0% found this document useful (0 votes)
18 views

Ethics 100 MCQ

Uploaded by

fatmaserry16
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

Ethics 100 MCQ

Uploaded by

fatmaserry16
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Intellectual Property Rights (IPR)

1. What is the primary purpose of intellectual property rights?


o A) To provide financial incentives for creators
o B) To encourage creativity and innovation
o C) To protect the economic rights of creators
o D) All of the above
o Correct Answer: D) All of the above
o Explanation: Intellectual property rights serve to provide financial incentives,
encourage creativity and innovation, and protect the economic rights of creators.
o Reference: Page 15, Section "Introduction to Intellectual Property"
2. Which type of IPR protects original works of authorship?
o A) Patent
o B) Trademark
o C) Copyright
o D) Trade Secret
o Correct Answer: C) Copyright
o Explanation: Copyrights protect original works of authorship, such as books,
music, and art.
o Reference: Page 20, Section "Copyrights"
3. What does a patent protect?
o A) Original works of authorship
o B) Brand names and logos
o C) Inventions and discoveries
o D) Confidential business information
o Correct Answer: C) Inventions and discoveries
o Explanation: Patents provide exclusive rights to inventors for their inventions
and discoveries.
o Reference: Page 30, Section "Patents"
4. Which IPR is used to distinguish products or services in the marketplace?
o A) Patent
o B) Trademark
o C) Copyright
o D) Trade Secret
o Correct Answer: B) Trademark
o Explanation: Trademarks are used to distinguish and identify the source of
products or services.
o Reference: Page 25, Section "Trademarks"
5. How long is a copyright typically valid?
o A) 10 years
o B) 20 years
o C) Life of the author plus 50 years
o D) Indefinitely
o Correct Answer: C) Life of the author plus 50 years
o Explanation: Copyright typically lasts for the life of the author plus an additional
50 years.
o Reference: Page 22, Section "Duration of Copyrights"

Computer Products and Services

6. Which of the following is considered a tangible computer product?


o A) Software
o B) Network configuration
o C) Printer
o D) Technical support
o Correct Answer: C) Printer
o Explanation: A printer is a physical, tangible product used with computers.
o Reference: Page 40, Section "Computer Products"
7. What type of software is typically pre-packaged and sold without modification?
o A) Custom software
o B) Off-the-shelf software
o C) Open-source software
o D) Modifiable software
o Correct Answer: B) Off-the-shelf software
o Explanation: Off-the-shelf software is pre-packaged and available for immediate
use without modification.
o Reference: Page 42, Section "Software as a Product"
8. Which of the following is an example of computer software being classified as a
service?
o A) Microsoft Office
o B) Adobe Photoshop
o C) Custom-built ERP systems
o D) Linux OS
o Correct Answer: C) Custom-built ERP systems
o Explanation: Custom-built ERP systems are tailored to meet specific client
needs, classifying them as a service.
o Reference: Page 43, Section "Software as a Service"
9. What legal protection is commonly used for software?
o A) Trademark
o B) Copyright
o C) Patent
o D) Trade Secret
o Correct Answer: B) Copyright
o Explanation: Software is typically protected by copyright laws.
o Reference: Page 44, Section "Legal Protection for Software"
10. When software allows for customization, it is often referred to as:
o A) Off-the-shelf software
o B) Custom software
o C) Modifiable software
o D) Open-source software
o Correct Answer: C) Modifiable software
o Explanation: Modifiable software allows for customization to meet specific user
needs.
o Reference: Page 45, Section "Customizable Software"

Copyrights

11. Which of the following is a step in obtaining a copyright?


o A) Filing an application with the patent office
o B) Submitting a copy of the work to the copyright office
o C) Registering a trademark
o D) Applying for a trade secret
o Correct Answer: B) Submitting a copy of the work to the copyright office
o Explanation: To obtain a copyright, a creator must submit a copy of the work to
the copyright office.
o Reference: Page 23, Section "Process of Obtaining Copyrights"
12. Copyrights protect:
o A) The idea itself
o B) The expression of the idea
o C) The manufacturing process
o D) Confidential information
o Correct Answer: B) The expression of the idea
o Explanation: Copyrights protect the expression of ideas, not the ideas
themselves.
o Reference: Page 21, Section "Scope of Copyrights"
13. Which of the following is NOT protected by copyright?
o A) Literary works
o B) Musical compositions
o C) Inventions
o D) Architectural designs
o Correct Answer: C) Inventions
o Explanation: Inventions are protected by patents, not copyrights.
o Reference: Page 21, Section "Scope of Copyrights"
14. What is the primary purpose of copyright law?
o A) To protect brand names
o B) To incentivize creation of original works
o C) To secure patents
o D) To safeguard trade secrets
o Correct Answer: B) To incentivize creation of original works
o Explanation: Copyright law aims to encourage the creation of original works by
providing legal protection to creators.
o Reference: Page 20, Section "Introduction to Copyrights"
15. Which of the following can be copyrighted?
o A) Business strategies
o B) Computer software
o C) Manufacturing processes
o D) Chemical formulas
o Correct Answer: B) Computer software
o Explanation: Computer software is considered a literary work and can be
copyrighted.
o Reference: Page 21, Section "Scope of Copyrights"

