Download as pdf or txt
Download as pdf or txt
You are on page 1of 27

Ethics MCQs

What ethical principle encourages individuals to be transparent and open about their online actions and intentions?

A) Accountability

B) Privacy

C) Honesty

D) Fair use

ANSWER: C

What is the term for a work that is no longer protected by copyright and can be freely used by the public?
A) Creative Commons work

B) Fair use work

C) Public domain work

D) Copyrighted work

ANSWER: C

What should you do if you come across online content that promotes hate speech or discrimination?

A) Share it to raise awareness


B) Report it to the platform or authorities

C) Ignore it and move on

D) Engage in a heated online debate

ANSWER: B

In the context of intellectual property, what is a trademark used to protect?

A) Inventions and discoveries

B) Literary works
C) Brand names, logos, and symbols

D) Scientific research

ANSWER: C

What is the term for the legal process of transferring a copyright or patent from one person or entity to another?

A)Licensing

B) Public domain

C)Infringement

D)Attribution

ANSWER: A

With my best wishes for success, DC 511444 44,


Ethics MCQs
Which of the following is an example of personal information that should be protected online?

A) Public social media posts

B) Home address and phone number

C) News ar ticles

D) Weather forecasts

ANSWER: B

What is the term for the practice of gaining unauthorized access to computer systems and networks with malicious intent?
A) Privacy invasion

B) Hacking

C) Digital literacy

D) Encryption

ANSWER: B

What is the term for the act of intentionally spreading computer viruses, malware, or other harmful software?

A) Ethical hacking
B) Responsible technology use

C) Cyb ersecu rity


D) Malicious software distribution

ANSWER: D

Which of the following is an example of a computer virus?


A) A physical hardware malfunction

B) A software program that replicates itself and infects other programs


C) A slow interne connection

D) A computer monitor displaying distorted images

ANSWER: B

Which of the following is a common method to secure personal data and protect online privacy?

A) Using strong and unique passwords

B) Posting personal information on public forums

C) Sharing login credentials with friends

D) Providing credit card details to unknown websites


ANSWER: A

With my best wishes for success, DC 511444 44,


Ethics MCQs
Which of the following is an example of a privacy breach?

A) Sharing vacation photos on social media

B) Encrypting sensitive emails

C) Unauthorized access to personal medical records

D) Deleting browser cookies

ANSWER: C

Which of the following actions is considered a violation of copyright?


A) Purchasing a legal copy of a software program

B) Creating a backup copy of a copyrighted movie you own

C) Distributing copyrighted music without permission

D) Using a copyrighted image for educational purposes

ANSWER: C

What should you do to respect copyright when using someone else's image in your presentation?

A) Remove the image's watermark


B)Provide proper attribution to the image's creator

C)Alter the image to make it unrecognizable

D) Use the image without permission

ANSWER: B

Which of the following is a potential consequence of engaging in cyberbullying?


A) Improved online reputation

B)Online popularity

C)Increased social media followers


D) Legal consequences and loss of interne privileges

ANSWER: D

What is the term for the act of using technology to advocate for social or political causes?

A) Cyb erb ully ing

B) Ethical hacking

C) Online activism

D) Disinform

ation ANSWER: C

With my best wishes for success, DC 511444 , 4 44,


Ethics MCQs
Which of the following actions is generally considered fair use of copyrighted material?

A) Using copyrighted images in a commercial advertisement without permission

B) Reproducing an entire copyrighted book and distributing it for free

C) Quoting a small portion of a copyrighted text for a book review

D) Remixing copyrighted music and selling it without attribution

ANSWER: C

What is the term for a legal agreement between a website or app provider and users that outlines how user data will be collected and
used?

A) Privacy breach

B) Privacy policy

C) Data encryption

D) Online

tracking ANSWER:

What is the purpose of a Creative Commons license?

A)To grant permission for specific uses of creative works with certain conditions

B) To allow unlimited use of creative works without attribution

C) To prohibit the use of creative works

D)To automatically transfer ownership of creative works


ANSWER: A

Which of the following actions is NOT a violation of copyright?

