
SDD 9.1.1 Social and Ethical Issues
Authored by Liam Dunphy
Computers
12th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
One use of serial numbers on computer software is to combat
plagiarism
decompilation
software piracy
reverse engineering
Answer explanation
Serial numbers on computer software are used to combat software piracy, which involves unauthorized distribution or use of software. This helps prevent illegal copying and distribution of software products.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is most effective in preventing software piracy?
Using a site licence
Using an encryption key
Making a file ‘Read-only’
Providing source code instead of compiled code
Answer explanation
Using an encryption key is most effective in preventing software piracy as it adds a layer of security to the software, making it harder for unauthorized users to access or copy it.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is TRUE of the Millennium Bug?
It was a virus, as it affected software worldwide.
It was a logic error, resulting in inappropriate calculations.
It was caused by an inappropriate data structure, requiring a lot of software to be updated.
It was malware, introduced by programmers who were later employed to fix the problem they had created.
Answer explanation
The Millennium Bug was caused by an inappropriate data structure, requiring a lot of software to be updated.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A user pays for and installs a software package with a single-user licence.
Later, the user pays for and installs an upgrade to the package.
What is the user allowed to do with the original version?
Sell it
Archive it onto personal storage
Give it away but not sell it
Use it on a different computer
Answer explanation
The user is allowed to archive the original version onto personal storage after paying for and installing an upgrade to the software package.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Some children under the age of 18 are participating in a multiplayer web-based game intended for adults.
What issue does this raise?
User privacy
Cyber safety
Data security
Intellectual property
Answer explanation
The issue raised by children under 18 participating in an adult multiplayer web-based game is cyber safety, as they may be exposed to inappropriate content or interactions not suitable for their age group.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is an ergonomic consideration in software design?
The placement of screen icons
The provision of back supports
The height adjustability of the screen
The backward compatibility of the software
Answer explanation
The placement of screen icons is an ergonomic consideration in software design as it affects user comfort and efficiency.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following statements about decompilation is true?
It is a manual process.
It does not produce meaningful identifiers.
It uses reverse engineering as one of its processes.
It produces an exact copy of the original source code.
Answer explanation
The correct statement about decompilation is that it does not produce meaningful identifiers.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?