Introduction To Computer Ethics

20 Questions | Total Attempts: 79

SettingsSettingsSettings
Please wait...
Introduction To Computer Ethics


Questions and Answers
  • 1. 
    What is NOT an example of cyberbullying?
    • A. 

      Creating an embarassing picture of your classmate and forwarding it to your friend's email addresses

    • B. 

      Sending someone a mean text

    • C. 

      Bullying someone in the hallway

    • D. 

      Threatening someone in an instant message

  • 2. 
    Which is an example of plagiarism?
    • A. 

      Reading a paragraph online and retyping it in your own words.

    • B. 

      Copying and pasting someone else's work into your paper using qoutation marks and citing the author

    • C. 

      Typing a paper in your own words

    • D. 

      Copying and pasting a sentence from the Internet into your paper.

  • 3. 
    Which is NOT a consequence of copying or distributing copyrighted software?
    • A. 

      Community Service

    • B. 

      Inprisonment

    • C. 

      Up to $10,000 in legal fees

    • D. 

      Up to $50,000 in civil fees

  • 4. 
    Which is not a type of cyberbully?
    • A. 

      "Mean Girls"

    • B. 

      Power Hungery or Revenge of the Nerds

    • C. 

      Big, Bad Bully

    • D. 

      The Vengeful Angel

    • E. 

      The Inadvertent Cyberbully "Because I Can"

  • 5. 
    Check TWO ways to prevent or stop cyberbullying?
    • A. 

      Forward a mean message about a bully to your friends

    • B. 

      Tell a parent, teacher, or administrator

    • C. 

      Not forwarding mean texts sent you about a classmate

    • D. 

      Use instant messanger to talk to your friends about someone's outfit you did not like that day at school

  • 6. 
    Which is NOT a consequence of plagiarism?
    • A. 

      You can get kicked out of college.

    • B. 

      You can make a zero on your assignment.

    • C. 

      You can get fired from your job.

    • D. 

      You could get a warning from your college professor.

  • 7. 
    Which of the following is NOT a rule listed in Computer Discovery's Ten Commandments of Computer Ethics?
    • A. 

      Thou shalt not use a computer to email.

    • B. 

      Thou shalt not use a computer to cyberbully.

    • C. 

      Thou shalt not use a computer to interfere with other people's computer work.

    • D. 

      Thou shalt not use a computer to be nosy or snoop into other people's computer files.

    • E. 

      Thou shalt not use a computer to steal.

  • 8. 
    Which of the following is NOT a rule listed in Computer Discovery's Ten Commandments of Computer Ethics?
    • A. 

      Thou Shalt not use a computer to lie.

    • B. 

      Thou shalt not copy copyrighted software and materials.

    • C. 

      Thou shalt not let others borrow your computer.

    • D. 

      Thou shalt not use a computer to plagiarize.

    • E. 

      Thou shalt respect other at all times when using the computer.

  • 9. 
    Thou shalt not create ______________________ software or games.
    • A. 

      Difficult

    • B. 

      Copyrighted

    • C. 

      Easy

    • D. 

      Harmful

  • 10. 
    Thou shalt not copy ___________________________ software or materials.
    • A. 

      Public-domain

    • B. 

      Copyrighted

    • C. 

      Self created

    • D. 

      Self published

  • 11. 
    1. Copying ideas, expressions, and graphical designs without acknowledging the owners and claim it as yours
    • A. 

      Phishing

    • B. 

      Plagiarism

    • C. 

      Hacking

    • D. 

      Software Piracy

  • 12. 
    Breaking the computer system of other people to acquire confidential information or gain financial benefits
    • A. 

      Piracy

    • B. 

      Phishing

    • C. 

      Napster

    • D. 

      Hacking

  • 13. 
    Copying licensed program without asking permission or paying for it.
    • A. 

      Plagiarism

    • B. 

      Copyright

    • C. 

      Software Piracy

    • D. 

      Hackers

  • 14. 
    Criminally fraudulent process of attempting to acquire sensitive information such as usernames
    • A. 

      Phishing

    • B. 

      Piracy

    • C. 

      Hacking

    • D. 

      Plagiarism

  • 15. 
    Gives the creator of an original work exclusive right for a certain time period in relation to that work, including its publication .
    • A. 

      Licensed

    • B. 

      Copyright

    • C. 

      Patentcy

  • 16. 
    Jules has walked away from a lab computer without logging off. Trish sits down and, still logged in as Jules, sends inflammatory e-mail messages out to a number of students and posts similar messages on the class newsgroup.
    • A. 

      1.Thou shall not use a computer to harm other people

    • B. 

      7.Thou shall not use other people's computer resources without authorization

    • C. 

      10.Thou shall use a computer in ways that show consideration and respect.

    • D. 

      4.Thou shall not use a computer to steal.

  • 17. 
    Lester sends e-mail to the entire student body inviting them to a BYOB party at his house while his parents are out of town. Lester receives a message from a system administrator calling him in for a meeting with school officials. He objects because he feels that his e-mail is his own private business
    • A. 

      3.Thou shall not snoop around in other people's files

    • B. 

      8.Thou shall not appropriate other people's intellectual output.

    • C. 

      9.Thou shall think about the social consequences of the program you write.

    • D. 

      2.Thou shall not interfere with other people's computer work.

  • 18. 
     It seems like every time Melanie logs on to her account, Stanley knows about it and sends messages that cover her screen with text. At first she thinks it is funny, but now its really starting to bother her. The messages reformat the text on her screen and, besides, its kind of creepy the way he always knows she’s logged on.
    • A. 

      2.Thou shall not interfere with other people's computer work.

    • B. 

      9.Thou shall think about the social consequences of the program you write.

    • C. 

      6.Thou shall not use or copy commercial software for which you have not paid.

    • D. 

      1.Thou shall not use a computer to harm other people.

  • 19. 
    Sharon and Timothy are students at Big Suburban High School. They have designed a Web page devoted to their favorite rock band using their personal disk space on the school's Web server. They have posted song clips, lyrics, photographs of each band member, and articles they have found in various Web news sources. However, school authorities have asked them to shut down their site because of the obscene content of many of the lyrics. Sharon and Timothy object, noting that their First Amendment (free speech) rights are being violated. Is this a violation of the ten commandments?  
    • A. 

      True

    • B. 

      False

  • 20. 
    What are computer ethics?
    • A. 

      An honest, moral code that should be followed when on the computer

    • B. 

      A computer program about honesty

    • C. 

      A computer that fits on or under a desk

    • D. 

      A list of commandments in the holybook

Back to Top Back to top