Cyber Ethics And Cyber Security

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Bodtkel
B
Bodtkel
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,742
Questions: 14 | Attempts: 1,742

SettingsSettingsSettings
Cyber Ethics And Cyber Security - Quiz

.


Questions and Answers
  • 1. 

    Property of the mind including ideas, inventions, and creations such as art and music.

    Explanation
    Intellectual property refers to the ownership of intangible creations of the mind, such as ideas, inventions, and artistic works like art and music. These creations are protected by laws and regulations to ensure that the original creators have exclusive rights to use and profit from their work. Intellectual property rights can be granted through patents, copyrights, and trademarks, allowing individuals and businesses to control and monetize their innovative and creative endeavors.

    Rate this question:

  • 2. 

    A security code to allow access to a computer or a specific program.

    Explanation
    A password is a security code that is used to gain access to a computer or a specific program. It acts as a form of authentication, ensuring that only authorized individuals can access the system or the program. By requiring a password, the user's identity and authorization are verified, preventing unauthorized access and protecting sensitive information.

    Rate this question:

  • 3. 

    A set of rules set up to regulate Internet use and to protect others.  You sign one that allows you to use the internet here at Decatur.

    Explanation
    An Acceptable Use Policy (AUP) is a set of rules that governs the use of the internet and aims to protect others. By signing the AUP, you agree to abide by these rules and regulations when using the internet at Decatur. The AUP ensures that internet usage remains within acceptable boundaries and prevents misuse or abuse of the internet, promoting a safe and respectful online environment for all users.

    Rate this question:

  • 4. 

    Advertising supported software that automatically plays or displays ads.

    Explanation
    Adware refers to advertising supported software that automatically plays or displays ads. This type of software is designed to generate revenue for its developers by displaying advertisements to users. Adware can be installed on a computer without the user's knowledge or consent, often bundled with other software. It can be annoying and intrusive, as it constantly interrupts the user's browsing experience with unwanted ads. Adware is different from malware, as it does not typically cause harm to the computer system itself, but rather focuses on delivering targeted advertisements.

    Rate this question:

  • 5. 

    An unauthorized person who secretly gains access to computer files.

    Explanation
    An unauthorized person who secretly gains access to computer files is commonly referred to as a hacker. Hackers use their technical skills and knowledge to exploit vulnerabilities in computer systems, networks, or software to gain unauthorized access or control over sensitive information. They may engage in activities such as stealing personal data, spreading malware, or disrupting computer systems. Hackers can pose a significant threat to individuals, organizations, and even governments, as they can cause financial loss, privacy breaches, and damage to reputation and infrastructure.

    Rate this question:

  • 6. 

    A computer program designed to damage computer files. It replicates itself.

    Explanation
    A computer program designed to damage computer files and replicate itself is commonly known as a virus. Viruses are malicious software that can cause harm to a computer system by corrupting or deleting files, stealing personal information, or disrupting the normal functioning of the system. They spread by attaching themselves to other files or programs and can be transmitted through various means such as email attachments, infected websites, or removable storage devices. Once a computer is infected, the virus can replicate and spread to other computers, causing further damage.

    Rate this question:

  • 7. 

    Tricking users into revealing personal information such as passwords and bank account numbers by way of emails pretending to be from actual companies

    Explanation
    Phishing refers to the act of tricking users into revealing personal information, such as passwords and bank account numbers, through fraudulent emails that pretend to be from legitimate companies. These emails often contain convincing logos, designs, and language to deceive recipients into thinking they are genuine. The goal of phishing is to obtain sensitive information that can be used for identity theft or financial fraud.

    Rate this question:

  • 8. 

    A person who harasses, taunts, or teases online

    Explanation
    The term "cyberbully" refers to a person who engages in harassing, taunting, or teasing behavior online. This can include sending threatening messages, spreading rumors, or posting harmful content about someone with the intention of causing emotional distress. The variations "cyber bully" and "cyber-bully" are simply alternate spellings of the same term, all of which describe the same behavior.

    Rate this question:

  • 9. 

    Technology that prevents users from visiting inappropriate websites

    Explanation
    A firewall is a technology that prevents users from visiting inappropriate websites. It acts as a barrier between a private internal network and the public internet, monitoring and controlling incoming and outgoing network traffic. By setting up rules and filters, a firewall can block access to websites that are deemed inappropriate or potentially harmful. It helps to protect against unauthorized access, malware, and other online threats, ensuring a safer browsing experience for users.

    Rate this question:

  • 10. 

    A program that looks harmless, but has harmful code inside.  When that software is activated it causes damage to your computer.

    Explanation
    A Trojan horse is a type of malicious software that appears harmless or useful, but actually contains harmful code. When the software is activated or executed, it can cause damage to the computer system. This term is derived from the Greek myth of the Trojan War, where the Greeks used a giant wooden horse to sneak into the city of Troy. Similarly, a Trojan horse program disguises itself to deceive users into installing or executing it, allowing the harmful code to be unleashed and cause harm to the computer.

    Rate this question:

  • 11. 

    Information you leave about yourself online through postings, photographs, and videos

    Explanation
    The term "virtual footprint" refers to the information that individuals leave about themselves online through various means such as postings, photographs, and videos. This information creates a digital trail or footprint that can be traced back to the person. It includes their online activities, interactions, and personal details that can be accessed and analyzed by others. The virtual footprint is a reflection of an individual's online presence and can have implications for their privacy, reputation, and security.

    Rate this question:

  • 12. 

    Laws granting legal right to the creator of a work, which require others to gain permission before using that work

    Explanation
    Copyright refers to the legal rights granted to the creator of an original work, such as a book, song, or artwork. These laws give the creator exclusive rights to reproduce, distribute, and display their work, as well as the authority to grant permission to others who wish to use or reproduce the work. In other words, copyright laws require individuals to obtain permission from the creator before using their work in any way.

    Rate this question:

  • 13. 

    Malicious software that enters a computer and tracks and gathers personal information

    Explanation
    Spyware is a type of malicious software that infiltrates a computer system and secretly tracks and collects personal information without the user's consent. It is designed to monitor a user's online activities, capture sensitive data like passwords and credit card information, and send it back to the attacker. Spyware can be installed through deceptive downloads, malicious email attachments, or by exploiting vulnerabilities in the operating system or software. It poses a significant threat to privacy and can lead to identity theft or financial loss.

    Rate this question:

  • 14. 

    Using someone else's work and taking credit for it

    Explanation
    Plagiarize refers to the act of using someone else's work, ideas, or words without giving them proper credit and claiming it as one's own. This includes copying and pasting text from a source without citation, presenting someone else's ideas as original, or paraphrasing without acknowledging the original author. Plagiarism is considered unethical and is a serious offense in academic and professional settings.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 09, 2012
    Quiz Created by
    Bodtkel
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.