Patents

16. What is a requirement for an invention to be patentable?


o A) It must be published
o B) It must be new and useful
o C) It must be a literary work
o D) It must be a trademark
o Correct Answer: B) It must be new and useful
o Explanation: For an invention to be patentable, it must be new, useful, and non-
obvious.
o Reference: Page 31, Section "Criteria for Patentability"
17. Which of the following is NOT a criterion for patentability?
o A) Utility
o B) Novelty
o C) Nonobviousness
o D) Confidentiality
o Correct Answer: D) Confidentiality
o Explanation: Confidentiality is not a criterion for patentability; utility, novelty,
and non-obviousness are.
o Reference: Page 32, Section "Criteria for Patentability"
18. How long does a patent typically last?
o A) 10 years
o B) 20 years
o C) Life of the inventor plus 50 years
o D) Indefinitely
o Correct Answer: B) 20 years
o Explanation: A standard patent lasts for 20 years from the date of application.
o Reference: Page 34, Section "Duration of Patents"
19. Which of the following cannot be patented?
o A) A new machine
o B) A novel chemical process
o C) A mathematical formula
o D) An improved manufacturing process
o Correct Answer: C) A mathematical formula
o Explanation: Mathematical formulas cannot be patented; patents are for tangible
inventions and processes.
o Reference: Page 33, Section "Criteria for Patentability"
20. The primary benefit of obtaining a patent is:
o A) Protecting brand identity
o B) Securing exclusive rights to use, make, and sell the invention
o C) Preventing unauthorized copying of literary works
o D) Protecting trade secrets
o Correct Answer: B) Securing exclusive rights to use, make, and sell the
invention
o Explanation: Patents provide inventors with exclusive rights to their inventions,
allowing them to control their use and commercialization.
o Reference: Page 30, Section "Introduction to Patents"

Trade Secrets

21. What is the key characteristic of a trade secret?


o A) It is publicly disclosed
o B) It is patented
o C) It provides a competitive advantage
o D) It is trademarked
o Correct Answer: C) It provides a competitive advantage
o Explanation: Trade secrets are valuable because they provide a business with a
competitive edge.
o Reference: Page 35, Section "Introduction to Trade Secrets"
22. Trade secrets are protected for:
o A) 10 years
o B) 20 years
o C) The life of the owner
o D) Indefinitely, as long as secrecy is maintained
o Correct Answer: D) Indefinitely, as long as secrecy is maintained
o Explanation: Trade secrets can be protected indefinitely, provided the
information remains confidential.
o Reference: Page 37, Section "Duration of Trade Secrets"
23. Which of the following is an example of a trade secret?
o A) A published research paper
o B) A company's business strategy
o C) A registered trademark
o D) An expired patent
o Correct Answer: B) A company's business strategy
o Explanation: A business strategy that provides a competitive advantage and is
kept confidential can be a trade secret.
o Reference: Page 36, Section "Examples of Trade Secrets"
24. Legal action can be taken for trade secret misappropriation when:
o A) The secret is publicly disclosed
o B) The secret is independently discovered
o C) The secret is obtained through improper means
o D) The secret is registered with the patent office
o Correct Answer: C) The secret is obtained through improper means
o Explanation: Misappropriation occurs when trade secrets are acquired by
improper means, such as theft or breach of confidentiality.
o Reference: Page 38, Section "Legal Protection for Trade Secrets"
25. Which law primarily protects trade secrets?
o A) Copyright law
o B) Patent law
o C) Trademark law
o D) Trade secret law
o Correct Answer: D) Trade secret law
o Explanation: Trade secret law provides legal protection for confidential business
information that provides a competitive advantage.
o Reference: Page 39, Section "Legal Protection for Trade Secrets"

