ethics

Ques:- You can protect sensitive data from prying eyes using
A. File permissions
B. File locks
C. Passwords
D. Encryption

0 9398
Ques:- A hacker contacts your phone or E-mail and attempts to acquire your password is called
A. Spamming
B. Spoofing
C. Phishing
D. None of these

0 7217
Ques:- Which of the following is not a way of protection?
A. Physical Security
B. Personal Security
C. Piracy
D. Personnel security

0 6585
Ques:- General guidelines of computer ethics are needed for ____
A. Cracking
B. Computer crime
C. Protection of personal data
D. All the above

0 3063
Ques:- “Cracking” comes under ____
A. Website Service
B. Transcription
C. Computer Crime
D. Data Security

0 8077
Ques:- ____ is the illegal access to the network or computer system.
A. Security
B. Cracking
C. Virus
D. Piracy

0 6610
Ques:- ____ is a set of rules for determining moral standards or socially acceptable behaviour.
A. Protocol
B. Standard
C. Ethics
D. None of the given

0 8043
Ques:- _____ refers to protecting data and computer system against dishonesty or negligence of employees.
A. Personnel security
B. Personal security
C. Physical security
D. None of these

0 4329
Ques:- Computer ethics has its roots in the work of ___ during World War II.
A. Hermen Horllerith
B. Norbert Wiener
C. Blaise Pascal
D. Charles Babbage

0 1179
Ques:- ____ is a self- replicating program that can cause damage to data and files stored on your computer.
A. Virus
B. Freeware
C. Piracy
D. None of the given

0 9210
Ques:- Making and using duplicate hardware and software is called ___
A. Piracy
B. Free copy
C. Copy right
D. None of these

0 3153
Ques:- The protection of hardware, facilities magnetic disks, and other illegally accessed, stolen, damaged or destroyed items refers to ____
A. Physical security
B. Personal security
C. Personnel security
D. None of the given

0 8607
Ques:- ____ refers to software setups that permit only authorized access to the system.
A. Personnel security
B. Personal security
C. Physical security
D. None of these

0 4747
Scroll to top