A) Creating an original piece of music

B) Using copyrighted images in a school project with proper attribution

C) Copying a public domain text

D) Replicating and distributing a copyrighted video game without

permission ANSWER: A

Which of the following actions can help protect personal data when using public Wi-Fi networks?

A) Sharing sensitive information freely

B) Using unsecured websites for online shopping

C) Enabling a virtual private network (VPN)

D) Leaving devices unattended

ANSWER: C
Ethics MCQs
What is the role of a chief privacy officer (CPO) in an organization?

A) Handling cybersecurity incidents

B) Overseeing ethical hacking operations

C) Managing hardware and software updates

D) Ensuring compliance with data protection laws and

policies ANSWER: D

What is the term for the act of using technology to gain unauthorized access to computer systems for ethical and lawful purposes, such
as identifying vulnerabilities?

A) Cyb erb ully ing

B) Malware distribution

C) Ethical hacking

D) Online

tracking ANSWER:

Which of the following actions is NOT considered responsible technology use?

A) Respecting others' online privacy

B) Protecting personal data


C) Spreading false rumors online

D) Reporting cyberbullying

incident ANSWER: C

Which ethical principle emphasizes the importance of being accountable for one's actions in the digital realm?
A) Tran sp aren cy
B) Accountability

C) Honesty

D) Privacy

ANSWER: B

Which of the following is NOT typically protected by copyright?

A) A novel written by an author

B)A piece of software

C)An original painting by an artist

D) A list of commonly used phone numbers

ANSWER: D
With my best wishes for success, DC 511444 , 4 44,

Ethics MCQs
Which of the following actions can help protect against identity theft online?

A) Sharing personal information freely on social media

B) Using the same password for all online accounts

C) Monitoring bank statements and credit reports regularly

D) Providing personal information to unsolicited email requests

ANSWER: C

What is the term for a legal requirement that organizations must follow to protect individuals' personal data and privacy?
A) Fair use doctrine

B) Encryption policy

C) Data breach notification law

D) Data protection regulation

ANSWER: D

What is the term for the practice of obtaining sensitive information through deceptive emails or websites?

A) Privacy breach
B) Phishing

C) E n cr y p t i o n

D) Data encryption

ANSWER: 13

What is the term for the act of sending unsolicited and often irrelevant messages to a large number of email addresses for advertising or
other purposes?

A) Ethical hacking

B) Phishing

C) Cyberbullying
D) Spamming

ANSWER: D

What should individuals do to protect their personal information and privacy when using social media platforms?
A) Share personal details openly
B) Accept all friend requests without verification

C) Review and adjust privacy settings

D) Use the same password for all social media accounts

ANSWER: C
Ethics MCQs
What is the term for the practice of using technology to harass, threaten, or intimidate others online?

A) Ethical hacking

B) Cyb erb ully ing

C) Privacy invasion

D) Malicious software distribution

ANSWER: B

Which ethical principle encourages individuals to be mindful of the potential consequences of their online actions?
A) Tr an sp aren cy

B) Honesty

C) Accountability

D) Fair u se

ANSWER: A

What is the term for a unique symbol, word, or phrase used to identify and distinguish a company's products or services?

A) Copyright

B) Pat en t

C) Trademark

D) Fair u se

ANSWER: C

What is the term for the right to control how a work is used and to receive payment for its use?

A) Pu b l ic d o m ain

B) Copyright

C) Att rib u tio n

D) Fair u se
ANSWER: B

What is the term for legal principle that allows use of copyrighted material without permission for purposes such as criticism, news
reporting, & education?

A) Pu b l ic d o m ain

B) Att rib u tio n

C) Fair use

D) Copyright infringement

ANSWER: C

With my best wishes for success, DC 511444 , 4 44,


Ethics MCQs
What is the term for the act of using someone else's work without permission and presenting it as one's own, often in academic or
creative contexts?