Trademarks

26. A trademark is primarily used to:


o A) Protect literary works
o B) Distinguish goods and services
o C) Secure patents
o D) Protect trade secrets
o Correct Answer: B) Distinguish goods and services
o Explanation: Trademarks help consumers identify and differentiate between
products and services in the marketplace.
o Reference: Page 25, Section "Introduction to Trademarks"
27. Which of the following can be trademarked?
o A) Inventions
o B) Literary works
o C) Brand names and logos
o D) Business strategies
o Correct Answer: C) Brand names and logos
o Explanation: Trademarks can include brand names, logos, and other symbols
used to identify goods and services.
o Reference: Page 26, Section "Categories of Trademarks"
28. How long is a trademark typically valid?
o A) 10 years, renewable
o B) 20 years, renewable
o C) Life of the author plus 50 years
o D) Indefinitely
o Correct Answer: A) 10 years, renewable
o Explanation: Trademarks are valid for 10 years and can be renewed indefinitely
as long as they are in use.
o Reference: Page 27, Section "Duration of Trademarks"
29. What is required for a mark to be registered as a trademark?
o A) It must be new and useful
o B) It must not cause confusion with existing marks
o C) It must be patented
o D) It must be copyrighted
o Correct Answer: B) It must not cause confusion with existing marks
o Explanation: A trademark must be distinctive and not cause confusion with
existing trademarks.
o Reference: Page 28, Section "Criteria for Trademark Registration"
30. Which category of trademarks is used for services rather than products?
o A) Service marks
o B) Certification marks
o C) Collective marks
o D) Trade secrets
o Correct Answer: A) Service marks
o Explanation: Service marks are used to identify and distinguish services rather
than products.
o Reference: Page 29, Section "Categories of Trademarks"

Intellectual Property Crimes

31. Which of the following is an example of intellectual property crime?


o A) Publishing a book
o B) Patenting an invention
o C) Counterfeiting branded products
o D) Trademark registration
o Correct Answer: C) Counterfeiting branded products
o Explanation: Counterfeiting involves producing imitation products to deceive
consumers and is considered an intellectual property crime.
o Reference: Page 50, Section "Types of Intellectual Property Crimes"
32. What is the primary consequence of intellectual property infringement?
o A) Increased innovation
o B) Economic losses for creators
o C) Legal protection for creators
o D) Enhanced public access to creations
o Correct Answer: B) Economic losses for creators
o Explanation: Infringement results in financial losses for the original creators and
can harm their economic interests.
o Reference: Page 52, Section "Consequences of Intellectual Property Crimes"
33. Which of the following actions constitutes piracy?
o A) Filing for a patent
o B) Distributing unauthorized copies of software
o C) Registering a trademark
o D) Securing a trade secret
o Correct Answer: B) Distributing unauthorized copies of software
o Explanation: Piracy involves the unauthorized reproduction and distribution of
copyrighted materials, such as software.
o Reference: Page 51, Section "Types of Intellectual Property Crimes"
34. Infringement of intellectual property rights can lead to:
o A) Criminal penalties
o B) Increased market share
o C) Enhanced brand recognition
o D) Public domain status
o Correct Answer: A) Criminal penalties
o Explanation: Violating intellectual property rights can result in criminal
penalties, including fines and imprisonment.
o Reference: Page 53, Section "Legal Consequences of IP Crimes"
35. Which type of intellectual property crime involves stealing business information?
o A) Counterfeiting
o B) Piracy
o C) Industrial espionage
o D) Trademark dilution
o Correct Answer: C) Industrial espionage
o Explanation: Industrial espionage involves the theft of confidential business
information and trade secrets.
o Reference: Page 54, Section "Types of Intellectual Property Crimes"

Computer Crimes

36. What is a computer virus?


o A) A harmless program
o B) A self-replicating program designed to alter or destroy data
o C) A program that does not spread
o D) A legal protection for software
o Correct Answer: B) A self-replicating program designed to alter or destroy
data
o Explanation: A computer virus is a type of malware that replicates itself and
spreads to other computers, causing damage.
o Reference: Page 60, Section "Computer Viruses"
37. Which of the following is a type of malware that disguises itself as legitimate
software?
o A) Virus
o B) Worm
o C) Trojan Horse
o D) Firewall
o Correct Answer: C) Trojan Horse
o Explanation: A Trojan Horse is a type of malware that appears to be legitimate
software but performs malicious actions.
o Reference: Page 62, Section "Types of Malware"
38. Which historical event marked the beginning of notable hacking activities?
o A) The invention of the telephone
o B) The release of "War Games" movie
o C) The development of ARPANET
o D) The formation of the 414-Club
o Correct Answer: D) The formation of the 414-Club
o Explanation: The 414-Club was one of the first hacking groups to gain national
attention for their activities.
o Reference: Page 65, Section "History of Hacking"
39. What is a key characteristic of worms?
o A) They attach to other programs
o B) They do not replicate
o C) They spread through networks
o D) They do not cause damage
o Correct Answer: C) They spread through networks
o Explanation: Worms are a type of malware that spread independently across
networks.
o Reference: Page 61, Section "Computer Worms"
40. Who is often credited with associating the term "computer virus" with a real-world
program?
o A) Alexander Graham Bell
o B) Fred Cohen
o C) Steven Levy
o D) Mark Zuckerberg
o Correct Answer: B) Fred Cohen
o Explanation: Fred Cohen is credited with defining the term "computer virus" in
the context of computer security.
o Reference: Page 63, Section "Computer Viruses"

