Society And Ethical Technology Basics Terms Quiz 1a

15 Questions | Total Attempts: 203

SettingsSettingsSettings
Please wait...
Technology Quizzes & Trivia

Understanding basic terminology in section.


Questions and Answers
  • 1. 
    A set of rules and guidelines that are set up to regulate internet use would be:
    • A. 

      FAIR USE AND MULTIMEDIA GUIDELINES

    • B. 

      ACCEPTABLE USE POLICY (AUP)

    • C. 

      SOFTWARE LICENSE

    • D. 

      PASSWORD

  • 2. 
    Law granting a legal right to a copyright holder or author which requires their permission to make non-archival copies of the work in question.
    • A. 

      COMMERCIAL SOFTWARE

    • B. 

      COPYRIGHT

    • C. 

      PATENT

    • D. 

      SOFTWARE LICENSE

  • 3. 
    Application software designed to be sold for a PROFIT.
    • A. 

      OPEN SOURCE SOFTWARE

    • B. 

      PROPRIETARY SOFTWARE

    • C. 

      SHAREWARE

    • D. 

      COMMERCIAL SOFTWARE

  • 4. 
    An application designed to search for viruses and repair files on a computer.
    • A. 

      ANTIVIRUS SOFTWARE

    • B. 

      FIREWALL

    • C. 

      SECURITY

    • D. 

      NETWORK

  • 5. 
    Malicious software code that is designed to copy itself and intentionally move from computer system to computer system, via networks, internet etc.
    • A. 

      TROJAN HORSE

    • B. 

      WORM

    • C. 

      VIRUS

    • D. 

      SPYWARE

  • 6. 
    The main chip that allows computers to do millions of calculations per second, for this it is sometimes called the brain of the computer.
    • A. 

      SERVER

    • B. 

      CPU

    • C. 

      WORKSTATION

    • D. 

      STANDALONE COMPUTER

  • 7. 
    Software program that is designed to damage files on a computer that receives it.
    • A. 

      WORM

    • B. 

      TROJAN HORSE

    • C. 

      VIRUS

    • D. 

      SPYWARE

  • 8. 
    Application software for which the underlying programming language is protected by the software developer/owner so that others cannot modify it for other purposes.
    • A. 

      PROPRIETARY SOFTWARE

    • B. 

      COMMERCIAL SOFTWARE

    • C. 

      OPEN SOURCE SOFTWARE

    • D. 

      SHAREWARE

  • 9. 
    Application software for which the underlying programming language is open for others to access. This allows the program to be changed by other programmers to meet other needs of the users.
    • A. 

      COMMERCIAL SOFTWARE

    • B. 

      OPEN SOURCE SOFTWARE

    • C. 

      FREEWARE

    • D. 

      PROPRIETARY SOFTWARE

  • 10. 
    A system of connected computers that allows the sharing of files and equipment.
    • A. 

      SERVER

    • B. 

      NETWORK

    • C. 

      STANDALONE COMPUTER

    • D. 

      WORKSTATION

  • 11. 
    Protection of computer, computer files or a computer network from use without permission of the owner or owners.
    • A. 

      FIREWALL

    • B. 

      SECURITY

    • C. 

      ONLINE SAFETY

    • D. 

      SHAREWARE

  • 12. 
    Malicious software that is disguised as a useful application.
    • A. 

      WORM

    • B. 

      VIRUS

    • C. 

      SPYWARE

    • D. 

      TROJAN HORSE

  • 13. 
    Also known as End User License Agreement (EULA). The software license is a legally binding agreement that states how one who has purchased the rights to use software, can legally use the software.
    • A. 

      ACCEPTABLE USE POLICY

    • B. 

      FAIR USE AND MULTIMEDIA GUIDELINES

    • C. 

      SOFTWARE LICENSE

    • D. 

      COPYRIGHT

  • 14. 
    Technology that prevents users from visiting inappropriate web sites, and protects the network from unauthorized users.
    • A. 

      ANTI VIRUS SOFTWARE

    • B. 

      FIREWALL

    • C. 

      WORM

    • D. 

      PROPRIETARY SOFTWARE

  • 15. 
    Which if the following would be an example of an emerging technology 5-10 years ago?
    • A. 

      TEXT MESSAGING

    • B. 

      EMAIL

    • C. 

      CALLER-ID ON CELL PHONES

    • D. 

      GPS ON CELL PHONES