Society And Ethical Technology Basics Terms Quiz 1a

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Uncwcsb02
U
Uncwcsb02
Community Contributor
Quizzes Created: 3 | Total Attempts: 836
Questions: 15 | Attempts: 223

SettingsSettingsSettings
Technology Quizzes & Trivia

Understanding basic terminology in section.


Questions and Answers
  • 1. 

    A set of rules and guidelines that are set up to regulate internet use would be:

    • A.

      FAIR USE AND MULTIMEDIA GUIDELINES

    • B.

      ACCEPTABLE USE POLICY (AUP)

    • C.

      SOFTWARE LICENSE

    • D.

      PASSWORD

    Correct Answer
    B. ACCEPTABLE USE POLICY (AUP)
    Explanation
    An Acceptable Use Policy (AUP) is a set of rules and guidelines that are established to regulate internet use. It outlines the acceptable behaviors and actions that users must adhere to when using the internet. This policy helps ensure that the internet is used responsibly and ethically, promoting a safe and secure online environment. It may include guidelines on appropriate content, prohibited activities, privacy and security measures, and consequences for violations. By implementing an AUP, organizations and individuals can establish a framework for responsible internet use and protect against potential misuse or harm.

    Rate this question:

  • 2. 

    Law granting a legal right to a copyright holder or author which requires their permission to make non-archival copies of the work in question.

    • A.

      COMMERCIAL SOFTWARE

    • B.

      COPYRIGHT

    • C.

      PATENT

    • D.

      SOFTWARE LICENSE

    Correct Answer
    B. COPYRIGHT
    Explanation
    The correct answer is COPYRIGHT. A copyright grants the legal right to the holder or author of a work, such as a book, music, or software, to control the reproduction and distribution of that work. This means that anyone who wants to make non-archival copies of the work, such as photocopying a book or duplicating software, needs to obtain permission from the copyright holder. Copyright laws are in place to protect the rights of creators and ensure that they have the ability to control and profit from their work.

    Rate this question:

  • 3. 

    Application software designed to be sold for a PROFIT.

    • A.

      OPEN SOURCE SOFTWARE

    • B.

      PROPRIETARY SOFTWARE

    • C.

      SHAREWARE

    • D.

      COMMERCIAL SOFTWARE

    Correct Answer
    D. COMMERCIAL SOFTWARE
    Explanation
    Commercial software refers to application software that is designed to be sold for a profit. Unlike open source software, which is freely available and can be modified by users, commercial software is typically owned and controlled by a company or individual. This type of software is developed with the intention of generating revenue through sales, licensing, or subscriptions. Examples of commercial software include Microsoft Office, Adobe Photoshop, and QuickBooks.

    Rate this question:

  • 4. 

    An application designed to search for viruses and repair files on a computer.

    • A.

      ANTIVIRUS SOFTWARE

    • B.

      FIREWALL

    • C.

      SECURITY

    • D.

      NETWORK

    Correct Answer
    A. ANTIVIRUS SOFTWARE
    Explanation
    Antivirus software is an application specifically designed to search for viruses and repair files on a computer. It helps to protect the computer from malicious software by scanning files and identifying any potential threats. This software plays a crucial role in maintaining the security of a computer system by preventing viruses from infecting files and compromising the system's integrity. It is an essential tool for ensuring the safety and smooth functioning of a computer.

    Rate this question:

  • 5. 

    Malicious software code that is designed to copy itself and intentionally move from computer system to computer system, via networks, internet etc.

    • A.

      TROJAN HORSE

    • B.

      WORM

    • C.

      VIRUS

    • D.

      SPYWARE

    Correct Answer
    B. WORM
    Explanation
    A worm is a type of malicious software code that is designed to copy itself and intentionally move from computer system to computer system, via networks, internet, etc. Unlike viruses, worms do not require a host program to attach themselves to and can spread independently. They often exploit vulnerabilities in computer systems to gain unauthorized access and can cause significant damage by consuming network bandwidth, slowing down systems, and deleting or modifying files. Therefore, the correct answer for this question is WORM.

    Rate this question:

  • 6. 

    The main chip that allows computers to do millions of calculations per second, for this it is sometimes called the brain of the computer.

    • A.

      SERVER

    • B.

      CPU

    • C.

      WORKSTATION

    • D.

      STANDALONE COMPUTER

    Correct Answer
    B. CPU
    Explanation
    The correct answer is CPU. The CPU, or Central Processing Unit, is the main chip in a computer that is responsible for executing instructions and performing calculations. It is often referred to as the brain of the computer because it controls and coordinates all the other components and processes in the system. The CPU's high processing speed allows computers to perform millions of calculations per second, making it a crucial component for computer performance.

    Rate this question:

  • 7. 

    Software program that is designed to damage files on a computer that receives it.

    • A.

      WORM

    • B.

      TROJAN HORSE

    • C.

      VIRUS

    • D.

      SPYWARE

    Correct Answer
    C. VIRUS
    Explanation
    A virus is a type of software program that is specifically designed to damage files on a computer that receives it. It can replicate itself and spread to other computers, causing harm to the system by corrupting or deleting files. Unlike other types of malware such as spyware or trojan horses, viruses are specifically focused on causing damage to the computer and its files.

    Rate this question:

  • 8. 

    Application software for which the underlying programming language is protected by the software developer/owner so that others cannot modify it for other purposes.

    • A.

      PROPRIETARY SOFTWARE

    • B.

      COMMERCIAL SOFTWARE

    • C.

      OPEN SOURCE SOFTWARE

    • D.

