0% found this document useful (0 votes)
1K views

Business Ethics Multiple Choice Questions & Answers PDF: Ans: B Norbert Wiener

This document contains 10 multiple choice questions about business ethics and computer ethics terms. The questions cover topics like the origins of computer ethics, definitions of common terms like viruses, piracy, cracking and their relation to computer crime and ethics. The document tests understanding of concepts like physical security, personal security and how general guidelines around computer ethics can help with protection of personal data and preventing computer crimes.

Uploaded by

Tesfaye Girma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views

Business Ethics Multiple Choice Questions & Answers PDF: Ans: B Norbert Wiener

This document contains 10 multiple choice questions about business ethics and computer ethics terms. The questions cover topics like the origins of computer ethics, definitions of common terms like viruses, piracy, cracking and their relation to computer crime and ethics. The document tests understanding of concepts like physical security, personal security and how general guidelines around computer ethics can help with protection of personal data and preventing computer crimes.

Uploaded by

Tesfaye Girma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Business Ethics Multiple Choice Questions & Answers Pdf

Question: 1

Computer ethics has its roots in the work of ___ during World
War II.

(A) Hermen Horllerith

(B) Norbert Wiener

(C) Blaise Pascal

(D) Charles Babbage

Ans: B

Norbert Wiener

Question: 2

____ is a self- replicating program that can cause damage to data


and files stored on your computer.

(A) Virus

(B) Freeware

(C) Piracy

(D) None of the given

Ans: A

Virus
Question: 3

Making and using duplicate hardware and software is called ___

(A) Piracy

(B) Free copy

(C) Copy right

(D) None of these

Ans: A

Piracy

Question: 4

The protection of hardware, facilities magnetic disks, and other


illegally accessed, stolen, damaged or destroyed items refers to
____

(A) Physical security

(B) Personal security

(C) Personnel security

(D) None of the given

Ans: A

Physical security

Question: 5
____ refers to software setups that permit only authorized access
to the system.

(A) Personnel security

(B) Personal security

(C) Physical security

(D) None of these

Ans: B

Personal security

Question: 6

General guidelines of computer ethics are needed for ____

(A) Cracking

(B) Computer crime

(C) Protection of personal data

(D) All the above

Ans: D

All the above

Question: 7

“Cracking” comes under ____

(A) Website Service


(B) Transcription

(C) Computer Crime

(D) Data Security

Ans: C

Computer Crime

Question: 8

____ is the illegal access to the network or computer system.

(A) Security

(B) Cracking

(C) Virus

(D) Piracy

Ans: B

Cracking

Question: 9

____ is a set of rules for determining moral standards or socially


acceptable behaviour.

(A) Protocol

(B) Standard

(C) Ethics
(D) None of the given

Ans: C

Ethics

Question: 10

Running other software on idle computer without the knowledge


of the organization is called theft of ____

(A) Software

(B) Computer

(C) Computer time

(D) Use

Ans: C

Computer time

You might also like