Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

University of Central Punjab

Faculty of Information Technology


Mid Term Exam (Objective)

Course Title: Professional Practices (Sections: CS H1 & SE T1)


Course Instructors : Sidra Khalid Semester: Summer 2022
Course Code: CSGE4963 Percent Weight :
Duration : 90 Minutes Time:
Date : Program: CS
Room# : Total Marks: 40
Paper Review (Date & Time): TBA

Name:____________________________ Registration Number____________________________

Section: ___________________________ Student Signature _____________________________

INSTRUCTIONS

1. Your paper contains two parts. Part one (OBJECTIVE) & Part two (SUBJECTIVE).
2. Time duration for part one is 25 minutes & part two is 65 minutes.
3. Part one contains 20 MCQS (25 minutes) while Short Questions (65 minutes) are the
part of Subjective.
4. Write all your answers on provided answer sheets.
5. Attempt all questions. It should be concise and point to point.
6. Try to finish your exam within prescribed time. EXTRA TIME IS NOT ALLOWED.

OBJECTIVE PART
QN01: Write the correct answers in GIVEN BOX. Just answers on the box will be considered.
Note: Cutting is not allowed. 1 * 20 = 20 marks

1) 2) 3) 4) 5) 6) 7) 8)

9) 10) 11) 12) 13) 14) 15) 16)

17) 18) 19) 20)


1) Selling fake or counterfeit items, or taking payment with no intention to ship or deliver
the item
a. Breach of Contract
b. Fraud
c. Misrepresentation
d. All of the above
2) System of rules that tells us what we can and cannot do is called:
a. Morals
b. Ethics
c. Laws
d. None of the above
3) Without ___________, there are no requirements for heightened care and no concept
of professional malpractice
a. Certification
b. Self-assessment
c. Contract
d. Licensing
4) Opt-out policy of information privacy says
a. Un-checking or leaving a checkbox un-clicked is the presumption that the
organization may use the information
b. Collect the data only required
c. Keep data only as long as needed
d. Checking or clicking a box is the presumption that the organization may use the
information
5) Gifts are made directly from donor to recipient, while ___________ are often made
indirectly through a third party.
a. Contract
b. Bribe
c. Gift
d. All of the above
6) “I agree to the terms and condition” checkbox on different websites or during software
installation is an example of
a. Fair Information Principle
b. Opt-out policy
c. Opt-in policy
d. None of these
7) Treat violations of this code as inconsistent with membership in the ACM.” This
statement of ACM code belongs to which category
a. Organizational leadership imperatives
b. General moral imperatives
c. Professional responsibilities
d. Compliance with the Code

8) Phishing is one of four approaches used by identity thieves. It means:


a. An attempt to steal personal identity data by tricking users into entering information
on a counterfeit website
b. Marketing firms aggregate the information they gather about consumers to build
databases that contain a huge amount of consumer data
c. A covert method of bypassing normal authentication or encryption in a computer,
product, embedded device, or its embodiment.
d. All of the mentioned
e. None of the mentioned
9) Making and using duplicate hardware and software is called
a. Piracy
b. Free copy
c. Copy right
d. Patent
10) A situation in which engineer’s loyalty and obligations may be compromised because of
self-interest or other loyalties and obligations
a. Conflict of interest
b. Conceptual issue
c. Concern of interest
d. Contentious issues
11) Which of these do you consider to be an employee right?
a. To be treated equally
b. To not be paid a fair salary
c. To work in dangerous environment
d. To not receive any holiday
12) Searching and analyzing masses of data to find patterns and develop new information or
knowledge is called _____.
a. Data Mining
b. Data Profiling
c. Computer Matching
d. Computer Profiling
13) Ethics are dependent on others for definition while ___________ can change if an
individual’s beliefs change.
a. Laws
b. Morals
c. Contracts
d. None
14) This is referred to as the value and or guidelines that a professional must follow in order
to remain registered as a member of profession body
a. Organizational obligations
b. Contracts
c. Codes of ethics
d. Moral obligations
15) Analyzing data in computer files to determine characteristics of people most likely to
engage in certain behavior is known as
a. Data Mining
b. Data Profiling
c. Computer Matching
d. Computer Profiling
16) Management is the key principle of SE Code of Ethics?
a. True
b. False
17) Hacking is not a technique frequently employed by identity thieves?
a. True
b. False
18) If a person’s personal conduct is evaluated and judged in comparison to the norms of
society, there is judgment of Moral behavior
a. True
b. False
19) Loyalty is an example of vices
a. True
b. False
20) Small blocks of data created by a web server while a user is browsing a website and
placed on the user's computer or other device by the user's web browser known as:
a. Cookies
b. Spyware
c. Malware
d. Trojan Virus

***********************

You might also like