      SHAREWARE

    Correct Answer
    A. PROPRIETARY SOFTWARE
    Explanation
    Proprietary software refers to application software that is developed and owned by a software developer or company. The underlying programming language of this software is protected, preventing others from modifying or altering it for any other purposes. This means that the source code is not freely available to the public, and users are typically required to purchase a license to use the software. Proprietary software is often developed with the intention of generating profit and may have restrictions on redistribution and modification.

    Rate this question:

  • 9. 

    Application software for which the underlying programming language is open for others to access. This allows the program to be changed by other programmers to meet other needs of the users.

    • A.

      COMMERCIAL SOFTWARE

    • B.

      OPEN SOURCE SOFTWARE

    • C.

      FREEWARE

    • D.

      PROPRIETARY SOFTWARE

    Correct Answer
    B. OPEN SOURCE SOFTWARE
    Explanation
    Open source software refers to application software that allows other programmers to access and modify its underlying programming language. This means that the software can be changed and customized to meet the specific needs of the users by other programmers. Unlike proprietary software, open source software is not restricted to a single company or developer, and it encourages collaboration and community involvement in its development and improvement.

    Rate this question:

  • 10. 

    A system of connected computers that allows the sharing of files and equipment.

    • A.

      SERVER

    • B.

      NETWORK

    • C.

      STANDALONE COMPUTER

    • D.

      WORKSTATION

    Correct Answer
    B. NETWORK
    Explanation
    A network is a system of connected computers that allows the sharing of files and equipment. This means that multiple computers can be connected together, enabling them to communicate and share resources such as files, printers, and scanners. A network provides a way for users to access and transfer data between computers, making it more efficient and convenient for users to collaborate and share resources. Therefore, the correct answer is NETWORK.

    Rate this question:

  • 11. 

    Protection of computer, computer files or a computer network from use without permission of the owner or owners.

    • A.

      FIREWALL

    • B.

      SECURITY

    • C.

      ONLINE SAFETY

    • D.

      SHAREWARE

    Correct Answer
    B. SECURITY
    Explanation
    The term "security" refers to measures taken to protect computer systems, files, and networks from unauthorized use. It involves implementing various security measures such as firewalls, encryption, access controls, and antivirus software to safeguard against potential threats and breaches. This ensures that only authorized individuals have access to the computer or network, preventing unauthorized use or data theft. Therefore, "security" is the correct answer as it encompasses the protection of computer systems, files, and networks from unauthorized use.

    Rate this question:

  • 12. 

    Malicious software that is disguised as a useful application.

    • A.

      WORM

    • B.

      VIRUS

    • C.

      SPYWARE

    • D.

      TROJAN HORSE

    Correct Answer
    D. TROJAN HORSE
    Explanation
    A Trojan horse is a type of malicious software that is disguised as a useful application. It tricks users into downloading and installing it, often by pretending to be a legitimate program or by hiding within another program. Once inside a device, a Trojan horse can perform various harmful actions, such as stealing personal information, damaging files, or allowing unauthorized access to the device. Unlike viruses, which can replicate and spread themselves, Trojan horses rely on user interaction to be installed. Therefore, they can be particularly dangerous as users may unknowingly invite them into their devices.

    Rate this question:

  • 13. 

    Also known as End User License Agreement (EULA). The software license is a legally binding agreement that states how one who has purchased the rights to use software, can legally use the software.

    • A.

      ACCEPTABLE USE POLICY

    • B.

      FAIR USE AND MULTIMEDIA GUIDELINES

    • C.

      SOFTWARE LICENSE

    • D.

      COPYRIGHT

    Correct Answer
    C. SOFTWARE LICENSE
    Explanation
    The given correct answer is "SOFTWARE LICENSE". A software license is a legally binding agreement that outlines the terms and conditions under which a user can legally use the software they have purchased. It grants the user the rights to use the software while also specifying any restrictions or limitations on its use. This agreement ensures that the software is used in compliance with copyright laws and protects the rights of the software developer or owner.

    Rate this question:

  • 14. 

    Technology that prevents users from visiting inappropriate web sites, and protects the network from unauthorized users.

    • A.

      ANTI VIRUS SOFTWARE

    • B.

      FIREWALL

    • C.

      WORM

    • D.

      PROPRIETARY SOFTWARE

    Correct Answer
    B. FIREWALL
    Explanation
    A firewall is a technology that prevents users from visiting inappropriate web sites and also protects the network from unauthorized users. It acts as a barrier between a trusted internal network and an untrusted external network, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. By filtering and blocking certain types of traffic, a firewall helps to prevent unauthorized access to a network and ensures that users are unable to access inappropriate or potentially harmful websites.

    Rate this question:

  • 15. 

    Which if the following would be an example of an emerging technology 5-10 years ago?

    • A.

      TEXT MESSAGING

    • B.

      EMAIL

    • C.

      CALLER-ID ON CELL PHONES

    • D.

      GPS ON CELL PHONES

    Correct Answer
    D. GPS ON CELL PHONES
    Explanation
    GPS on cell phones would be an example of an emerging technology 5-10 years ago because during that time period, the integration of GPS technology into cell phones was still a relatively new and developing concept. As smartphones became more prevalent, GPS capabilities became a standard feature, allowing users to access navigation and location-based services directly from their mobile devices. This advancement in technology opened up new possibilities for navigation, transportation, and location-based applications, making GPS on cell phones an emerging technology during that time.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 01, 2010
    Quiz Created by
    Uncwcsb02
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.