Professional Ethics MCQs
Professional Ethics MCQs
- Which of the following is a process of making and using duplicate hardware and software?
(a) Copy right
(b) Free copy
(c) Piracy
(d) None of these
(e) None of these
Answer: (c) Piracy - “Cracking” is related to which of the following?
(a) Computer Crime
(b) Transcription
(c) Website Service
(d) Data Security
(e) None of these
Answer:
(a) Computer Crime - General guidelines of computer ethics are required for which of the following?
(a) Cracking
(b) Computer crime
(c) Protection of personal data
(d) All the above
(e) None of these
Answer: (d) All the above - ____ security refers to protecting data and computer systems against dishonesty or carelessness of employees.
(a) Physical security
(b) Personal security
(c) Personnel security
(d) None of these
(e) None of these
Answer: (c) Personnel security - ____ is not a way of protection?
(a) Physical Security
(b) Personal Security
(c) Piracy
(d) Personnel security
(e) None of these
Answer: (c) Piracy - Which of the following scientists started to examine illegal and unethical uses of computers by computer professionals in the mid-1960s in California?
(a) Charles Babbage
(b) Bill Gates
(c) Norbert Wiener
(d) Donn Parker
(e) None of these
Answer: (d) Donn Parker - We protect sensitive data from prying eyes by using which of the following techniques?
(a) File permissions
(b) File locks
(c) Passwords
(d) Encryption
(e) None of these
Answer: (d) Encryption - A hacker contacts your E-mail or phone and attempts to get your password is a technique that is referred to as?
(a) Spamming
(b) Spoofing
(c) Phishing
(d) None of these
(e) None of these
Answer: (c) Phishing - Computer ethics has its origins in the work of which of the following during World War II?
(a) Hermen Horllerith
(b) Charles Babbage
(c) Blaise Pascal
(d) Norbert Wiener
(e) None of these
Answer: (d) Norbert Wiener - ____ security refers to the protection of hardware, facilities, magnetic disks, and other illegally accessed, stolen, damaged, or destroyed items.
(a) Personnel security
(b) Personal security
(c) Physical security
(d) None of the given
(e) None of these
Answer: (c) Physical security - ____ security refers to software setups that allow only authorized access to the given system.
(a) Personnel security
(b) Personal security
(c) Physical security
(d) None of these
(e) None of these
Answer: (b) Personal security - Which of the following is a self-replicating program that can be a source of damage to data and files stored on a given computer?
(a) Freeware
(b) Virus
(c) Piracy
(d) None of the given
(e) None of these
Answer: (b) Virus
MCQs on Ethics
- Ethics MCQs
- Social Responsibility and Managerial Ethics MCQs
- Business Ethics MCQs
- Industrial Ethics MCQs
- Ethics of Ethical Hacking MCQs
- Industry Ethics And Legal Issues MCQs
- Moral Development MCQs
- Professional Ethics MCQs
Past Papers of Ethics
- Ethics in Business Past Papers
- Values, Ethics and Society Past Papers Important Exam Questions
- Professional Ethics Past Papers Important Questions