| Question | Answer |
| An individual or an association can be illegitimately dependable, or then again at risk, for an issue. [T/F] | False |
| All actions are considered mischief to the general public, except:
- security intrusion
- the spread of fake news
- various issues identifying with the utilization of the internet
- responsible viewing of private documents | responsible viewing of private documents |
| We should be inclined and ____ in understanding the responsibilities that comes in pursuing the career as computing professionals. | COGNIZANT |
| The business relationship is ____ binding. | LEGALLY |
| Computing professionals, as a part of society, have social and ____ duties. Choose the best answer
Group of answer choices
Professional
Moral
Personal
Family | Moral |
| The association could be obliged for harm in a common claim.
Group of answer choices
True
False | True |
| Computing presents a specific case for understanding the job of innovation in moral responsibility.
Group of answer choices
True
False | True |
| How do you make every task achievable in computing profession?
Group of answer choices
Partners
Teamwork
None of the choices
Individual | Teamwork |
| We must follow the guidelines legally by the government. [T/F] | True |
| As upcoming IT professionals, we should be inclined and cognizant in understanding the responsibilities that comes in pursuing the career as computing professionals. [T/F] | True |
| In every action there are consequences.
Group of answer choices
True
False | True |
| Not only will others be greatly affected by the consequences of our doings, but our own image.
Group of answer choices
True
False | True |
| There are specific roles that we must play that come from this profession.
Group of answer choices
True
False | True |
| We are playing a proactive role in advancing social obligations by utilizing PCs and disheartening those activities that mischief our general public.
Group of answer choices
True
False | True |
| These professional standards incorporate not just consideration regarding specialized magnificence yet in addition concern for the social impacts of computers on administrators, clients, and general society.
Group of answer choices
True
False | True |
| How many moral responsibilities are there in computing?
Group of answer choices
3
2
Five
Four | 3 |
| Computing professionals share this exceptional obligation to ensure the safety of the public and to improve the quality of life of the individuals who use computers and information systems.
Group of answer choices
True
False | True |
| No task is made achievable with a team working beside you.
Group of answer choices
True
False | False |
| Learn to be a ___ player.
Group of answer choices
Both single and multi
Single
Multi
Team | Team |
| What should we understand as an upcoming IT Professional?
Group of answer choices
Education
Resposibilities
Innovation
Knowledge and skills | Responsibilities |
| Know what specific career that relates to IT we should embark and give our full devotion to.
Group of answer choices
True
False | False |
| Only a few computing professionals work for employers.
Group of answer choices
True
False | False |
| As an aspiring computer professional you need to have determination in order to complete every task that are up ahead.
Group of answer choices
True
False | True |
| Legal Responsibility is a responsibility of a computing professional.
Group of answer choices
True
False | False |
| To be able to complete the challenges that we face, being satisfied with your own work and the ______ you're working with. | PEOPLE |
| What states that “regardless of whether a computing professional fills in as an expert to an individual or as an employee in a large organization, the professional is obligated to perform assigned tasks properly”? | Professional Standards |
| Installed on your computer without your knowledge, it is designed to track your browsing habits and internet activity.
Group of answer choices
Spyware
Adware
Ransomware
Malware | Spyware |
| Software License allows the use of digital material by following the license agreement.
Group of answer choices
True
False | True |
| It is an unlawful intrusion into a computer or a network. _________________________ | HACKING |
| Be careful when using sarcasm or humor.
Group of answer choices
True
False | True |
| A way of breaking into a system by getting past the security features of the system. | CRACKING |
| This emoticon :) is a __.
Group of answer choices
Sad
Angry
Blessed
Smile | Smile |
| It is the internet's version of junk mail. ______________ | SPAM |
| All are crimes in computers, except:
Group of answer choices
Data Security
Electronic Fraud
IT Infrastructure
Misuse of device | Data Security |
| A message that reveals a solution to a game or ending to a movie or program. | SPOILER |
| Spam is a(n) unsolicited e-mail message or newsgroup sent to many recipients at once.
Group of answer choices
True
False | True |
| An emoticon expresses a(n) __________.
Group of answer choices
EMOTIONS
EMOTION | EMOTION |
| Ethics illustrates society's views about what is right and what is wrong.
