All of the above

e. Do not respect the rights or privacy of others 


Feedback

Your answer is incorrect.


The correct answer is: All of the above

Question 14
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

A person who breaks into a computer to cause damage or to steal something is called a

Select one:
a. None of these
b. hacker. 
c. cracker.

d. spammer.
Feedback

Your answer is incorrect.


The correct answer is: cracker.

Question 15
Correct
Mark 1.00 out of 1.00

Flag question

Question text

All of the answers below are advantages to buying your own software EXCEPT

Select one:
a. Getting expert help from the software company.
b. Having instruction manuals or documentation
c. Giving free copies to your friends. 

d. Having the personal satisfaction of doing what is ethical and legal


Feedback

Your answer is correct.


The correct answer is: Giving free copies to your friends.

Question 16
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which of these is not a computer crime?

Select one:
a. phone phreaking
b. All of these are types of computer crime 
c. salami slicing

d. dumpster diving
Feedback

Your answer is correct.


The correct answer is: All of these are types of computer crime

Question 17
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

What might a theist argue is a benefit of divine command theory?

Select one:
a. People will get what they deserve in the end - punishment or reward.
b. God provides a good explanation for the existence of feelings of obligation.
c. The origins of morality can be identified. 

d. All of the answers are correct.


Feedback

Your answer is incorrect.


The correct answer is: All of the answers are correct.

Question 18
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

What is concerned with that information an individual should have to reveal to others
through the course of employment or though other transactions such as online
shopping?

Select one:
a. information privacy
b. digital divide
c. ethics

d. computer crime 
Feedback

Your answer is incorrect.


The correct answer is: information privacy

Question 19
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

Which of the following is the most common job activity of top-level managers?
Select one:
a. Directing and interacting with people
b. Writing and reading corporate financial reports 
c. Designing and implementing production systems

d. Developing and testing new products


Feedback

Your answer is incorrect.


The correct answer is: Directing and interacting with people

Question 20
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

The professional’s standard of care and skill establishes the point at which a professional:

Select one:
a. May or may not charge a fee for services 
b. Has met the minimum requirements for registration
c. May be judged negligent in the performance of services

d. Has the duty to apply “reasonable care”


Feedback

Your answer is incorrect.


The correct answer is: May be judged negligent in the performance of services

Question 21
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A person who breaks into a computer for fun or curiosity is called a

Select one:
a. None of these.
b. cracker.
c. hacker. 

d. spammer.
Feedback

Your answer is correct.


The correct answer is: hacker.

Question 22
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

A presentation is a form of oral communication in which a person shares factual


information with an audience that is:

Select one:
a. small
b. specific
c. mixed 
d.
large
Feedback

Your answer is incorrect.


The correct answer is: specific

Question 23
Correct
Mark 1.00 out of 1.00
Flag question

Question text

On a school computer, Mary learned how to copy programs. A classmate asked her to
copy a program for his home use. Her most ethical response would be which of the
following?

Select one:
a. I don’t know how to copy diskettes
b. I’ll copy it for you, but you can’t copy it for anyone else
c. I’ll copy it, but you have to promise not to tell anybody

d. I can’t copy it because it will break copyright laws 


Feedback

Your answer is correct.


The correct answer is: I can’t copy it because it will break copyright laws

Question 24
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is a right to exclusively manufacture an invention for a specified time?

Select one:
a. patent 
b. information property
c. copyright

d. trademark
Feedback
Your answer is correct.
The correct answer is: patent

Question 25
Correct
Mark 1.00 out of 1.00

Flag question

Question text

According to Kant, moral laws are:

Select one:
a. necessary and apply to all rational beings. 
b. culturally relative.
c. contingent and apply only to human beings.

d. grounded in God’s commands.


Feedback

Your answer is correct.


The correct answer is: necessary and apply to all rational beings.

Question 26
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

The gap between those individuals in our society who are computer literate and have
access to information resources like the Internet and those who do not is referred to as
the

Select one:
a. privacy divide
b. digital divide. 
c. computer literacy.

d. computer crime.
Feedback

Your answer is incorrect.


The correct answer is: privacy divide

Question 27
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which of the following would be considered unethical access of a computer database?

Select one:
a. Using a gift registry online to pick out a gift for someone getting married
b. Opening America Online using someone else’s screen name and password 
c. Accessing your banking statement online

d. Buying a pair of jeans using a store’s web site


Feedback

Your answer is correct.


The correct answer is: Opening America Online using someone else’s screen name and
password

Question 28
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
The objection that, by following rule utilitarianism, we will sometimes fail to maximize
utility in specific situations is called the __________ objection.

Select one:
a. justice
b. dilemma 
c. inconsistency

d. collapse
Feedback

Your answer is incorrect.


The correct answer is: inconsistency

Question 29
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

What is the science of human duty that encompasses a system of principles and rules
cornering duty?

Select one:
a. information privacy
b. digital divide
c. systems development and design 

d. ethics
Feedback

Your answer is incorrect.


The correct answer is: ethics

Question 30
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Rule utilitarianism avoids much of which act utilitarianism problem?

Select one:
a. extensions to animals
b. worries about hedonism
c. the calculation problem 

d. the inconsistency objection


Feedback

Your answer is correct.


The correct answer is: the calculation problem

You might also like