Professional Practices MCQs
Professional Practices MCQs
Professional Practices MCQs
Correct Option: c
2. ____ is a self- replicating program that can cause damage to data and files stored on your computer.
a. Freeware
b. Piracy
c. errors
d. Virus
Correct Option: d
3. ____ is a set of rules for determining moral standards or socially acceptable behaviour.
a. rules
b. Ethics
c. Standard
d. protocol
Correct Option: b
Correct Option: b
5. ____ refers to software setups that permit only authorized access to the system.
a. Personal security
b. Physical security
c. physical security
d. none of these
Correct Option: a
6. _____ refers to protecting data and computer system against dishonesty or negligence of employees.
a. personnel security
b. physical security
c. Personal security
d. none of these
Correct Option: a
Correct Option: c
Correct Option: b
9. A hacker contacts your phone or E-mail and attempts to acquire your password is called
a. Phishing
b. Spoofing
c. Spamming
d. none of these
Correct Option: a
10. A trademark is a distinctive sign that identifies certain goods or services produced or provided by an individual
or a company
a. TRUE
b. FALSE
Correct Option: a
Correct Option: d
Correct Option: b
Correct Option: a
Correct Option: a
15. Computer ethics has its roots in the work of ___ during World War II.
a. Norbert Wiener
b. Blaise Pascal
c. Charles Babbage
d. Hermen Horllerith
Correct Option: a
16. Copyright and related rights protection is an essential component in fostering human creativity and innovation
a. TRUE
b. FALSE
Correct Option: a
17. Copyright law gives _________ exclusive rights to the owner of copyright
a. 2
b. 4
c. 6
d. 3
Correct Option: c
Correct Option: b
Correct Option: d
20. Hackers try out all the combination of all keyboard letters
a. Brute force
b. Dictionary based
c. both a & b
d. none of these
Correct Option: a
21. __________ is a sign used on goods that have a specific geographical origin and possess qualities or a
reputation due to that place of origin
a. intellectual property
b. ethics
c. Geographical Indication
d. trade mark
Correct Option: c
Correct Option: d
23. Making and using duplicate hardware and software is called ___
a. trade
b. Privacy
c. Free copy
d. copyright
Correct Option: b
24. Patents are granted by national patent offices or by regional offices that carry out examination work for a group
of countries
a. TRUE
b. FALSE
Correct Option: a
Correct Option: d
Correct Option: a
Correct Option: a
Correct Option: c
Correct Option: b
30. Running other software on idle computer without the knowledge of the organization is called theft of ____
a. Computer time
b. Computer
c. software
d. hardware
Correct Option: a
Correct Option: c
Correct Option: b
34. Tester is told everything about the network topology and technology and is authorized to interview IT
personnel
a. red box model
b. white box model
c. Black box model
d. gray box model
Correct Option: b
Correct Option: c
Correct Option: d
38. The name under which a product is sold may be registered as a
a. copyright
b. Designs Registry
c. trade mark
d. patent
Correct Option: c
39. The protection of hardware, facilities magnetic disks, and other illegally accessed, stolen, damaged or destroyed
items refers to ____
a. Physical security
b. Personal security
c. Personnel security
d. none of these
Correct Option: a
Correct Option: a
41. The transition to —————- is generally an ambiguous concept for students at this stage in
spite of many great ideas that occupies their minds.
a. entrepreneurship
b. intellectual property rights
c. trade mark
d. none of these
Correct Option: a
Correct Option: b
43. Traits of a Profession
a. regulation
b. Personal standards of excellence
c. rules
d. moral ethics
Correct Option: b
Correct Option: a
Correct Option: a
Correct Option: d
Correct Option: d
48. Which of the following is not related to security mechanism
a. ecash
b. encryption
c. decryption
d. all of these
Correct Option: a
49. Who among the following began to examine unethical and illegal uses of computers by computer professionals
in mid 1960s Menlo Park, California?
a. Willion
b. Donn Parker
c. Norbert Wiener
d. Bill Gates
Correct Option: b
50. You can protect sensitive data from prying eyes using
a. Password Hacking
b. encryption
c. file permission
d. file locks
Correct Option: c