Free computer quiz Online Test - MeritNotes

No. of Questions :10
Remaining Time :
1. Running other software on idle computer without the knowledge of the organization is called theft of ____
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

2. Who among the following began to examine unethical and illegal uses of computers by computer professionals in mid 1960s Menlo Park, California?
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

3. ____ is a self- replicating program that can cause damage to data and files stored on your computer.
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

4. “Cracking” comes under ____
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

5. ____ is the illegal access to the network or computer system.
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

6. A hacker contacts your phone or E-mail and attempts to acquire your password is called
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

7. The protection of hardware, facilities magnetic disks, and other illegally accessed, stolen, damaged or destroyed items refers to ____
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

8. ____ is a set of rules for determining moral standards or socially acceptable behaviour.
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

9. Computer ethics has its roots in the work of ___ during World War II.
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

10. Making and using duplicate hardware and software is called ___
 
  • (a) 
  • (b) 
  • (c) 
  • (d)