Cyberbullying

41. Which of the following is a form of cyberbullying?


o A) Harassment
o B) Identity theft
o C) Copyright infringement
o D) Patent infringement
o Correct Answer: A) Harassment
o Explanation: Cyberbullying includes acts of harassment, such as sending
threatening or insulting messages online.
o Reference: Page 70, Section "Forms of Cyberbullying"
42. Cyberbullying often affects which groups the most?
o A) Elderly individuals
o B) School-age youth and white-collar workers
o C) Government officials
o D) Manual laborers
o Correct Answer: B) School-age youth and white-collar workers
o Explanation: School-age youth and white-collar workers are particularly
vulnerable to cyberbullying.
o Reference: Page 72, Section "Impact of Cyberbullying"
43. What is a common consequence of cyberbullying among youth?
o A) Increased academic performance
o B) Enhanced social skills
o C) Depression and anxiety
o D) Financial gain
o Correct Answer: C) Depression and anxiety
o Explanation: Victims of cyberbullying often experience emotional distress,
including depression and anxiety.
o Reference: Page 73, Section "Consequences of Cyberbullying"
44. Which workplace factor has contributed to the rise of cyberbullying?
o A) Limited use of technology
o B) Bring your own device (BYOD) policies
o C) Strict parental control
o D) Lack of curiosity among youth
o Correct Answer: B) Bring your own device (BYOD) policies
o Explanation: BYOD policies have increased the channels through which
employees can be bullied.
o Reference: Page 75, Section "Cyberbullying in the Workplace"
45. What is a recommended strategy for preventing cyberbullying?
o A) Encouraging anonymity online
o B) Developing massive education campaigns
o C) Reducing the use of social media
o D) Limiting technological advancements
o Correct Answer: B) Developing massive education campaigns
o Explanation: Education campaigns can raise awareness and teach effective
strategies for preventing cyberbullying.
o Reference: Page 77, Section "Strategies for Preventing Cyberbullying"

Computer Crime Prevention

46. Which of the following is a physical protective measure for computers?


o A) Encryption
o B) Cable-locking devices
o C) User passwords
o D) Software updates
o Correct Answer: B) Cable-locking devices
o Explanation: Physical security measures, such as cable-locking devices, help
prevent theft and unauthorized access.
o Reference: Page 80, Section "Physical Protective Measures"
47. What is a procedural measure to protect computer data?
o A) Installing antivirus software
o B) Encrypting data
o C) Using strong doors and locks
o D) Installing cable locks
o Correct Answer: B) Encrypting data
o Explanation: Encryption is a procedural measure that protects data by converting
it into a secure format.
o Reference: Page 82, Section "Procedural Protective Measures"
48. Which strategy helps to protect against malware?
o A) Using unauthorized disks
o B) Avoiding software updates
o C) Scanning downloaded files for viruses
o D) Disabling antivirus software
o Correct Answer: C) Scanning downloaded files for viruses
o Explanation: Regularly scanning downloaded files for viruses helps detect and
remove malware before it can cause harm.
o Reference: Page 84, Section "Strategies for Protecting Against Malware"
49. What is a key element of procedural protective measures?
o A) Physical locks
o B) Audit trails
o C) Anonymity
o D) Unrestricted access
o Correct Answer: B) Audit trails
o Explanation: Audit trails are used to track and record system access and
activities, enhancing security and accountability.
o Reference: Page 83, Section "Procedural Protective Measures"
50. What role does encryption play in computer security?
o A) Prevents physical theft
o B) Protects data from unauthorized access
o C) Allows for unrestricted access
o D) Disables audit trails
o Correct Answer: B) Protects data from unauthorized access
o Explanation: Encryption secures data by converting it into a format that can only
be read by authorized users.
o Reference: Page 82, Section "Procedural Protective Measures"

