100% found this document useful (1 vote)
306 views2 pages

Form 2s Multiple Choice Quiz 1 - Computer Ethics

The document contains a 10 question multiple choice quiz about types of computer crimes and forms of cybercrime. The quiz questions cover topics like software piracy, cyber bullying, hacking, and identity theft.

Uploaded by

daneydane83
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
306 views2 pages

Form 2s Multiple Choice Quiz 1 - Computer Ethics

The document contains a 10 question multiple choice quiz about types of computer crimes and forms of cybercrime. The quiz questions cover topics like software piracy, cyber bullying, hacking, and identity theft.

Uploaded by

daneydane83
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Form 2s Multiple Choice Quiz 1

 To steal a person’s identity


 To cause mischief to computers on the internet
 To bully persons
 To pirate software

1. All of the above are _____________.


A. Types of computer crimes
B. Forms of computer crimes
C. Reasons for computer crimes
D. Methods of computer crimes

2. Which of the following is not a form of computer crime?


A. Piracy
B. Hacking
C. Hawking
D. Cracking

3. The use of computer based devices by kids in order to harass and threaten……
A. Fraud
B. Plagiarism
C. Cyber Stalking
D. Cyber Bullying

4. What is cyber bulling by proxy?


A. When cyber bulling is done within the close proximity of the person affected
B. When the cyber bulling is done approximately online
C. When the cyber bulling is done on a proxy portal
D. When the cyber bulling is done through the use of someone else

5. The illegal downloading or copying of proprietary material for person use or sharing with
others.
A. Plagiarism
B. Copyright infringement
C. Piracy
D. Hard disk loading

6. What are too types of software piracy?


A. CD and DVD
B. Internet and Counterfeiting
C. Online and offline
D. Hard disk loading and Proxy
7. Which is NOT a type of software piracy
A. End user piracy
B. Client server overuse
C. Hard disk loading
D. Soft disk loading

8. This is when someone poses as someone else online in order to carry out activities on that
person’s behalf illegally.
A. Cyber Stalking
B. Phishing
C. Fraud
D. Cyber Bullying

9. Looking over or around someone’s shoulder or arm in order to obtain personal data is
called
A. Phishing
B. Peeking
C. shoulder Surfing
D. Cyber Stalking

10. The process of gaining unauthorized access into proprietary software or computer games
is known as….
A. Debugging
B. Cracking
C. Hacking
D. Shoulder Surfing

You might also like