ethics Interview Questions and Answers
Ques:- You can protect sensitive data from prying eyes using
A. File permissions
B. File locks
C. Passwords
D. Encryption
Ques:- A hacker contacts your phone or E-mail and attempts to acquire your password is called
A. Spamming
B. Spoofing
C. Phishing
D. None of these
Ques:- Which of the following is not a way of protection?
A. Physical Security
B. Personal Security
C. Piracy
D. Personnel security
Ques:- Who among the following began to examine unethical and illegal uses of computers by computer professionals in mid 1960s Menlo Park, California?
A. Charles Babbage
B. Bill Gates
C. Norbert Wiener
D. Donn Parker
Ques:- General guidelines of computer ethics are needed for ____
A. Cracking
B. Computer crime
C. Protection of personal data
D. All the above
Ques:- “Cracking” comes under ____
A. Website Service
B. Transcription
C. Computer Crime
D. Data Security
Ques:- ____ is the illegal access to the network or computer system.
A. Security
B. Cracking
C. Virus
D. Piracy
Ques:- ____ is a set of rules for determining moral standards or socially acceptable behaviour.
A. Protocol
B. Standard
C. Ethics
D. None of the given
Ques:- Running other software on idle computer without the knowledge of the organization is called theft of ____
A. Software
B. Computer
C. Computer time
D. Use
Ques:- _____ refers to protecting data and computer system against dishonesty or negligence of employees.
A. Personnel security
B. Personal security
C. Physical security
D. None of these
Ques:- Computer ethics has its roots in the work of ___ during World War II.
A. Hermen Horllerith
B. Norbert Wiener
C. Blaise Pascal
D. Charles Babbage
Ques:- ____ is a self- replicating program that can cause damage to data and files stored on your computer.
A. Virus
B. Freeware
C. Piracy
D. None of the given
Ques:- Making and using duplicate hardware and software is called ___
A. Piracy
B. Free copy
C. Copy right
D. None of these
Ques:- The protection of hardware, facilities magnetic disks, and other illegally accessed, stolen, damaged or destroyed items refers to ____
A. Physical security
B. Personal security
C. Personnel security
D. None of the given
Ques:- ____ refers to software setups that permit only authorized access to the system.
A. Personnel security
B. Personal security
C. Physical security
D. None of these