You are on page 1of 5

Ethics in IT MCQs with Answers

netexplanations.com/ethics-in-it-mcqs-with-answers

August 2, 2021

1) The application of moral principles to the use of computers and the Internet.

a) Computer ethics

b) Protocols

c) Software

d) All of these

2) These are the rights of the owner of information to decide how much information is to be
exchanged, shared or distributed.

a) Computer Ethics

b) Intellectual property rights

c) Cyber law

d) labour law

3) Copyright, patents and trademarks are the examples of

a) Protocols

b) Cyber Law

c) Ethics

d) Intellectual property rights

4) © symbol, the alphabet C is enclosed within the circle, that you see on different items,
books, magzines and even web pages.

a) Protocol

b) patents

c) trademarks

d) copyright
5) It is a distinctive sign that identifies certain goods or services produced or provided by
an individual or a company.

a) Patents

b) Trademarks

c) Copyright

d) None of these

6) It contains one or more than one combination of words, letters and numerals.

a) Protocol

b) patents

c) trademarks

d) copyright

7) The holders of …………………. are granted the exclusive rights to prevent others from using,
commercializing or importing the patented products or processes.

a)Patents

b) Trademarks

c) Copyright

d) Both A and C

8) It ensures that the owners of marks have the exclusive rights to use them to identify
goods or services or to authorize others to use them in return for payment.

a) Copyright

b) Patents

c) Trademarks

d) All of these

9) The symbol generally comes before a statement, All Rights Reserved which indicates
that the materials and information are protected (copyrighted) and are the sole property of
the owner.
a) Trademarks

b) Copyright

c) Patents

d) None of these

10) It means that data is protected from unauthorised changes to ensure that it is reliable
and correct.

a) privacy

b) security

c) Integrity

d) defence

11) A network security system that manages and regulates the network traffic based on
some protocols.

a) Network security

b) Integrity

c) Internet security

d) Firewalls

12) The security that is provided to protect a network from unauthorised acces and risks.

a) Copyright

b) Firewalls

c) Network security

d) Patents

13) It is a key or secret word which is used to protect your information from an
unauthorised access.

a) Password

b) Patent
c) Copyright

d) Trademark

14) A person who breaks into a computer system to get illegal access to the information
stored there.

a) Cracker

b) Hacker

c) Information warriors

d) virus programmers

15) It is an act of stealing (like copying, distributing, modifying, selling) of software that is
legally protected.

a) Renting.

b) Software piracy

c) copyright

d) Hacking

Answer Keys

1 C

2 B

3 D

4 D

5 B

6 C
7 A

8 C

9 B

10 C

11 D

12 C

13 A

14 B

15 B

You might also like