Ten Commandments Of Computer Ethics! Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Mcobb
M
Mcobb
Community Contributor
Quizzes Created: 1 | Total Attempts: 3,221
Questions: 11 | Attempts: 3,221

SettingsSettingsSettings
Ten Commandments Of Computer Ethics! Quiz - Quiz

Below is a Trivia Questions Quiz on the Ten Commandments of Computer Ethics! Computers are private since they hold a lot of useful information, and as you use them, you are expected to follow some rules every time you use a computer. Take this quiz, and see if you know them all, and if you don’t get the entire answers correct, feel free to take the quiz as much as you need to.


Questions and Answers
  • 1. 

    Jules has walked away from a lab computer without logging off. Trish sits down and, still logged in as Jules, sends inflammatory e-mail messages out to several students and posts similar messages on the class newsgroup.

    • A.

      Thou shall not use a computer to harm other people

    • B.

      Thou shall not use other people's computer resources without authorization

    • C.

      Thou shall use a computer in ways that show consideration and respect.

    • D.

      Thou shall not use a computer to steal.

    Correct Answer
    B. Thou shall not use other people's computer resources without authorization
    Explanation
    The given answer, "Thou shall not use other people's computer resources without authorization," is the correct choice because Trish, by using Jules' logged-in account without permission, is accessing and utilizing someone else's computer resources without authorization. This action goes against ethical guidelines and principles, as it violates the privacy and security of Jules' account and can cause harm to both Jules and the recipients of the inflammatory messages.

    Rate this question:

  • 2. 

    Lester sends an e-mail to the entire student body inviting them to a BYOB party at his house while his parents are out of town. Lester receives a message from a system administrator calling him in for a meeting with school officials. He objects because he feels that his e-mail is his own private business.

    • A.

      Thou shall not snoop around in other people's files

    • B.

      Thou shall not appropriate other people's intellectual output.

    • C.

      Thou shall think about the social consequences of the program you write.

    • D.

      Thou shall not interfere with other people's computer work.

    Correct Answer
    C. Thou shall think about the social consequences of the program you write.
    Explanation
    The correct answer is "Thou shall think about the social consequences of the program you write." This answer aligns with the situation described in the question. Lester, by sending an e-mail to the entire student body inviting them to a party, is potentially causing social consequences for himself and others. The system administrator calling him in for a meeting suggests that his actions have been noticed and may have negative repercussions. This answer emphasizes the importance of considering the impact of one's actions on others in the context of computer programming.

    Rate this question:

  • 3. 

    It seems like every time Melanie logs on to her account, Stanley knows about it and sends messages that cover her screen with text. At first, she thinks it is funny, but now it's really starting to bother her. The messages reformat the text on her screen and, besides, its kind of creepy the way he always knows she’s logged on.

    • A.

      Thou shall not interfere with other people's computer work.

    • B.

      Thou shall think about the social consequences of the program you write.

    • C.

      Thou shall not use or copy commercial software for which you have not paid.

    • D.

      Thou shall not use a computer to harm other people.

    Correct Answer
    A. Thou shall not interfere with other people's computer work.
    Explanation
    The given correct answer, "Thou shall not interfere with other people's computer work," is the most appropriate explanation for the situation described. In this case, Stanley is intentionally sending messages that disrupt Melanie's computer work and invade her privacy by knowing when she logs on. This behavior goes against the principle of not interfering with other people's computer work and can be seen as a violation of personal boundaries. It is important to respect others' privacy and not disrupt their work or activities on their computer.

    Rate this question:

  • 4. 

    Sharon and Timothy are students at Big Suburban High School. They have designed a Web page devoted to their favorite rock band using their personal disk space on the school's Web server. They have posted song clips, lyrics, photographs of each band member, and articles they have found in various Web news sources. However, school authorities have asked them to shut down their site because of the obscene content of many of the lyrics. Sharon and Timothy object, noting that their First Amendment (free speech) rights are being violated. Is this a violation of the ten commandments?  

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 5. 

    A secretary on the campus of a tax-supported university has been requested to give her staff a password to her supervisor. The supervisor would like to check the secretary’s e-mail when she is not at work to see if departmental-related mail is coming in. The secretary is not comfortable giving her password to her supervisor but is afraid to say no.

    • A.

      Thou shall not snoop around in other people's files

    • B.

      Thou shall not appropriate other people's intellectual output.

    • C.

      Thou shall not use a computer to bear false witness

    • D.

      Thou shall use a computer in ways that show consideration and respect.

