Form 2s Multiple Choice Quiz 1 - Computer Ethics
Form 2s Multiple Choice Quiz 1 - Computer Ethics
3. The use of computer based devices by kids in order to harass and threaten……
A. Fraud
B. Plagiarism
C. Cyber Stalking
D. Cyber Bullying
5. The illegal downloading or copying of proprietary material for person use or sharing with
others.
A. Plagiarism
B. Copyright infringement
C. Piracy
D. Hard disk loading
8. This is when someone poses as someone else online in order to carry out activities on that
person’s behalf illegally.
A. Cyber Stalking
B. Phishing
C. Fraud
D. Cyber Bullying
9. Looking over or around someone’s shoulder or arm in order to obtain personal data is
called
A. Phishing
B. Peeking
C. shoulder Surfing
D. Cyber Stalking
10. The process of gaining unauthorized access into proprietary software or computer games
is known as….
A. Debugging
B. Cracking
C. Hacking
D. Shoulder Surfing