History of Computer Crimes

51. Who is credited with the early association of the term "computer virus"?
o A) Alexander Graham Bell
o B) Fred Cohen
o C) Steve Jobs
o D) Bill Gates
o Correct Answer: B) Fred Cohen
o Explanation: Fred Cohen is known for his work on computer viruses and for
coining the term in the context of computer security.
o Reference: Page 63, Section "History of Computer Viruses"
52. Which movie popularized the concept of hacking?
o A) The Matrix
o B) Hackers
o C) War Games
o D) The Net
o Correct Answer: C) War Games
o Explanation: The movie "War Games" introduced the general public to the
concept of hacking and its potential dangers.
o Reference: Page 66, Section "Hacking in Popular Culture"
53. The 414-Club is notable for:
o A) Developing the first antivirus software
o B) Being the first national news-making hacker group
o C) Creating the first computer virus
o D) Inventing the telephone network
o Correct Answer: B) Being the first national news-making hacker group
o Explanation: The 414-Club gained national attention for their hacking activities,
making them one of the first widely known hacker groups.
o Reference: Page 65, Section "Early Hacking Groups"
54. Which technology's invention is linked to the start of hacking?
o A) The telephone
o B) The personal computer
o C) The internet
o D) The transistor
o Correct Answer: A) The telephone
o Explanation: The invention of the telephone led to early forms of hacking, such
as phone phreaking.
o Reference: Page 64, Section "Origins of Hacking"
55. ARPANET is significant in the history of hacking because:
o A) It was the first personal computer
o B) It enabled the first networked computer attacks
o C) It was the first antivirus software
o D) It popularized computer viruses
o Correct Answer: B) It enabled the first networked computer attacks
o Explanation: ARPANET was an early network that provided the foundation for
the internet and facilitated some of the first networked computer attacks.
o Reference: Page 66, Section "Early Internet and Hacking"

Types of Computer System Attacks

56. Which type of attack involves unauthorized access to systems?


o A) Phishing
o B) Hacking
o C) Spam
o D) Social engineering
o Correct Answer: B) Hacking
o Explanation: Hacking involves gaining unauthorized access to computer
systems, often with malicious intent.
o Reference: Page 75, Section "Unauthorized Access"
57. What is phishing?
o A) Sending spam emails
o B) Unauthorized system access
o C) Fraudulently obtaining sensitive information
o D) Infecting computers with malware
o Correct Answer: C) Fraudulently obtaining sensitive information
o Explanation: Phishing involves tricking individuals into revealing sensitive
information, such as passwords or credit card numbers.
o Reference: Page 77, Section "Phishing Attacks"
58. Which attack spreads by duplicating itself across networks?
o A) Virus
o B) Worm
o C) Trojan Horse
o D) Phishing
o Correct Answer: B) Worm
o Explanation: Worms are malware that replicate themselves and spread across
networks without the need to attach to other programs.
o Reference: Page 76, Section "Worms"
59. What is a common goal of denial-of-service (DoS) attacks?
o A) To steal sensitive data
o B) To overload and crash systems
o C) To gain unauthorized access
o D) To install malware
o Correct Answer: B) To overload and crash systems
o Explanation: DoS attacks aim to disrupt the normal functioning of systems by
overwhelming them with traffic, causing them to crash.
o Reference: Page 78, Section "Denial-of-Service Attacks"
60. Which attack involves tricking users into revealing confidential information?
o A) Hacking
o B) Phishing
o C) Spamming
o D) Sniffing
o Correct Answer: B) Phishing
o Explanation: Phishing attacks deceive users into providing confidential
information by pretending to be a trustworthy entity.
o Reference: Page 77, Section "Phishing Attacks"

Cyber Harassment

61. Which term describes persistent and unwanted digital attention?


o A) Cyberbullying
o B) Cyber harassment
o C) Phishing
o D) Hacking
o Correct Answer: B) Cyber harassment
o Explanation: Cyber harassment refers to persistent and unwanted attention or
behavior online.
o Reference: Page 81, Section "Types of Cyber Harassment"
62. Which form of cyber harassment involves spreading false information?
o A) Harassment
o B) Denigration
o C) Impersonation
o D) Outing
o Correct Answer: B) Denigration
o Explanation: Denigration involves spreading false information to damage
someone's reputation.
o Reference: Page 82, Section "Forms of Cyber Harassment"
63. Cyber harassment in the workplace is often driven by:
o A) High self-esteem
o B) Lack of technological skills
o C) Bully’s internal shortcomings
o D) Excessive parental control
o Correct Answer: C) Bully’s internal shortcomings
o Explanation: Workplace cyber harassment often stems from the bully’s own
internal issues and need for control.
o Reference: Page 83, Section "Causes of Workplace Cyber Harassment"
64. What is a common effect of cyber harassment on victims?
o A) Improved social interaction
o B) Increased self-esteem
o C) Emotional distress
o D) Financial gain
o Correct Answer: C) Emotional distress
o Explanation: Victims of cyber harassment often experience emotional distress,
anxiety, and other negative psychological effects.
o Reference: Page 84, Section "Impact of Cyber Harassment"
65. Which strategy can help reduce cyber harassment?
o A) Encouraging anonymous online activity
o B) Developing company policies with behavioral guidelines
o C) Limiting the use of social media
o D) Promoting unrestricted access to digital devices
o Correct Answer: B) Developing company policies with behavioral guidelines
o Explanation: Establishing clear policies and guidelines can help create a safer
online environment and reduce instances of cyber harassment.
o Reference: Page 85, Section "Prevention of Cyber Harassment"

