Professional Ethics MCQs 12 min Score: 0 Attempted: 0/12 Subscribe 1. Which of the following is a process of making and using duplicate hardware and software? (A) Copy right (B) Free copy (C) None of these (D) Piracy 2. “Cracking” is related to which of the following? (A) Website Service (B) Transcription (C) Computer Crime (D) Data Security 3. General guidelines of computer ethics are required for which of the following? (A) Cracking (B) Computer crime (C) All the above (D) Protection of personal data 4. ____ security refers to protecting data and computer systems against dishonesty or carelessness of employees. (A) Physical security (B) Personal security (C) Personnel security (D) None of these 5. ____ is not a way of protection? (A) Physical Security (B) Piracy (C) Personal Security (D) Personnel security 6. Which of the following scientists started to examine illegal and unethical uses of computers by computer professionals in the mid-1960s in California? (A) Charles Babbage (B) Donn Parker (C) Norbert Wiener (D) Bill Gates 7. We protect sensitive data from prying eyes by using which of the following techniques? (A) File permissions (B) File locks (C) Passwords (D) Encryption 8. A hacker contacts your E-mail or phone and attempts to get your password is a technique that is referred to as? (A) Spamming (B) Phishing (C) Spoofing (D) None of these 9. Computer ethics has its origins in the work of which of the following during World War II? (A) Hermen Horllerith (B) Charles Babbage (C) Blaise Pascal (D) Norbert Wiener 10. ____ security refers to the protection of hardware, facilities, magnetic disks, and other illegally accessed, stolen, damaged, or destroyed items. (A) Physical security (B) Personal security (C) Personnel security (D) None of the given 11. ____ security refers to software setups that allow only authorized access to the given system. (A) Personnel security (B) None of these (C) Physical security (D) Personal security 12. Which of the following is a self-replicating program that can be a source of damage to data and files stored on a given computer? (A) Freeware (B) None of the given (C) Piracy (D) Virus Related Posts:Professional Ethics Past Papers important QuestionsProfessional and Parent Organizations (Special Education) MCQsProfessional conduct and communication MCQs - AnesthesiaProfessional Misconduct – MCQs ForensicsClosing Lines for Business Letters and Professional Letters[PPSC PAKISTAN] Syllabus assistant center for professional development of public prosecutors (cpd)