A) Copyright infringement

B) Fair use

C) Att rib u tio n


D) Plagiarism

ANSWER: D

What is the term for the act of securing data by encoding it so that only authorized parties can read and use it?
A) Data breach
B) Privacy invasion

C) Encryption

D) Phishing

ANSWER: C

What is the term used to describe the act of intentionally overloading a computer system or network to disrupt its normal functioning?

A) Phishing

B) Hacking

C) Spoofing

D) Denial-of-service attack
ANSWER: D

Which of the following is not a malicious program on computer systems?

A) worm s

B) Trojans

C) spyware

D) cookies

ANSWER: D

A computer network security that monitors and controls incoming and outgoing traffic is
A) Coo kies
B) Viru s

C) Firewall

D) w o r m s

ANSWER: C

With my best wishes for success, DC 511444 , 4 44,


Ethics MCQs
Which of the following is an example of unethical computer use mentioned in UNIT 2?

A) Ransomware attacks

B) Identity theft

C) Software piracy

D) All of the above

ANSWER: D

Cyber attackers can shut down a business by encrypting its website in a type of attack called:
A) Denial-of-service attack

B) Identity theft

C) Software piracy

D) Financial theft

ANSWER: A

Protecting consumer information is important for businesses to prevent:

A) Ransomware attacks
B) Data breaches

C) Intellectual property theft

D) Software piracy

ANSWER: B

An example of financial theft mentioned is redirecting donations for a:


A) Nonprofit organization

B) Software company
C) Med ia co mpany

D) Retail business

ANSWER: A

Intellectual property theft is often achieved by:

A) External hacking

B) Internal moles or contractors

C) Ransomware attacks

D) Software piracy
ANSWER: B

With my best wishes for success, DC 511444 , 4 44,


Ethics MCQs
Catching pirates who participate in illegal media distribution is:

A) Always easy online

B) Not always easy

C) Impossible online

D) I lleg al

ANSWER: B

Piracy is considered an:


A) Unethical computer use

B) Legal use of media

C) Online hacking

D) Financial theft

ANSWER: A

Constant updates are needed to server security for protection from:

A) Spyware, malware and viruses


B) Data breaches

C) Copyright infringement

D) Software piracy

ANSWER: A

Major companies from leading industries have experienced:

A) Ransomware attacks

B) Data breaches exposing consumer information


C) Financial theft

D) Software piracy

ANSWER: B

Intellectual property theft often targets:

A) Privacy information

B) Patented or patent-pending information

C) Financial information

D) Med ia co nten t
ANSWER: B

With my best wishes for success, DC 511444 , 4 44,


Ethics MCQs
Which of the following is NOT a type of software attack:

A) Do S attack s

B) A n t i v ir u s

C) Trojan horses

D) Spyware

ANSWER: B

One of the main types of Trojan horses is:


A) Proxy Trojans

B) Data Sending Trojans

C) DoS Attack Trojans

D) All of the above

ANSWER: D

A worm differs from a virus in that it:

A) Attaches to files and programs


B) Uses operating system components

C) Transmits via email/diskettes

D) Causes more damage


ANSWER: B

An example of a mitigation step is:


A) Penetration testing

B) Upgrading software
C) Data encryption

D) All of the above

ANSWER: D

Spyware can collect:

A) Website browsing habits

B) Password information

C) Financial details

D) Device information
ANSWER: A

With my best wishes for success, DC 511444 , 4 44,


Ethics MCQs
Which step involves assessing risks from internal and external threats?:

A) Step 1 - Identify asset vulnerabilities

B) Step 2 - Identify internal and external threats

C) Step 3 - Assess vulnerabilities

D) Step 5 - Identigate risk responses

ANSWER: B

A brute force attack involves:

A) Overwhelming server resources

B) Guessing passwords repeatedly

C) Virus transmission

D) Data theft

ANSWER: B

Risk assessment focuses on:

A) Equipment disposal

B) Social media usage

C) Software patching

D) Network traffic

ANSWER: B

A business impact analysis determines:

A) Cyber threat types


B) Vulnerability assessment

C) Security modifications

D) Effects of an attack

ANSWER: D

Continuous education helps mitigate:

A) Data breaches
B) Ransomware attacks

C) User m istakes

D) Trojan threats

ANSWER: C

With my best wishes for success, DC 511444 44,


Ethics MCQs
Which of the following is NOT a type of Trojan horse?

