Uploaded by Prashanth K

professional-ethics-multiple-choice-questions-and-answers

advertisement
Professional Ethics Multiple Choice Questions & Answers Pdf
Question: 1
Computer ethics has its roots in the work of ___ during World
War II.
Norbert Wiener
Question: 2
____ is a self- replicating program that can cause damage to data
and files stored on your computer.
Virus
Question: 3
Making and using duplicate hardware and software is called ___
Piracy
Question: 4
The protection of hardware, facilities magnetic disks, and other
illegally accessed, stolen, damaged or destroyed items refers to
____
Physical security
Question: 5
____ refers to software setups that permit only authorized access
to the system.
Personal security
Question: 6
General guidelines of computer ethics are needed for ____
All the above
Question: 7
“Cracking” comes under ____
Computer Crime
Question: 8
____ is the illegal access to the network or computer system.
Cracking
Question: 9
____ is a set of rules for determining moral standards or socially
acceptable behaviour.
Ethics
Question: 10
Running other software on idle computer without the knowledge
of the organization is called theft of ____
Computer time
Download