Ethics 100 MCQ
Ethics 100 MCQ
Copyrights
Patents
Trade Secrets
Trademarks
Computer Crimes
Cyberbullying
51. Who is credited with the early association of the term "computer virus"?
o A) Alexander Graham Bell
o B) Fred Cohen
o C) Steve Jobs
o D) Bill Gates
o Correct Answer: B) Fred Cohen
o Explanation: Fred Cohen is known for his work on computer viruses and for
coining the term in the context of computer security.
o Reference: Page 63, Section "History of Computer Viruses"
52. Which movie popularized the concept of hacking?
o A) The Matrix
o B) Hackers
o C) War Games
o D) The Net
o Correct Answer: C) War Games
o Explanation: The movie "War Games" introduced the general public to the
concept of hacking and its potential dangers.
o Reference: Page 66, Section "Hacking in Popular Culture"
53. The 414-Club is notable for:
o A) Developing the first antivirus software
o B) Being the first national news-making hacker group
o C) Creating the first computer virus
o D) Inventing the telephone network
o Correct Answer: B) Being the first national news-making hacker group
o Explanation: The 414-Club gained national attention for their hacking activities,
making them one of the first widely known hacker groups.
o Reference: Page 65, Section "Early Hacking Groups"
54. Which technology's invention is linked to the start of hacking?
o A) The telephone
o B) The personal computer
o C) The internet
o D) The transistor
o Correct Answer: A) The telephone
o Explanation: The invention of the telephone led to early forms of hacking, such
as phone phreaking.
o Reference: Page 64, Section "Origins of Hacking"
55. ARPANET is significant in the history of hacking because:
o A) It was the first personal computer
o B) It enabled the first networked computer attacks
o C) It was the first antivirus software
o D) It popularized computer viruses
o Correct Answer: B) It enabled the first networked computer attacks
o Explanation: ARPANET was an early network that provided the foundation for
the internet and facilitated some of the first networked computer attacks.
o Reference: Page 66, Section "Early Internet and Hacking"
Cyber Harassment
Cyberstalking
Preventive Measures
86. Which of the following is a physical protective measure for computer security?
o A) Encryption
o B) Strong doors and locks
o C) Software updates
o D) Audit trails
o Correct Answer: B) Strong doors and locks
o Explanation: Physical security measures, such as strong doors and locks, help
prevent unauthorized physical access to computer systems.
o Reference: Page 130, Section "Physical Protective Measures"
87. What is a procedural measure for protecting computer systems?
o A) Using strong doors and locks
o B) Installing antivirus software
o C) Restricting access to computer facilities
o D) Encrypting data
o Correct Answer: D) Encrypting data
o Explanation: Encryption is a procedural measure that protects data by converting
it into a secure format.
o Reference: Page 132, Section "Procedural Protective Measures"
88. Which of the following helps protect against computer viruses?
o A) Disabling antivirus software
o B) Avoiding software updates
o C) Regularly scanning for viruses
o D) Ignoring security patches
o Correct Answer: C) Regularly scanning for viruses
o Explanation: Regularly scanning for viruses helps detect and remove malware
before it can cause harm.
o Reference: Page 134, Section "Strategies for Protecting Against Malware"
89. Which element is key in procedural protective measures?
o A) Unrestricted access
o B) Audit trails
o C) Physical locks
o D) Publicly sharing passwords
o Correct Answer: B) Audit trails
o Explanation: Audit trails track and record system access and activities,
enhancing security and accountability.
o Reference: Page 133, Section "Procedural Protective Measures"
90. Why is encryption important in computer security?
o A) It prevents physical theft
o B) It protects data from unauthorized access
o C) It allows for unrestricted access
o D) It disables audit trails
o Correct Answer: B) It protects data from unauthorized access
o Explanation: Encryption secures data by converting it into a format that can only
be read by authorized users.
o Reference: Page 132, Section "Importance of Encryption"
Effects of Cyberbullying
96. Which group is most affected by cyberbullying?
o A) Elderly individuals
o B) School-age youth
o C) Government officials
o D) Manual laborers
o Correct Answer: B) School-age youth
o Explanation: School-age youth are particularly vulnerable to the effects of
cyberbullying.
o Reference: Page 150, Section "Impact on Youth"
97. A common consequence of cyberbullying among victims is:
o A) Increased self-esteem
o B) Emotional distress and anxiety
o C) Improved academic performance
o D) Financial gain
o Correct Answer: B) Emotional distress and anxiety
o Explanation: Victims of cyberbullying often suffer from emotional distress,
anxiety, and other negative psychological effects.
o Reference: Page 152, Section "Psychological Impact"
98. Which factor contributes to the rise of cyberbullying in schools?
o A) Lack of parental control
o B) Limited use of technology
o C) High curiosity among youth
o D) Strong disciplinary measures
o Correct Answer: A) Lack of parental control
o Explanation: Lack of parental control and monitoring can contribute to the rise of
cyberbullying among students.
o Reference: Page 153, Section "Contributing Factors"
99. What is a recommended strategy for addressing cyberbullying?
o A) Promoting anonymity online
o B) Developing massive education campaigns
o C) Limiting social media use
o D) Avoiding technological advancements
o Correct Answer: B) Developing massive education campaigns
o Explanation: Education campaigns can raise awareness and teach effective
strategies for preventing and addressing cyberbullying.
o Reference: Page 154, Section "Preventive Strategies"
100. Which workplace factor has increased the channels for cyberbullying? - A)
Strict supervision - B) Use of personal digital devices (BYOD) - C) Limited online
interactions - D) Strong parental guidance - Correct Answer: B) Use of personal digital
devices (BYOD) - Explanation: BYOD policies have increased the channels through
which employees can be bullied in the workplace. - Reference: Page 155, Section
"Workplace Cyberbullying"