Protecting Computer Software

66. What is the primary challenge in protecting computer software?


o A) Lack of legal frameworks
o B) Difficulty in categorizing software
o C) High cost of development
o D) Limited technological advancements
o Correct Answer: B) Difficulty in categorizing software
o Explanation: The intangible nature of software makes it challenging to categorize
and protect through traditional legal frameworks.
o Reference: Page 90, Section "Challenges in Software Protection"
67. Software piracy involves:
o A) Legal distribution of software
o B) Copying and distributing proprietary software without authorization
o C) Registering software for copyright
o D) Developing open-source software
o Correct Answer: B) Copying and distributing proprietary software without
authorization
o Explanation: Software piracy is the unauthorized copying, distribution, and use
of software.
o Reference: Page 92, Section "Software Piracy"
68. Which of the following protects computer software as a literary work?
o A) Patent law
o B) Copyright law
o C) Trademark law
o D) Trade secret law
o Correct Answer: B) Copyright law
o Explanation: Copyright law treats computer software as a literary work,
providing protection for its code and structure.
o Reference: Page 91, Section "Legal Protection for Software"
69. What is a limitation of copyright protection for software?
o A) It cannot protect the source code
o B) It requires full disclosure of the software's functionality
o C) It is only valid for 10 years
o D) It cannot protect the software’s documentation
o Correct Answer: B) It requires full disclosure of the software's functionality
o Explanation: Copyright protection for software requires that the software's
functionality be disclosed, which can be a limitation.
o Reference: Page 92, Section "Limitations of Copyright for Software"
70. Under which circumstances can software be protected by patent law?
o A) When it is a literary work
o B) When it includes a unique algorithm
o C) When it has been registered as a trademark
o D) When it is considered a trade secret
o Correct Answer: B) When it includes a unique algorithm
o Explanation: Software that includes a unique algorithm or technological
innovation can be protected by patent law.
o Reference: Page 93, Section "Software Patents"

Ownership and Disclosure

71. An idea is considered novel if it is:


o A) Well-known and widely used
o B) Original, authentic, and new
o C) Kept secret from the public
o D) Legally protected by a trademark
o Correct Answer: B) Original, authentic, and new
o Explanation: A novel idea is one that is original, authentic, and new.
o Reference: Page 98, Section "Novelty in Intellectual Property"
72. Disclosure in the context of patents requires:
o A) Keeping the invention secret
o B) Publishing the invention for public use
o C) Adequate description of the invention for public and governmental review
o D) Protecting the invention indefinitely
o Correct Answer: C) Adequate description of the invention for public and
governmental review
o Explanation: Patent law requires that the invention be adequately described so
that it can be reviewed and understood by the public and government.
o Reference: Page 100, Section "Patent Disclosure Requirements"
73. The first sale doctrine allows a copyright owner to:
o A) Prevent others from using similar marks
o B) Distribute copies of the work by sale, transfer, or lease
o C) Keep the invention secret
o D) Patent the software
o Correct Answer: B) Distribute copies of the work by sale, transfer, or lease
o Explanation: The first sale doctrine allows the copyright owner to control the
initial sale of the work but not subsequent resales.
o Reference: Page 102, Section "First Sale Doctrine"
74. Fair use doctrine evaluates the use of copyrighted material based on:
o A) The nature of the invention
o B) The purpose, nature, percentage, and effect of the use
o C) The secrecy of the material
o D) The length of protection
o Correct Answer: B) The purpose, nature, percentage, and effect of the use
o Explanation: Fair use doctrine considers the purpose, nature, amount, and effect
of the use on the market value of the copyrighted work.
o Reference: Page 103, Section "Fair Use Doctrine"
75. Which of the following is a method to safeguard intellectual property rights?
o A) Publicizing trade secrets
o B) Collaborating with government officials to check on imports and exports
o C) Avoiding legal registration
o D) Disclosing all information to competitors
o Correct Answer: B) Collaborating with government officials to check on
imports and exports
o Explanation: Working with government officials helps prevent the import and
export of counterfeit goods.
o Reference: Page 105, Section "Safeguarding Intellectual Property"

