Professional Documents
Culture Documents
PP Mcqs Usa
PP Mcqs Usa
a. Output frauds
b. computer hacking
c. Eavesdropping
d. Input frauds
Correct Option: c
2. ____ is a self- replicating program that can cause damage to data and files
stored on your computer.
a. Freeware
b. Piracy
c. errors
d. Virus
Correct Option: d
3. ____ is a set of rules for determining moral standards or socially acceptable
behaviour.
a. rules
b. Ethics
c. Standard
d. protocol
Correct Option: b
4. ____ is the illegal access to the network or computer system.
a. security
b. Cracking
c. privacy
d. virus
Correct Option: b
5. ____ refers to software setups that permit only authorized access to the system.
a. Personal security
b. Physical security
c. physical security
d. none of these
Correct Option: a
6. _____ refers to protecting data and computer system against dishonesty or
negligence of employees.
a. personnel security
b. physical security
c. Personal security
d. none of these
Correct Option: a
7. _______________is defined as the duty,obligation or even authority.
a. democracy
b. authority
c. responsibility
d. work
Correct Option: c
8. “Cracking” comes under ____
a. Transcription
b. Computer Crime
c. Website Service
d. Data Security
Correct Option: b
9. A hacker contacts your phone or E-mail and attempts to acquire your password is
called
a. Phishing
b. Spoofing
c. Spamming
d. none of these
Correct Option: a
10. A trademark is a distinctive sign that identifies certain goods or services
produced or provided by an individual or a company
a. TRUE
b. FALSE
Correct Option: a
11. Altruistic Style is ________________?
d. Behaves unselfishly
Correct Option: d
12. Articulates the profession’s philosophy and practice to the public
a. Theoretical Style
b. Intellectual Style
c. Committed Style
d. Ethical Style
Correct Option: b
13. Can earn a fine or jail time
b. Breaking an ethic
c. breaking a moral
d. none of these
Correct Option: a
14. Can ruin your reputation
a. Breaking an ethic
c. Breaking a moral
d. none of these
Correct Option: a
15. Computer ethics has its roots in the work of ___ during World War II.
a. Norbert Wiener
b. Blaise Pascal
c. Charles Babbage
d. Hermen Horllerith
Correct Option: a
16. Copyright and related rights protection is an essential component in fostering
human creativity and innovation
a. TRUE
b. FALSE
Correct Option: a
17. Copyright law gives _________ exclusive rights to the owner of copyright
a. 2
b. 4
c. 6
d. 3
Correct Option: c
18. Ethical Style is ________________?
c. Behaves unselfishly
Correct Option: b
19. General guidelines of computer ethics are needed for ____
a. Computer crime
c. Cracking
d. All of these
Correct Option: d
20. Hackers try out all the combination of all keyboard letters
a. Brute force
b. Dictionary based
c. both a & b
d. none of these
Correct Option: a
21. __________ is a sign used on goods that have a specific geographical origin and
possess qualities or a reputation due to that place of origin
a. intellectual property
b. ethics
c. Geographical Indication
d. trade mark
Correct Option: c
22. is defined as the right of a person to guide
a. democracy
b. freedom
c. responsibility
d. authority
Correct Option: d
23. Making and using duplicate hardware and software is called ___
a. trade
b. Privacy
c. Free copy
d. copyright
Correct Option: b
24. Patents are granted by national patent offices or by regional offices that
carry out examination work for a group of countries
a. TRUE
b. FALSE
Correct Option: a
25. Plagiarism is __________?
d. All of these
Correct Option: d
26. Presents the theoretical foundation of ideas and actions
a. Theoretical Style
b. Committed Style
c. Ethical Style
d. Intellectual Style
Correct Option: a
27. Recognizes professional biases
a. Ethical Style
b. Committed Style
c. Theoretical Style
d. Intellectual Style
Correct Option: a
28. Responsible Style is ____________?
a. Behaves unselfishly
Correct Option: c
29. Rules that mandate or prohibit certain behavior in society
a. regulation
b. Law
c. rules
d. moral ethics
Correct Option: b
30. Running other software on idle computer without the knowledge of the
organization is called theft of ____
a. Computer time
b. Computer
c. software
d. hardware
Correct Option: a
31. software can be protected by
a. trade mark
b. design Registry
c. copyright
d. patent
Correct Option: c
32. Strives toward self-improvement
a. Intellectual Style
b. Ethical Style
c. Committed Style
d. Theoretical Style
Correct Option: c
33. Taking control from the website owner
a. software Hacking
b. website hacker
c. Net Hacking
d. Password Hacking
Correct Option: b
34. Tester is told everything about the network topology and technology and is
authorized to interview IT personnel
Correct Option: b
35. The code of behavior and courtesy is__________
a. rules
b. Ethics
c. moral
d. laws
Correct Option: b
a. copyright
b. Design Registry
c. patent
d. trade mark
Correct Option: c
37. The look of the product may be registered in the
a. copyright
b. trade mark
c. patent
d. Designs Registry
Correct Option: d
38. The name under which a product is sold may be registered as a
a. copyright
b. Designs Registry
c. trade mark
d. patent
Correct Option: c
39. The protection of hardware, facilities magnetic disks, and other illegally
accessed, stolen, damaged or destroyed items refers to ____
a. Physical security
b. Personal security
c. Personnel security
d. none of these
Correct Option: a
40. the quest to maximize profitability should be contained by
a. ethical obligations
b. stakeholders
c. unethical obligations
Correct Option: a
41. The transition to —————- is generally an ambiguous concept for students at this
stage in
a. entrepreneurship
c. trade mark
d. none of these
Correct Option: a
42. Theoretical Style is _____________?
c. Behaves unselfishly
Correct Option: b
43. Traits of a Profession
a. regulation
c. rules
d. moral ethics
Correct Option: b
44. what are the ethical and social issues?
b. free data
c. unauthorized data
d. none of these
Correct Option: a
45. What are the roles in the protection of geographical indications
a. WIPO’s
b. PIOW’s
c. WOIP’s
d. IOPW’s
Correct Option: a
46. What kinds of trademarks
can be registered
b. letters
c. numerals
d. All of these
Correct Option: d
47. Which of the following is not a way of protection?
a. Personnel security
b. physical security
c. personal security
d. Piracy
Correct Option: d
48. Which of the following is not related to security mechanism
a. ecash
b. encryption
c. decryption
d. all of these
Correct Option: a
49. Who among the following began to examine unethical and illegal uses of
computers by computer professionals in mid 1960s Menlo Park, California?
a. Willion
b. Donn Parker
c. Norbert Wiener
d. Bill Gates
Correct Option: b
50. You can protect sensitive data from prying eyes using
a. Password Hacking
b. encryption
c. file permission
d. file locks
Correct Option: c