Search Header Logo

Ethics unit - 1

Authored by Dr Lydia

Computers

University

Used 3+ times

Ethics unit - 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Computer ethics has its roots in the work of ___ during World War II.

Hermen Horllerith

Norbert Wiener

Blaise Pascal

Charles Babbage

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____ is a self- replicating program that can cause damage to data and files stored on your computer.

virus

freeware

piracy

None of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Making and using duplicate hardware and software is called ___

Piracy

Free Copy

Copyright

None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The protection of hardware, facilities magnetic disks, and other illegally accessed, stolen, damaged or destroyed items refers to ____

Physical security

Personal security

Personnel security

None of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____ refers to software setups that permit only authorized access to the system.

Personnel security

Personal security

Physical security

None of these

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

General guidelines of computer ethics are needed for ____

Cracking

Computer crime

Protection of personal data

All the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Cracking” comes under ____

Website Service

Transcription

Computer Crime

Data Security

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers