Professional Ethics Multiple Choice Questions and Answers - 2

Question: 6

General guidelines of computer ethics are needed for ____

(A) Cracking

(B) Computer crime

(C) Protection of personal data

(D) All the above

Ans: D

All the above

Question: 7

“Cracking” comes under ____

(A) Website Service

(B) Transcription

(C) Computer Crime

(D) Data Security

Ans: C

Computer Crime

Question: 8

____ is the illegal access to the network or computer system.

(A) Security

(B) Cracking

(C) Virus

(D) Piracy

Ans: B

Cracking

Question: 9

____ is a set of rules for determining moral standards or socially acceptable behaviour.

(A) Protocol

(B) Standard

(C) Ethics

(D) None of the given

Ans: C

Ethics

Question: 10

Running other software on idle computer without the knowledge of the organization is called theft of ____

(A) Software

(B) Computer

(C) Computer time

(D) Use

Ans: C

Computer time

Related Questions