    Correct Answer
    D. Thou shall use a computer in ways that show consideration and respect.
    Explanation
    The correct answer suggests that the secretary should use a computer in ways that show consideration and respect. This means that the secretary should not give her password to her supervisor, as it would be disrespectful and a violation of privacy to snoop around in other people's files. The secretary should assert her boundaries and communicate her discomfort with giving her password, while maintaining professionalism and respect towards her supervisor.

    Rate this question:

  • 6. 

    Tina's e-mail is being diverted and sent out to her entire class. The messages are quite personal and Tina is very embarrassed. Is this a violation of any commandments?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Yes, this situation can be seen as a violation of the commandment "Thou shalt not bear false witness against thy neighbor" as Tina's e-mail is being diverted and sent without her consent, causing embarrassment and potentially spreading false information. Additionally, it can also be seen as a violation of the commandment "Thou shalt not steal" as her personal messages are being taken and shared without her permission. Therefore, the answer "True" is correct.

    Rate this question:

  • 7. 

    Russ has been an active participant at a chat site for teens. He knows a few of the people in "real life," but many live in other cities. One of them, Stuart, will be coming through town in a few weeks and wants to get together. He asks Russ for his home phone number and address. Russ suggests that they just meet at the mall, and Stuart agrees but wants Russ's home info anyway in case he's delayed.

    • A.

      4.Thou shall not use a computer to steal.

    • B.

      10.Thou shall use a computer in ways that show consideration and respect.

    • C.

      9.Thou shall think about the social consequences of the program you write.

    • D.

      7.Thou shall not use other people's computer resources without authorization

    Correct Answer
    C. 9.Thou shall think about the social consequences of the program you write.
  • 8. 

    Marla figures out that when she is logged into the server, she can look at others' directories, make copies of files, and deposit new files. The operating system was designed to allow this functionality so that people could share their work. Mr. Klausinsky objects when he observes Marla poking around in another student's directory. But Marla responds by saying, "If the system allows me to do it and there's no specific rule against it, what's the problem?"

    • A.

      3.Thou shall not snoop around in other people's files.

    • B.

      5.Thou shall not use a computer to bear false witness.

    • C.

      2.Thou shall not interfere with other people's computer work

    • D.

      1.Thou shall not use a computer to harm other people.

    Correct Answer
    A. 3.Thou shall not snoop around in other people's files.
    Explanation
    Marla's statement, "If the system allows me to do it and there's no specific rule against it, what's the problem?", suggests that she believes it is acceptable to access and explore other people's directories on the server. However, the correct answer, "Thou shall not snoop around in other people's files", contradicts Marla's belief. This commandment implies that it is not appropriate to invade someone's privacy by accessing their files without permission, even if the operating system allows it and there is no explicit rule prohibiting it. Marla's actions are therefore in violation of this commandment.

    Rate this question:

  • 9. 

    Thou shalt not copy ___________________________ software or materials.

    • A.

      Public-domain

    • B.

      Self-published

    • C.

      Self-created

    • D.

      Copyrighted

    Correct Answer
    D. Copyrighted
    Explanation
    The phrase "Thou shalt not copy" indicates that copying is prohibited. The word "copyrighted" refers to materials that are protected by copyright law, which means they are owned by someone and copying them without permission is illegal. Therefore, the correct answer is "copyrighted" as it aligns with the prohibition on copying mentioned in the statement.

    Rate this question:

  • 10. 

    What is computer ethics? 

    • A.

      An honest, moral code that should be followed when on the computer

    • B.

      A computer program about honesty

    • C.

      A list of commandments in the Bible

    • D.

      An arbitrary set of rules

    Correct Answer
    A. An honest, moral code that should be followed when on the computer
    Explanation
    Computer ethics refers to the principles and guidelines that govern the ethical behavior of individuals when using computers. It involves adhering to a code of honesty and morality while engaging with computer technology. This includes respecting privacy, avoiding plagiarism, not engaging in cyberbullying or hacking, and using computer resources responsibly. It is a set of standards that helps individuals make ethical decisions and ensures the proper and responsible use of computers and technology.

    Rate this question:

  • 11. 

    Which is NOT a consequence of copying or distributing copyrighted software?

    • A.

      Community Service

    • B.

      Imprisonment

    • C.

      Up to $10,000 in legal fees

    • D.

      Up to $50,000 in civil fees

    Correct Answer
    A. Community Service
    Explanation
    Copying or distributing copyrighted software without permission is illegal and can result in various consequences. Imprisonment, up to $10,000 in legal fees, and up to $50,000 in civil fees are all potential consequences of such actions. However, community service is not typically a consequence of copying or distributing copyrighted software.

    Rate this question:

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.