Professional Ethics Multiple Choice Questions & Answers Pdf Question: 1 Computer ethics has its roots in the work of ___ during World War II. Norbert Wiener Question: 2 ____ is a self- replicating program that can cause damage to data and files stored on your computer. Virus Question: 3 Making and using duplicate hardware and software is called ___ Piracy Question: 4 The protection of hardware, facilities magnetic disks, and other illegally accessed, stolen, damaged or destroyed items refers to ____ Physical security Question: 5 ____ refers to software setups that permit only authorized access to the system. Personal security Question: 6 General guidelines of computer ethics are needed for ____ All the above Question: 7 “Cracking” comes under ____ Computer Crime Question: 8 ____ is the illegal access to the network or computer system. Cracking Question: 9 ____ is a set of rules for determining moral standards or socially acceptable behaviour. Ethics Question: 10 Running other software on idle computer without the knowledge of the organization is called theft of ____ Computer time