Cyberstalking

76. Cyberstalking involves:


o A) Harmless online interaction
o B) Repeated, persistent, and often illegal digital stalking
o C) Physical harassment
o D) Legal monitoring of online activity
o Correct Answer: B) Repeated, persistent, and often illegal digital stalking
o Explanation: Cyberstalking is the repeated, persistent, and often illegal tracking
and harassment of an individual online.
o Reference: Page 110, Section "Definition of Cyberstalking"
77. A common characteristic of cyberstalking is:
o A) Legal acceptance
o B) Occasional, harmless messages
o C) Threatening and monitoring the victim
o D) Open communication with consent
o Correct Answer: C) Threatening and monitoring the victim
o Explanation: Cyberstalking often involves threatening behavior and continuous
monitoring of the victim's activities.
o Reference: Page 111, Section "Characteristics of Cyberstalking"
78. Cyberstalking differs from cyber harassment in that it:
o A) Is always legal
o B) Involves physical contact
o C) Includes extortion and identity theft
o D) Is limited to verbal abuse
o Correct Answer: C) Includes extortion and identity theft
o Explanation: Cyberstalking can include extortion, identity theft, and other
serious crimes beyond verbal abuse.
o Reference: Page 112, Section "Cyberstalking vs. Cyber Harassment"
79. A victim of cyberstalking may experience:
o A) Increased productivity
o B) Emotional trauma and fear
o C) Financial benefits
o D) Improved social interactions
o Correct Answer: B) Emotional trauma and fear
o Explanation: Victims of cyberstalking often suffer from emotional trauma,
anxiety, and fear.
o Reference: Page 113, Section "Impact of Cyberstalking"
80. Which of the following is a preventive measure against cyberstalking?
o A) Ignoring the problem
o B) Sharing personal information freely online
o C) Implementing strong privacy settings and reporting mechanisms
o D) Avoiding all forms of digital communication
o Correct Answer: C) Implementing strong privacy settings and reporting
mechanisms
o Explanation: Using strong privacy settings and having clear reporting
mechanisms can help prevent and address cyberstalking.
o Reference: Page 114, Section "Preventive Measures Against Cyberstalking"

Legal and Ethical Considerations

81. Which principle is crucial in balancing privacy and security?


o A) Full disclosure of all data
o B) Complete public access
o C) Ethical guidelines in cybersecurity
o D) Unlimited data collection
o Correct Answer: C) Ethical guidelines in cybersecurity
o Explanation: Ethical guidelines help balance the need for privacy with the
requirements of security in cybersecurity practices.
o Reference: Page 120, Section "Balancing Privacy and Security"
82. One of the main reasons for the lack of credible policies in computer crime
prevention is:
o A) Excessive data collection
o B) Inadequate reporting mechanisms and data analysis
o C) Over-reliance on manual processes
o D) High public awareness
o Correct Answer: B) Inadequate reporting mechanisms and data analysis
o Explanation: Inadequate reporting mechanisms and data analysis make it
difficult to develop effective policies for computer crime prevention.
o Reference: Page 122, Section "Challenges in Computer Crime Prevention"
83. Which of the following is an ethical responsibility in cybersecurity?
o A) Encouraging anonymous online activity
o B) Protecting the security of data and systems
o C) Ignoring potential threats
o D) Promoting unrestricted access to all information
o Correct Answer: B) Protecting the security of data and systems
o Explanation: Ensuring the security of data and systems is a key ethical
responsibility in cybersecurity.
o Reference: Page 121, Section "Ethical Responsibilities in Cybersecurity"
84. What is a common challenge in addressing cyber threats?
o A) Decreasing sophistication of malware
o B) Lack of global collaboration
o C) Overwhelming public trust
o D) Abundant resources and expertise
o Correct Answer: B) Lack of global collaboration
o Explanation: Addressing cyber threats effectively requires international
cooperation and collaboration.
o Reference: Page 123, Section "Global Collaboration in Cybersecurity"
85. Developing and adhering to ethical guidelines in cybersecurity helps in:
o A) Undermining public trust
o B) Ensuring responsible use of technology
o C) Reducing data protection
o D) Promoting unethical behavior
o Correct Answer: B) Ensuring responsible use of technology
o Explanation: Ethical guidelines help ensure the responsible use of technology
and maintain public trust.
o Reference: Page 124, Section "Importance of Ethical Guidelines"