A. Remote Access Trojans

B. Data Sending Trojans


C. Worms

D. Destructive Trojans
ANSWER: C

A computer is a self-contained program that is able to spread functional copies of itself or its segments to other computer
systems.
A. vir us
B. worm

C. Trojan
horse

D. Spy
ware
ANSWER: B
_____ viruses infect Microsoft Word application and typically insert unwanted words or phrases.
A. File infector

B. Macro

C. Boot sector

D. System

ANSWER: B

A _____ attack is also an attack on system's resources, but it is launched from a large number of other host machines that are infected
by malicious software controlled by the attacker.

A. DoS

B. DDoS

C. Trojan

D. W o r m

ANSWER: B

___ programs can collect various types of personal information such as Internet surfing habits and Websites that have been visited.
A. Viruses

B. Spyware

C. DoS

D. Worms
ANSWER: B

With my best wishes for success, Dz. 54744. ,01, 410


Ethics MCQs
What type of attack consists of an attacker submitting many password or pass phrases with hope of eventually guessing correctly?

A. DoS attack

B. Brute force attack

C. Virus attack

D. Wo rm at tack

ANSWER: B

Viruses are classified into how many parts?

A. 2

B. 3

C. 4

D. 5

ANSWER: B

A denial-of-service attack overwhelms a system's resources so that it cannot respond to service requests.

A. True B. False

ANSWER: A

Continuous employee education is important to strengthen policy on what?


A. Password protection

B. Data encryption

C. Incident response plans

D. Patch management
ANSWER: A

Which of the following is NOT a key step to mitigate cyber security risks?

A. Identify and prioritize your risk responses

B. Implement strict firewall rules

C. Perform annual penetration assessments and vulnerability assessments

D. Secure buy-in from the CIO

ANSWER: B

Malicious software that collects information about users without their knowledge is called:

A. Viru s

B. Spyware

C. Trojan

D. Worm

ANSWER: B

With my best wishes for success, DC 511444 , 4 44,


Ethics MCQs
Which type of virus infects executable code in system areas on a disk?

A. File infector

B. Boot sector infector

C. Macro viruses

D. None of the above


ANSWER: B

A computer __ is a program or piece of code that is loaded onto a computer without the knowledge of the user and runs against
the user's wishes.
A. virus
B. worm

C. Trojan horse

D. Spyware
ANSWER: A

Which of the following protects spyware from attacking the system?


A. A n t i v ir u s

B. Antispyware

C. Firewall

D. None of the above

ANSWER: B

Which statement about worms is false?

A. Worms spread through networks without user interaction

B. Worms cause damage such as corrupting files

C. Worms use components of an operating system automatically

D. Worms are not self-contained programs

ANSWER: D

The three main forms of virus classification are:

A. File infector, Macro, Boot sector

B. File infector, System, Macro

C. File infector, Worm, Trojan

D. File infector, Boot sector, System

ANSWER: A

With my best wishes for success, DC 511444 , 4 44,


Ethics MCQs
Steps to mitigate cyber security risks should include identifying vulnerabilities and

A. Implementing firewall rules

B. Assessing internal threats

C. Upgrading software

D. Documenting assets

ANSWER: D

Which statement about DoS attacks is false?

A. A DoS attack can be carried out using a botnet

B. A DoS attack is performed using one machine only

C. The goal of a DoS attack is to overwhelm the victim's resources

D. DDoS attacks involve more than one infected machine

ANSWER: B

The seven main types of Trojan horses include all except:

A. Remote Access Trojans

B. Data Sending Trojans

C. Worms

D. Destructive Trojans

ANSWER: C

Spyware is considered what type of malware?

