Nc Computer Skills Trivia Quiz- Societal / Ethical Issues

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Charlotteccs
C
Charlotteccs
Community Contributor
Quizzes Created: 10 | Total Attempts: 21,942
Questions: 16 | Attempts: 1,576

SettingsSettingsSettings
Nc Computer Skills Trivia Quiz- Societal / Ethical Issues - Quiz


NC Computer Skills Quiz-Societal / Ethical Issues


Questions and Answers
  • 1. 

    A ________ is a person who gains unauthorized access to a computer network for the purpose of corrupting or stealing data.

    • A.

      Programmer

    • B.

      Hacker

    • C.

      Sysop

    • D.

      Network administrator

    Correct Answer
    B. Hacker
    Explanation
    A hacker is a person who gains unauthorized access to a computer network for the purpose of corrupting or stealing data. Hackers use their technical skills and knowledge to exploit vulnerabilities in computer systems and networks, allowing them to bypass security measures and gain access to sensitive information. They may also manipulate or corrupt data for personal gain or to cause harm. Hackers are often motivated by curiosity, personal gain, or even political or ideological reasons.

    Rate this question:

  • 2. 

    You accidentally see your teacher’s password for the grading program used at your school. Ethically, you should do which of the following:

    • A.

      Report your findings to the principal, since this is a breech of security.

    • B.

      Explain to your teacher and suggest she change her password.

    • C.

      Use the password to change grades for friends at your school.

    • D.

      Pretend you didn’t see the password and do nothing.

    Correct Answer
    B. Explain to your teacher and suggest she change her password.
    Explanation
    Explain to your teacher and suggest she change her password. This option is the most ethical because it involves taking responsibility for the situation and addressing the breach of security appropriately. By informing the teacher, you are helping to protect the integrity of the grading program and prevent any potential misuse of the password. This action demonstrates honesty, integrity, and a commitment to upholding ethical standards.

    Rate this question:

  • 3. 

    What is “software piracy”?

    • A.

      Illegally copying computer programs

    • B.

      Reformatting hard drives and reselling them as new

    • C.

      Infecting the hard drive with a virus

    • D.

      Reselling used CPU’s for a profit

    Correct Answer
    A. Illegally copying computer programs
    Explanation
    Software piracy refers to the act of illegally copying computer programs. This involves making unauthorized duplicates of software without the permission of the copyright holder. It is considered an infringement of intellectual property rights and is against the law. Software piracy can occur through various means such as downloading pirated software from the internet or sharing unauthorized copies with others. This practice not only deprives software developers of their rightful income but also undermines the industry as a whole.

    Rate this question:

  • 4. 

    Which of the following is not an advantage of buying your own software?

    • A.

      Having instruction manuals and documentation

    • B.

      Making copies and reselling them for a profit

    • C.

      Receiving technical support form the software developer

    • D.

      Having the personal satisfaction of doing the right thing

    Correct Answer
    B. Making copies and reselling them for a profit
    Explanation
    Making copies and reselling them for a profit is not an advantage of buying your own software because it is illegal and violates copyright laws. When you purchase software, you are typically only granted a license to use it for personal or business purposes, not to duplicate and sell it for profit.

    Rate this question:

  • 5. 

    __________ is software that you can use on a limited trial basis before you buy it.

    • A.

      Trialware

    • B.

      Cheapware

    • C.

      Shareware

    • D.

      Freeware

    Correct Answer
    C. Shareware
    Explanation
    Shareware refers to software that is available for users to try on a limited trial basis before they decide to purchase it. This allows users to evaluate the software's features, functionality, and compatibility with their needs before making a financial commitment. Unlike freeware, which is available for free, shareware typically requires a payment or registration to unlock the full version of the software. Therefore, shareware is the correct answer in this context.

    Rate this question:

  • 6. 

    A ______ is a virus that is often disguised as a useful computer program.

    • A.

      Trojan Horse

    • B.

      Hacker

    • C.

      Worm

    • D.

      Pirate

    Correct Answer
    A. Trojan Horse
    Explanation
    A Trojan Horse is a type of virus that is designed to deceive users by disguising itself as a useful computer program. It tricks users into downloading or installing it, often by appearing as a harmless or beneficial software. Once inside the system, the Trojan Horse can perform malicious activities, such as stealing personal information, damaging files, or allowing unauthorized access to the computer. Unlike hackers, worms, or pirates, Trojan Horses specifically rely on deception to gain entry and carry out their harmful actions.

    Rate this question:

  • 7. 

    _________ domain software can be copied, modified and redistributed free of charge and restriction.

    • A.

      Private

    • B.

      Share

    • C.

      Public

    • D.

      Free

    Correct Answer
    C. Public
    Explanation
    Public domain software refers to software that is not protected by copyright and is available for anyone to use, modify, and distribute freely without any charge or restrictions. This means that users have the freedom to copy, share, and even make changes to the software as they see fit. Public domain software is often created by individuals or organizations who voluntarily release their work into the public domain, allowing others to benefit from their contributions without any legal limitations.

    Rate this question:

  • 8. 

    Which of the following should be done if you discover a virus on your computer?

    • A.

      E-mail all your friends to warn them of the virus

    • B.

      Remove and destroy all files with the .exe extention

    • C.

      Disinfect your computer using antivirus software

    • D.

