Search Header Logo

SDD 9.1.1 Social and Ethical Issues

Authored by Liam Dunphy

Computers

12th Grade

Used 4+ times

SDD 9.1.1 Social and Ethical Issues
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

One use of serial numbers on computer software is to combat

plagiarism

decompilation

software piracy

reverse engineering

Answer explanation

Serial numbers on computer software are used to combat software piracy, which involves unauthorized distribution or use of software. This helps prevent illegal copying and distribution of software products.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is most effective in preventing software piracy?

Using a site licence

Using an encryption key

Making a file ‘Read-only’

Providing source code instead of compiled code

Answer explanation

Using an encryption key is most effective in preventing software piracy as it adds a layer of security to the software, making it harder for unauthorized users to access or copy it.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is TRUE of the Millennium Bug?

It was a virus, as it affected software worldwide.

It was a logic error, resulting in inappropriate calculations.

It was caused by an inappropriate data structure, requiring a lot of software to be updated.

It was malware, introduced by programmers who were later employed to fix the problem they had created.

Answer explanation

The Millennium Bug was caused by an inappropriate data structure, requiring a lot of software to be updated.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A user pays for and installs a software package with a single-user licence.

Later, the user pays for and installs an upgrade to the package.

What is the user allowed to do with the original version?

Sell it

Archive it onto personal storage

Give it away but not sell it

Use it on a different computer

Answer explanation

The user is allowed to archive the original version onto personal storage after paying for and installing an upgrade to the software package.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Some children under the age of 18 are participating in a multiplayer web-based game intended for adults.

What issue does this raise?

User privacy

Cyber safety

Data security

Intellectual property

Answer explanation

The issue raised by children under 18 participating in an adult multiplayer web-based game is cyber safety, as they may be exposed to inappropriate content or interactions not suitable for their age group.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an ergonomic consideration in software design?

The placement of screen icons

The provision of back supports

The height adjustability of the screen

The backward compatibility of the software

Answer explanation

The placement of screen icons is an ergonomic consideration in software design as it affects user comfort and efficiency.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following statements about decompilation is true?

It is a manual process.

It does not produce meaningful identifiers.

It uses reverse engineering as one of its processes.

It produces an exact copy of the original source code.

Answer explanation

The correct statement about decompilation is that it does not produce meaningful identifiers.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?