A. Viru s

B. Worm

C. Trojan

D. Adware

ANSWER: D

Which of the following is NOT a recommended step to mitigate cyber threats?

A. Upgrade and patch software immediately

B. Implement strict policies about what sites employees can visit

C. Upgrade authentication protocols

D. Focus only on external threats and ignore internal risks

ANSWER:B

With my best wishes for success, DC 511444 , 4 44,


Ethics MCQs
True or False: A DDoS attack aims to crash a single system by overwhelming it with junk requests.

A. True

B. False

ANSWER: B

Which type of virus infects program files like .COM and .EXE files?

A. File infectors

B.Macro viruses

C.Boot sector infectors

D. None of the above


ANSWER: A

Which of the following is included as a step to assess and mitigate cyber security risks?

A. Conducting annual security awareness training

B. Maintaining updated cyber insurance

C. Identifying potential business impacts

D. Assessing risk tolerance of shareholders

ANSWER: C

Which statement about sensitive data protection is true?

A. Encryption is the only method suggested

B. Monitoring is not mentioned

C. Strategies should go beyond encryption

D. Data residency is not a relevant consideration

ANSWER: C

Which of the following is an example of unethical computer use?

A) Ransomware attacks

B) Streaming movies legally with permission

C) Backing up files daily

D) Defragging your hard drive regularly

ANSWER: A

With my best wishes for success, DC 511444 , 4 44,


Ethics MCQs
What type of unethical computer use involves illegally distributing copyrighted media?

A) Pir acy

B) Hacking

C) Phishing

D) Denial of service attacks

ANSWER: A

How can businesses protect themselves against ransomware attacks?

A) Not updating security platforms

B)Installing antivirus software regularly

C)Not protecting servers from malware and viruses

D) Disconnecting from the

internet ANSWER: B

What level of access do internal moles or contract workers typically have to steal intellectual property?

A) Remo te access

B) Unauthorized access

C) Authorized access to computer servers

D) They don't have any special access

ANSWER: C

Which is an example of computer ethics?

A) Hacking others for fun

B) Avoiding plagiarism of software

C) Sharing passwords with friends

D) Accessing websites after hours

ANSWER: B

What is the term for a set of rules and practices that organizations follow to protect personal data and ensure privacy compliance?
A. Data breach notification law

B. Privacy policy

C. Data encryption

D. Cyb ersecu rity

ANSWER: B

With my best wishes for success, DC 511444 , 4 44,


Ethics MCQs
What is the term for the act of using technology to gain unauthorized access to computer systems for malicious purposes, such as data
theft or disruption?

A. Privacy invasion

B. Ethical hacking

C. Hacking

D. Accounta

bility ANSWER:

Which ethical principle emphasizes the importance of respecting the rights and privacy of individuals in the digital age?

A. Fair use

B. Accountability

C. Privacy

D. Transpar

ency ANSWER:

What is the term for act of tracking and collecting information about a user's online activities across various websites and services
without their knowledge?

A. Privacy invasion

B. Cyberbullying
C. Data encryption

D. Online tracking

ANSWER: D

What is the term for a legal protection granted to authors and creators that allows them to control how their original works are used and
distributed?
A. Fair use

B. Public domain

C. C o p y r i g h t

D. Creative Commons

ANSWER: C

What is the term for the act of pretending to be someone else online for malicious purposes?

A. Cyberbullying

B. Identity theft
C. Ethical hacking

D. Online activism

ANSWER: B
With my best wishes for success, Dz. 54744. ,01, 410

Ethics MCQs
What is the term used to describe the act of deliberately and anonymously attacking or defaming individuals or organizations online?

A. Hacking

B. Phishing

C. Spoofing

D. Cyberstalking
ANSWER: D

What is the term for the act of intentionally spreading false information online to deceive others?

A. Online collaboration

B. Digital literacy
C. Disinformation

D. Data

encryption

ANSWER: C

Which ethical principle suggests that individuals should take responsibility for their online actions and decisions?
A. Accountability

B. Transparency

C. Privacy

D. Honesty

ANSWER: A

Which of the following is NOT considered a form of intellectual property?

