Ethics unit - 1

Ethics unit - 1

University

14 Qs

quiz-placeholder

Similar activities

Computer Vision (Quiz 1)

Computer Vision (Quiz 1)

University

10 Qs

Cyber forensic and security

Cyber forensic and security

University

15 Qs

98-366 Lesson 6 Networking Services

98-366 Lesson 6 Networking Services

10th Grade - University

19 Qs

Aplikom

Aplikom

University

11 Qs

Computer Problem Solving

Computer Problem Solving

9th Grade - Professional Development

10 Qs

IT Trends, Issues, and Challenges

IT Trends, Issues, and Challenges

University

15 Qs

Computer Security Risk

Computer Security Risk

12th Grade - University

16 Qs

gogo yoyong

gogo yoyong

University

10 Qs

Ethics unit - 1

Ethics unit - 1

Assessment

Quiz

Computers

University

Hard

Created by

Dr Lydia

Used 3+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Computer ethics has its roots in the work of ___ during World War II.

Hermen Horllerith

Norbert Wiener

Blaise Pascal

Charles Babbage

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____ is a self- replicating program that can cause damage to data and files stored on your computer.

virus

freeware

piracy

None of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Making and using duplicate hardware and software is called ___

Piracy

Free Copy

Copyright

None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The protection of hardware, facilities magnetic disks, and other illegally accessed, stolen, damaged or destroyed items refers to ____

Physical security

Personal security

Personnel security

None of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____ refers to software setups that permit only authorized access to the system.

Personnel security

Personal security

Physical security

None of these

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

General guidelines of computer ethics are needed for ____

Cracking

Computer crime

Protection of personal data

All the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Cracking” comes under ____

Website Service

Transcription

Computer Crime

Data Security

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?