      Purchase another computer

    Correct Answer
    C. Disinfect your computer using antivirus software
    Explanation
    If you discover a virus on your computer, the recommended action is to disinfect your computer using antivirus software. Antivirus software is specifically designed to detect and remove viruses from your system, ensuring that your computer is protected and the virus is eliminated. This is a proactive step to prevent further damage to your computer and to ensure the safety of your data and personal information. E-mailing all your friends to warn them of the virus may be helpful, but it is not the most immediate and effective solution. Removing and destroying all files with the .exe extension is not necessary as not all .exe files are viruses. Purchasing another computer is an unnecessary expense and does not address the issue at hand.

    Rate this question:

  • 9. 

    A broad range of issues and standards of conduct related to the use of computer technology is:

    • A.

      Security

    • B.

      Copyright

    • C.

      Piracy

    • D.

      Ethics

    Correct Answer
    D. Ethics
    Explanation
    The correct answer is ethics because a broad range of issues and standards of conduct related to the use of computer technology encompasses ethical considerations. Ethics in computer technology involves making moral decisions and adhering to principles that govern the appropriate and responsible use of technology. This includes issues such as privacy, data protection, cyberbullying, and ensuring fair and equitable access to technology.

    Rate this question:

  • 10. 

    How can software developers keep users from making illegal copies of their software?

    • A.

      Copyright the software

    • B.

      Buy a patent for the software

    • C.

      Lock the software

    • D.

      Decode the software

    Correct Answer
    A. Copyright the software
    Explanation
    Software developers can protect their software from illegal copying by copyrighting it. Copyrighting provides legal protection to the original work, preventing others from reproducing, distributing, or selling the software without the developer's permission. This helps to safeguard the intellectual property rights of the software developer and discourages unauthorized copying, thereby reducing the chances of illegal copies being made.

    Rate this question:

  • 11. 

    _________ software is made available by the author to others at no cost, but cannot be resold or distributed for profit.

    • A.

      Executable

    • B.

      Computer

    • C.

      Antivirus

    • D.

      Freeware

    Correct Answer
    D. Freeware
    Explanation
    Freeware refers to software that is provided by the author to others at no cost. However, it cannot be resold or distributed for profit. This means that users are allowed to use the software for free, but they cannot sell it or distribute it to others in exchange for money. Freeware is different from open-source software, as the source code is not necessarily available for modification or redistribution.

    Rate this question:

  • 12. 

    When safely using the Internet it is recommended that you do which of the following?

    • A.

      Use your real name and address

    • B.

      Lie about your age

    • C.

      Never agree to meet someone you do not know

    • D.

      Create a profile with only accurate information about yourself

    Correct Answer
    C. Never agree to meet someone you do not know
    Explanation
    When safely using the Internet, it is important to prioritize personal safety. Agreeing to meet someone you do not know can be dangerous as you cannot guarantee their intentions or trustworthiness. Therefore, it is recommended to never agree to meet someone you do not know in order to protect oneself from potential harm or risky situations.

    Rate this question:

  • 13. 

    Which of the following is a true statement concerning plagiarism and the Internet?

    • A.

      You may use up to one paragraph or two sentences, whichever is less.

    • B.

      Plagiarism does not apply to the Internet because of all the inaccurate information you find.

    • C.

      Always site Internet sources in a bibliography.

    • D.

      Electronic information is never copyrighted.

    Correct Answer
    C. Always site Internet sources in a bibliography.
    Explanation
    Plagiarism is a serious issue, and it applies to the Internet as well. When using information from the Internet, it is important to properly cite the sources in a bibliography. This helps to give credit to the original authors and avoid plagiarism.

    Rate this question:

  • 14. 

    The ________ divide can refer to the differences between individuals within a particular country, as well as between one country and another.

    • A.

      Ability

    • B.

      Digital

    • C.

      Technology

    • D.

      On-line

    Correct Answer
    B. Digital
    Explanation
    The term "digital divide" refers to the gap or disparity between individuals or groups who have access to and use digital technologies and those who do not. This divide can exist within a country, where some individuals have access to digital technologies while others do not, and it can also exist between different countries, where some countries have more advanced digital infrastructure and resources compared to others.

    Rate this question:

  • 15. 

    A message that appears to come from a person or company other than the real sender is a ________.

    • A.

      Spam

    • B.

      Popup

    • C.

      Ghost

    • D.

      Spoof

    Correct Answer
    D. Spoof
    Explanation
    A message that appears to come from a person or company other than the real sender is a spoof. This term is commonly used to describe fraudulent emails or messages that mimic the identity of a trusted individual or organization in order to deceive recipients. Spoofing is often done for malicious purposes, such as phishing or spreading malware, and it is important to be cautious and verify the authenticity of such messages before taking any action.

    Rate this question:

  • 16. 

    The electronic equilvalent of junk mail is known as:

    • A.

      Adware

    • B.

      Spam

    • C.

      Cyberfraud

    • D.

      Packets

    Correct Answer
    B. Spam
    Explanation
    The correct answer is "spam" because spam refers to unsolicited and unwanted electronic messages, typically sent in bulk. Just like junk mail, spam is often sent for advertising purposes or to spread malicious content. Adware refers to software that displays advertisements, cyberfraud refers to fraudulent activities conducted online, and packets refer to units of data transmitted over a network. However, none of these options accurately represent the electronic equivalent of junk mail except for spam.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Apr 06, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 17, 2007
    Quiz Created by
    Charlotteccs
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.