1. Which of the following is a process of making and using duplicate hardware and software?
(A) Copy right
(B) Free copy
(C) None of these
(D) Piracy
2. “Cracking” is related to which of the following?
(A) Website Service
(B) Transcription
(C) Computer Crime
(D) Data Security
3. General guidelines of computer ethics are required for which of the following?
(A) Cracking
(B) Computer crime
(C) All the above
(D) Protection of personal data
4. ____ security refers to protecting data and computer systems against dishonesty or carelessness of employees.
(A) Physical security
(B) Personal security
(C) Personnel security
(D) None of these
5. ____ is not a way of protection?
(A) Physical Security
(B) Piracy
(C) Personal Security
(D) Personnel security
6. Which of the following scientists started to examine illegal and unethical uses of computers by computer professionals in the mid-1960s in California?
(A) Charles Babbage
(B) Donn Parker
(C) Norbert Wiener
(D) Bill Gates
7. We protect sensitive data from prying eyes by using which of the following techniques?
(A) File permissions
(B) File locks
(C) Passwords
(D) Encryption
8. A hacker contacts your E-mail or phone and attempts to get your password is a technique that is referred to as?
(A) Spamming
(B) Phishing
(C) Spoofing
(D) None of these
9. Computer ethics has its origins in the work of which of the following during World War II?
(A) Hermen Horllerith
(B) Charles Babbage
(C) Blaise Pascal
(D) Norbert Wiener
10. ____ security refers to the protection of hardware, facilities, magnetic disks, and other illegally accessed, stolen, damaged, or destroyed items.
(A) Physical security
(B) Personal security
(C) Personnel security
(D) None of the given
11. ____ security refers to software setups that allow only authorized access to the given system.
(A) Personnel security
(B) None of these
(C) Physical security
(D) Personal security
12. Which of the following is a self-replicating program that can be a source of damage to data and files stored on a given computer?
(A) Freeware
(B) None of the given
(C) Piracy
(D) Virus