Nc Computer Skills Trivia Quiz- Societal / Ethical Issues

16 Questions | Total Attempts: 1520

SettingsSettingsSettings
Please wait...
Computer Skills Quizzes & Trivia

NC Computer Skills Quiz-Societal / Ethical Issues


Questions and Answers
  • 1. 
    A ________ is a person who gains unauthorized access to a computer network for the purpose of corrupting or stealing data.
    • A. 

      Programmer

    • B. 

      Hacker

    • C. 

      Sysop

    • D. 

      Network administrator

  • 2. 
    You accidentally see your teacher’s password for the grading program used at your school. Ethically, you should do which of the following:
    • A. 

      Report your findings to the principal, since this is a breech of security.

    • B. 

      Explain to your teacher and suggest she change her password.

    • C. 

      Use the password to change grades for friends at your school.

    • D. 

      Pretend you didn’t see the password and do nothing.

  • 3. 
    What is “software piracy”?
    • A. 

      Illegally copying computer programs

    • B. 

      Reformatting hard drives and reselling them as new

    • C. 

      Infecting the hard drive with a virus

    • D. 

      Reselling used CPU’s for a profit

  • 4. 
    Which of the following is not an advantage of buying your own software?
    • A. 

      Having instruction manuals and documentation

    • B. 

      Making copies and reselling them for a profit

    • C. 

      Receiving technical support form the software developer

    • D. 

      Having the personal satisfaction of doing the right thing

  • 5. 
    __________ is software that you can use on a limited trial basis before you buy it.
    • A. 

      Trialware

    • B. 

      Cheapware

    • C. 

      Shareware

    • D. 

      Freeware

  • 6. 
    • A. 

      Trojan Horse

    • B. 

      Hacker

    • C. 

      Worm

    • D. 

      Pirate

  • 7. 
    _________ domain software can be copied, modified and redistributed free of charge and restriction.
    • A. 

      Private

    • B. 

      Share

    • C. 

      Public

    • D. 

      Free

  • 8. 
    Which of the following should be done if you discover a virus on your computer?
    • A. 

      E-mail all your friends to warn them of the virus

    • B. 

      Remove and destroy all files with the .exe extention

    • C. 

      Disinfect your computer using antivirus software

    • D. 

      Purchase another computer

  • 9. 
    A broad range of issues and standards of conduct related to the use of computer technology is:
    • A. 

      Security

    • B. 

      Copyright

    • C. 

      Piracy

    • D. 

      Ethics

  • 10. 
    • A. 

      Copyright the software

    • B. 

      Buy a patent for the software

    • C. 

      Lock the software

    • D. 

      Decode the software

  • 11. 
    _________ software is made available by the author to others at no cost, but cannot be resold or distributed for profit.
    • A. 

      Executable

    • B. 

      Computer

    • C. 

      Antivirus

    • D. 

      Freeware

  • 12. 
    When safely using the Internet it is recommended that you do which of the following?
    • A. 

      Use your real name and address

    • B. 

      Lie about your age

    • C. 

      Never agree to meet someone you do not know

    • D. 

      Create a profile with only accurate information about yourself

  • 13. 
    Which of the following is a true statement concerning plagiarism and the Internet?
    • A. 

      You may use up to one paragraph or two sentences, whichever is less.

    • B. 

      Plagiarism does not apply to the Internet because of all the inaccurate information you find.

    • C. 

      Always site Internet sources in a bibliography.

    • D. 

      Electronic information is never copyrighted.

  • 14. 
    The ________ divide can refer to the differences between individuals within a particular country, as well as between one country and another.
    • A. 

      Ability

    • B. 

      Digital

    • C. 

      Technology

    • D. 

      On-line

  • 15. 
    A message that appears to come from a person or company other than the real sender is a ________.
    • A. 

      Spam

    • B. 

      Popup

    • C. 

      Ghost

    • D. 

      Spoof

  • 16. 
    The electronic equilvalent of junk mail is known as:
    • A. 

      Adware

    • B. 

      Spam

    • C. 

      Cyberfraud

    • D. 

      Packets