Group of answer choices
True
False | True |
| Copyright protection is available for original works of authorship that are fixed in a tangible form, whether published or unpublished.
Group of answer choices
True
False | True |
| Ethics is derived from what Greek word? | ETHOS |
| People do realize how vulnerable information stored on computers is.
Group of answer choices
True
False | |
| The only way to stay protected or remove a malware infection is by using anti-malware software, or antivirus.
Group of answer choices
True
False | True |
| It's like stealing someone else's work and releasing it as your own work. | PLAGIARISM |
| It's like stealing someone else's work and releasing it as your own work. | CITATION |
| Ethics are strictly implemented, and we should follow it.
Group of answer choices
True
False | False |
| Thou Shalt Not Use A Computer To ______ Other People. | HARM |
| It is important to “think before you click.”
Group of answer choices
True
False | True |
| Users are not granted licenses to use the material based on the agreement.
Group of answer choices
True
False | True* |
| In copyright, whatever idea the author created cannot be employed or disseminated by anyone else without the ______ of the author.
Group of answer choices
Permission
Given
None of the choices
Advice | Permission |
| It's a way of skipping the registration and authentication steps when installing a software.
Group of answer choices
True
False | True |
| Thou Shalt Not __ With Other People's Computer Work. | INTERFERE |
| Be _____________ of other's mistakes. | FORGIVING |
| Using sarcasm and humor might be misinterpreted.
Group of answer choices
True
False | True |
| It is important to use meaningful subject lines.
Group of answer choices
True
False | True |
| Thou Shalt Not Use Other People's Computer Resources Without ______________ or Proper Compensation. | AUTHORIZATION |
| Netiquette is about the various risks related to using the Internet.
Group of answer choices
True
False | True |
| What does “FAQ” mean? | FREQUENTLY ASKED QUESTIONS |
| Do not assume material is accurate or up-to-date.
Group of answer choices
True
False | True |
| _______________________ defined as the application of classical ethical principles to the use of computer technology. | COMPUTER ETHICS |
| They are designed to damage their target computer by corrupting data, reformatting your hard disk, or completely shutting down your system. __________________ | VIRUS |
| Ethics is a set of morals that governs the use of computers.
Group of answer choices
True
False | False |
| You don't need to read the FAQ even when it's there.
Group of answer choices
True
False | False |
| Thou Shalt Not Use A Computer To Bear ______ Witness. | False |
| What does it mean if you use all capital letters? | SHOUTING |
| A virus cannot copy itself and spread to other computers by attaching itself to programs and executing code when a user runs the infected program.
Group of answer choices
True
False | False |
| What does ethos mean, aside from “way of living” and “habit”? | CUSTOM |
| It is about the various risks related to using the Internet. | NETIQUETTE |
| Thou Shalt Not _____________ in Other People's Computer Files. | SNOOP AROUND |
| Thou Shalt Not _____________ in Other People's Computer Files. | FOR YOUR INFORMATION |
| The Golden Rule: “Treat others as you would like them to treat you.”
Group of answer choices
True
False | True |
| It is important to be polite.
Group of answer choices
True
False | True |
| Following different moral principles will result in meaningful conduct
Group of answer choices
True
False | True |
| It is okay to use offensive language or words.
Group of answer choices
True
False | False |
| Only a few newsgroups and web pages have FAQ.
Group of answer choices
True
False | False |
| Participated in flame wars.
Group of answer choices
True
False | False |
| As soon as you install a Trojan, you are giving cyber ____ access to your system.
Group of answer choices
CRIMINAL
CRIMINALS | CRIMINALS |
| Access to computing technology isn't an ethical problem related to computers.
Group of answer choices
True
False | False |
| Computers and the internet help people stay in touch with family and friends. | True |
| Computer ethics society's views on the use of computers, both hardware and software.
Group of answer choices
True
False | True |
| Thou Shalt Not Appropriate Other People's __ Output. | INTELLECTUAL |
| Netiquette is the code of acceptable _____________ behavior.
Group of answer choices
Intranet
Extranet
Local Network
Internet | Internet |
| Do not read the message again before you send it.
Group of answer choices
True
False | False |