A. Patents

B. Copyrights

C. Tradem arks

D. Email addresses

ANSWER: D

What is the term for a unique symbol, word, or phrase used to identify and distinguish a product or brand?
A. Copyright

B. Patent

C. T r a d e m a r k

D. Fair use
ANSWER: C
Ethics MCQs
Which of the following is all example of a public domain work?

A. A newly published novel

B. A government document

C. copyrighted song

D. A confidential email

ANSWER: B

What ethical principle emphasizes being truthful and honest in all online interactions and communications?
A. Accountability

B.Honesty

C.Tran sp arency

D. Privacy

ANSWER: B

What is the term for the act of falsely claiming someone else's work as your own?

A. Copyright infringement

B. Plagiarism

C. Fair use

D. Attribution

ANSWER: B

What is the term for the practice of creating and using technology in ways that benefit society and promote the common good?

A. Digital citizenship

B. Cybersecurity

C. Digital literacy

D. Online tracking

ANSWER: A

Which one of the following are self-repeating and do not require a computer program to attach themselves?

A. viruses

B. wo rms

C. spyware

D. Trojans

ANSWER: A

With my best wishes for success, DC 511444 , 4 44,


Ethics MCQs
Which one of the following tracks a user visits a website'?

A. spyware
B. cookies

C. worms

D. Tro

jans

ANSWER: B

Distributing unwanted e-mail to others is called.

A. scam

B. spam

C. fraud

D. spoofing
ANSWER: B

Which ethical principle emphasizes the responsible use of computer systems and resources to ensure equal opportunities for all
individuals?

A. Privacy

B.Integrity

C.Accessibility

D. Anon

ymity

ANSWER: C

Which ethical principle emphasizes the responsible use of computing resources to minimize environmental impact?

A. Sustainability

B. Integrity

C. Accessibility

D. Anonymity
ANSWER: A

Which ethical principle emphasizes the responsible and transparent handling of personal data by organizations?

A. Privacy

B. Integrity

C. Accessibility

D. Accountability

ANSWER: D
Ethics MCQs
Which ethical principle emphasizes the accuracy and reliability of information?

A. Privacy

B. I nt e g r it y

C. Accessibility

D. Anonymity
ANSWER: B

What is the term used to describe the act of sending deceptive emails or messages to trick individuals into revealing sensitive
information?
A. Hacking

B. Phishing

C. Spoofmg

D. Social engineering

ANSWER: B

What is the term used to describe the practice of creating multiple user accounts to manipulate online discussions, ratings, or reviews?

A. Fir ewalling

B. Hacking
C. Trolling

D. Virtualization

ANSWER: C

What is the term used to describe the practice of isolating and running multiple virtual instances of computer systems on a single physical
machine?

A. Hacking

B. E ncr yption

C. Virtualization

D. Firewalling

ANSWER: C

What is the term used to describe the act of intentionally spreading malicious software through email attachments or infected websites?

A. Hacking

B. Phishing

C. Spoofing
D. Malware

ANSWER: D

With my best wishes for success, Ve, Eada /0 f , 40/


Ethics MCQs
What is the term used to describe the protection of computer systems from unauthorized access, use, disclosure, disruption, modification,
or destruction?

A. Privacy

B.Integrity

C.Security

D. Accessib

ility ANSWER:

Which of the following is NOT typically protected by copyright?

A. An original song composition

B. A photography exhibition
C. A common mathematical formula

D. A computer program's source code


ANSWER: C

What does computer ethics primarily concern?


A. Hardware maintenance

B. Social media trends

C. Software development

D. Responsible technology use and ethical

behavior ANSWER: D

Which of the following actions can help protect personal data and privacy when using public Wi-Fi networks?

A. Disabling firewalls

B. Sharing sensitive information freely

C. Using strong, unique passwords

D. Keeping devices unlocked and unattended

ANSWER: C

What does digital citizenship refer to?

