Ten Commandments Of Computer Ethics! Quiz

  • ACM Code of Ethics
  • IEEE CS/ACM Code of Ethics
Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Mcobb
M
Mcobb
Community Contributor
Quizzes Created: 1 | Total Attempts: 4,066
| Attempts: 4,066 | Questions: 11
Please wait...
Question 1 / 11
0 %
0/100
Score 0/100
1. What is computer ethics? 

Explanation

Computer ethics refers to the principles and guidelines that govern the ethical behavior of individuals when using computers. It involves adhering to a code of honesty and morality while engaging with computer technology. This includes respecting privacy, avoiding plagiarism, not engaging in cyberbullying or hacking, and using computer resources responsibly. It is a set of standards that helps individuals make ethical decisions and ensures the proper and responsible use of computers and technology.

Submit
Please wait...
About This Quiz
Ten Commandments Of Computer Ethics! Quiz - Quiz

Below is a Trivia Questions Quiz on the Ten Commandments of Computer Ethics! Computers are private since they hold a lot of useful information, and as you use them, you are expected to follow some rules every time you use a computer. Take this quiz, and see if you know... see morethem all, and if you don’t get the entire answers correct, feel free to take the quiz as much as you need to. see less

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Tina's e-mail is being diverted and sent out to her entire class. The messages are quite personal and Tina is very embarrassed. Is this a violation of any commandments?

Explanation

Yes, this situation can be seen as a violation of the commandment "Thou shalt not bear false witness against thy neighbor" as Tina's e-mail is being diverted and sent without her consent, causing embarrassment and potentially spreading false information. Additionally, it can also be seen as a violation of the commandment "Thou shalt not steal" as her personal messages are being taken and shared without her permission. Therefore, the answer "True" is correct.

Submit
3. Thou shalt not copy ___________________________ software or materials.

Explanation

The phrase "Thou shalt not copy" indicates that copying is prohibited. The word "copyrighted" refers to materials that are protected by copyright law, which means they are owned by someone and copying them without permission is illegal. Therefore, the correct answer is "copyrighted" as it aligns with the prohibition on copying mentioned in the statement.

Submit
4. Which is NOT a consequence of copying or distributing copyrighted software?

Explanation

Copying or distributing copyrighted software without permission is illegal and can result in various consequences. Imprisonment, up to $10,000 in legal fees, and up to $50,000 in civil fees are all potential consequences of such actions. However, community service is not typically a consequence of copying or distributing copyrighted software.

Submit
5. Marla figures out that when she is logged into the server, she can look at others' directories, make copies of files, and deposit new files. The operating system was designed to allow this functionality so that people could share their work. Mr. Klausinsky objects when he observes Marla poking around in another student's directory. But Marla responds by saying, "If the system allows me to do it and there's no specific rule against it, what's the problem?"

Explanation

Marla's statement, "If the system allows me to do it and there's no specific rule against it, what's the problem?", suggests that she believes it is acceptable to access and explore other people's directories on the server. However, the correct answer, "Thou shall not snoop around in other people's files", contradicts Marla's belief. This commandment implies that it is not appropriate to invade someone's privacy by accessing their files without permission, even if the operating system allows it and there is no explicit rule prohibiting it. Marla's actions are therefore in violation of this commandment.

Submit
6. Jules has walked away from a lab computer without logging off. Trish sits down and, still logged in as Jules, sends inflammatory e-mail messages out to several students and posts similar messages on the class newsgroup.

Explanation

The given answer, "Thou shall not use other people's computer resources without authorization," is the correct choice because Trish, by using Jules' logged-in account without permission, is accessing and utilizing someone else's computer resources without authorization. This action goes against ethical guidelines and principles, as it violates the privacy and security of Jules' account and can cause harm to both Jules and the recipients of the inflammatory messages.

Submit
7. Sharon and Timothy are students at Big Suburban High School. They have designed a Web page devoted to their favorite rock band using their personal disk space on the school's Web server. They have posted song clips, lyrics, photographs of each band member, and articles they have found in various Web news sources. However, school authorities have asked them to shut down their site because of the obscene content of many of the lyrics. Sharon and Timothy object, noting that their First Amendment (free speech) rights are being violated. Is this a violation of the ten commandments?  

Explanation

not-available-via-ai

Submit
8. Lester sends an e-mail to the entire student body inviting them to a BYOB party at his house while his parents are out of town. Lester receives a message from a system administrator calling him in for a meeting with school officials. He objects because he feels that his e-mail is his own private business.

Explanation

The correct answer is "Thou shall think about the social consequences of the program you write." This answer aligns with the situation described in the question. Lester, by sending an e-mail to the entire student body inviting them to a party, is potentially causing social consequences for himself and others. The system administrator calling him in for a meeting suggests that his actions have been noticed and may have negative repercussions. This answer emphasizes the importance of considering the impact of one's actions on others in the context of computer programming.

Submit
9. It seems like every time Melanie logs on to her account, Stanley knows about it and sends messages that cover her screen with text. At first, she thinks it is funny, but now it's really starting to bother her. The messages reformat the text on her screen and, besides, its kind of creepy the way he always knows she's logged on.

Explanation

The given correct answer, "Thou shall not interfere with other people's computer work," is the most appropriate explanation for the situation described. In this case, Stanley is intentionally sending messages that disrupt Melanie's computer work and invade her privacy by knowing when she logs on. This behavior goes against the principle of not interfering with other people's computer work and can be seen as a violation of personal boundaries. It is important to respect others' privacy and not disrupt their work or activities on their computer.

Submit
10. Russ has been an active participant at a chat site for teens. He knows a few of the people in "real life," but many live in other cities. One of them, Stuart, will be coming through town in a few weeks and wants to get together. He asks Russ for his home phone number and address. Russ suggests that they just meet at the mall, and Stuart agrees but wants Russ's home info anyway in case he's delayed.

Explanation

not-available-via-ai

Submit
11. A secretary on the campus of a tax-supported university has been requested to give her staff a password to her supervisor. The supervisor would like to check the secretary's e-mail when she is not at work to see if departmental-related mail is coming in. The secretary is not comfortable giving her password to her supervisor but is afraid to say no.

Explanation

The secretary's supervisor's request to check the secretary's email when she is not at work is a violation of the commandment "Thou shalt not snoop around in other people's files." The secretary's email is her private space, and her supervisor should not have access to it without her permission. The secretary has a right to refuse her supervisor's request, and her supervisor should respect her privacy.

Submit
View My Results

Quiz Review Timeline (Updated): Jan 20, 2025 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 20, 2025
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 28, 2019
    Quiz Created by
    Mcobb
Cancel
  • All
    All (11)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is computer ethics? 
Tina's e-mail is being diverted and sent out to her entire class....
Thou shalt not copy ___________________________ software or materials.
Which is NOT a consequence of copying or distributing copyrighted...
Marla figures out that when she is logged into the server, she can...
Jules has walked away from a lab computer without logging off. Trish...
Sharon and Timothy are students at Big Suburban High School. They have...
Lester sends an e-mail to the entire student body inviting them to a...
It seems like every time Melanie logs on to her account, Stanley knows...
Russ has been an active participant at a chat site for teens. He knows...
A secretary on the campus of a tax-supported university has been...
Alert!

Advertisement