IS 103 Quiz Number 2

IS 103 Quiz Number 2

University

15 Qs

quiz-placeholder

Similar activities

Intro to Computer

Intro to Computer

University

10 Qs

Basics: Data structure 2024

Basics: Data structure 2024

University

20 Qs

Demo

Demo

University

11 Qs

Basic Computer

Basic Computer

8th Grade - University

10 Qs

PDS - 04225 - Recursion - Chapter 12

PDS - 04225 - Recursion - Chapter 12

University

10 Qs

6th Grade Media Quiz

6th Grade Media Quiz

KG - University

15 Qs

Computer  Fundamentals

Computer Fundamentals

10th Grade - Professional Development

10 Qs

Computer

Computer

8th Grade - Professional Development

15 Qs

IS 103 Quiz Number 2

IS 103 Quiz Number 2

Assessment

Quiz

Computers

University

Hard

Created by

Selmar Fufunan

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the philosophical study and theory of what is morally right and wrong and what is good and bad?

Laws

Morals

Ethics

Values

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is described as one's personal beliefs about right and wrong?

Laws

Values

Morals

Ethics

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the factors affecting morality?

Culture, Experience, Peer Influences

All of the above

Religion, Personal Values, Family Background/Environment

Age, Gender, Education

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do computer ethics deal with?

None of the above

Governing the process of consuming computing technology without damaging moral values

Consuming computing technology without any restrictions

Violating the moral values and beliefs of any individual

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do the 10 commandments of computer ethics emphasize?

Interfering with other people's computer work

Respect for others

All of the above

Harming other people

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is computer fraud defined as?

None of the above

Deceiving a victim to gain information through the use of a computer

Gaining unauthorized access to a computer system

Making online service unavailable to users

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the act of making e-mail messages with fake sender addresses to gain access to the victim's information?

Phishing

E-mail Source Falsification

All of the above

E-mail Spoofing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?