Professional Documents
Culture Documents
netexplanations.com/ethics-in-it-mcqs-with-answers
August 2, 2021
1) The application of moral principles to the use of computers and the Internet.
a) Computer ethics
b) Protocols
c) Software
d) All of these
2) These are the rights of the owner of information to decide how much information is to be
exchanged, shared or distributed.
a) Computer Ethics
c) Cyber law
d) labour law
a) Protocols
b) Cyber Law
c) Ethics
4) © symbol, the alphabet C is enclosed within the circle, that you see on different items,
books, magzines and even web pages.
a) Protocol
b) patents
c) trademarks
d) copyright
5) It is a distinctive sign that identifies certain goods or services produced or provided by
an individual or a company.
a) Patents
b) Trademarks
c) Copyright
d) None of these
6) It contains one or more than one combination of words, letters and numerals.
a) Protocol
b) patents
c) trademarks
d) copyright
7) The holders of …………………. are granted the exclusive rights to prevent others from using,
commercializing or importing the patented products or processes.
a)Patents
b) Trademarks
c) Copyright
d) Both A and C
8) It ensures that the owners of marks have the exclusive rights to use them to identify
goods or services or to authorize others to use them in return for payment.
a) Copyright
b) Patents
c) Trademarks
d) All of these
9) The symbol generally comes before a statement, All Rights Reserved which indicates
that the materials and information are protected (copyrighted) and are the sole property of
the owner.
a) Trademarks
b) Copyright
c) Patents
d) None of these
10) It means that data is protected from unauthorised changes to ensure that it is reliable
and correct.
a) privacy
b) security
c) Integrity
d) defence
11) A network security system that manages and regulates the network traffic based on
some protocols.
a) Network security
b) Integrity
c) Internet security
d) Firewalls
12) The security that is provided to protect a network from unauthorised acces and risks.
a) Copyright
b) Firewalls
c) Network security
d) Patents
13) It is a key or secret word which is used to protect your information from an
unauthorised access.
a) Password
b) Patent
c) Copyright
d) Trademark
14) A person who breaks into a computer system to get illegal access to the information
stored there.
a) Cracker
b) Hacker
c) Information warriors
d) virus programmers
15) It is an act of stealing (like copying, distributing, modifying, selling) of software that is
legally protected.
a) Renting.
b) Software piracy
c) copyright
d) Hacking
Answer Keys
1 C
2 B
3 D
4 D
5 B
6 C
7 A
8 C
9 B
10 C
11 D
12 C
13 A
14 B
15 B