A. Obtaining digital licenses

B. Being a responsible and ethical user of digital techno

C. Owning a lot of digital devices

D. Using digital technology for financial gain

ANSWER: B
Ethics MCQs
Which of the following is an example of ethical behavior in technology use?

A. Cyb erb ully ing

B. Protecting personal data and respecting others' privacy

C. Hacking into computer systems

D. Spreading false rumors online

ANSWER: B

What is the purpose of a public domain license for creative works?

A. To restrict the use of creative works

B. To automatically transfer ownership of creative works

C. To allow certain uses of creative works without permission

D. To grant unlimited use of creative works without attribution

ANSWER: D

Which of the following is an example of software piracy?


A. Creating a backup copy of software you purchased

B. Sharing software with a friend for personal use

C. Developing open-source software


D. Purchasing a licensed copy of software

ANSWER: B

Which of the following is an example of a cyberbullying behavior?

A. Sharing a funny meme with a friend

B. Posting a negative comment about someone on social media

C. Sending a polite email to a coworker

D. Participating in an online gaming tournament

ANSWER: B

Which of the following is an example of a conflict of interest in the context of computer ethics?

A. Sharing open-source software with colleagues

B. Developing software to improve productivity in the workplace

C. Donating old computer equipment to a local school

D. Using a computer for personal entertainment during work hours


ANSWER: D

Which of the following is an example of a potential ethical issue related to artificial intelligence (Al)?

A. Using AI to automate repetitive tasks

B. Developing AI algorithms to improve medical diagnoses

With my best wishes for success, DC 511444 , 4 44,


Ethics MCQs
C. Implementing AI to enhance cybersecurity measures

D. Al bias and discrimination in decision-making algorithms

ANSWER: D

Which of the following actions is generally considered fair use of copyrighted material?
A. Reproducing an entire copyrighted book for personal use

B. Quoting a small portion of a copyrighted text for a research paper

C. Sharing copyrighted software with friends

D. Using copyrighted images in a commercial advertisement without permission

ANSWER: B

Which of the following is an example of a privacy concern in the context of social media?
A. Sharing photos of a vacation with friends

B. Allowing third-party apps to access personal information

C. Posting a public announcement about an event

D. Sending private messages to close friends


ANSWER: B

What is encryption primarily used for in the context of privacy and data protection?

A. Hiding the existence of data

B. Deleting data permanently

C. Speeding up data transfer

D. Protecting data from unauthorized access by converting it into a secure format

ANSWER: D

Ethics is concerned with:

A) Morals and virtues


B) Laws and rules

C) What is good for society

D) Religious beliefs
ANSWER: C

Forms of ICT ethics between the user and hardware include:

A) Ensuring safety of device

B) Heavy load on hardware

C) Compliance with computer laws

D) All of the above

ANSWER: D

With my best wishes for success, DC 511444 , 4 44,


Ethics MCQs
An important reason for ethical behavior mentioned is to:

A) Lessen stress

B) Treat everyone equally

C) Secure meaningful employment

D) Make society better

ANSWER: B

Which type of ethics focuses on procedures, values and practices related to computing technologies?

A) Moral philosophy

B) Professional ethics

C) Computer ethics

D) Religious ethics

ANSWER: C

An example of ethics between person and other is:

A) Not wasting time on computers

B) Respecting intellectual property

C) Maintaining privacy

D) S e l f e s t e e m ANSWER: B What does computer ethics mandate for

designers and content developers?

A) Consider social implications of programs and content


B) Avoid plagiarism
C) Preserve data privacy
D) Respect deadlines
ANSWER: A

According to ETHICS, computers should not be used for:

A) Destroying other computers

B) Blackmailing others

C) Accessing services
D) Wasting time

ANSWER: B

Importance of ethical behavior in business is to:

A) Gain customers through reviews

B) Reduce stress from decisions


C) Make society better

D) Gain employment

ANSWER: A

With my best wishes for success, DC 511444 , 4 44,

You might also like