Preventive Measures

86. Which of the following is a physical protective measure for computer security?
o A) Encryption
o B) Strong doors and locks
o C) Software updates
o D) Audit trails
o Correct Answer: B) Strong doors and locks
o Explanation: Physical security measures, such as strong doors and locks, help
prevent unauthorized physical access to computer systems.
o Reference: Page 130, Section "Physical Protective Measures"
87. What is a procedural measure for protecting computer systems?
o A) Using strong doors and locks
o B) Installing antivirus software
o C) Restricting access to computer facilities
o D) Encrypting data
o Correct Answer: D) Encrypting data
o Explanation: Encryption is a procedural measure that protects data by converting
it into a secure format.
o Reference: Page 132, Section "Procedural Protective Measures"
88. Which of the following helps protect against computer viruses?
o A) Disabling antivirus software
o B) Avoiding software updates
o C) Regularly scanning for viruses
o D) Ignoring security patches
o Correct Answer: C) Regularly scanning for viruses
o Explanation: Regularly scanning for viruses helps detect and remove malware
before it can cause harm.
o Reference: Page 134, Section "Strategies for Protecting Against Malware"
89. Which element is key in procedural protective measures?
o A) Unrestricted access
o B) Audit trails
o C) Physical locks
o D) Publicly sharing passwords
o Correct Answer: B) Audit trails
o Explanation: Audit trails track and record system access and activities,
enhancing security and accountability.
o Reference: Page 133, Section "Procedural Protective Measures"
90. Why is encryption important in computer security?
o A) It prevents physical theft
o B) It protects data from unauthorized access
o C) It allows for unrestricted access
o D) It disables audit trails
o Correct Answer: B) It protects data from unauthorized access
o Explanation: Encryption secures data by converting it into a format that can only
be read by authorized users.
o Reference: Page 132, Section "Importance of Encryption"

Computer Crime Prevention Strategies

91. What is a key strategy to reduce computer crime?


o A) Encouraging unrestricted access
o B) Aggressively enforcing computer crime laws
o C) Disabling security measures
o D) Promoting anonymous online activities
o Correct Answer: B) Aggressively enforcing computer crime laws
o Explanation: Strict enforcement of computer crime laws helps deter criminal
activities and protect information systems.
o Reference: Page 140, Section "Enforcement Strategies"
92. Moral education in computer ethics aims to:
o A) Encourage computer crimes
o B) Build character and guide actions
o C) Promote unauthorized access
o D) Ignore ethical considerations
o Correct Answer: B) Build character and guide actions
o Explanation: Moral education helps develop ethical behavior and guide
responsible actions in the use of technology.
o Reference: Page 142, Section "Role of Moral Education"
93. Which of the following describes a computer criminal?
o A) Someone with low technical skills
o B) Someone viewed as a hero challenging computers
o C) Someone who avoids technology
o D) Someone who promotes ethical behavior
o Correct Answer: B) Someone viewed as a hero challenging computers
o Explanation: Computer criminals are often seen as individuals who challenge
and exploit computer systems.
o Reference: Page 144, Section "Profile of a Computer Criminal"
94. What is a common motivation for computer criminals?
o A) Altruism
o B) Financial gain
o C) Promoting cybersecurity
o D) Public service
o Correct Answer: B) Financial gain
o Explanation: Financial gain is a common motivation for individuals engaging in
computer crimes.
o Reference: Page 145, Section "Motivations for Computer Crime"
95. Which of the following is a preventive measure for computer crime?
o A) Ignoring security patches
o B) Implementing strong access control mechanisms
o C) Disabling antivirus software
o D) Allowing unrestricted downloads
o Correct Answer: B) Implementing strong access control mechanisms
o Explanation: Strong access control mechanisms help restrict unauthorized access
to systems and data.
o Reference: Page 146, Section "Preventive Measures"

Effects of Cyberbullying
96. Which group is most affected by cyberbullying?
o A) Elderly individuals
o B) School-age youth
o C) Government officials
o D) Manual laborers
o Correct Answer: B) School-age youth
o Explanation: School-age youth are particularly vulnerable to the effects of
cyberbullying.
o Reference: Page 150, Section "Impact on Youth"
97. A common consequence of cyberbullying among victims is:
o A) Increased self-esteem
o B) Emotional distress and anxiety
o C) Improved academic performance
o D) Financial gain
o Correct Answer: B) Emotional distress and anxiety
o Explanation: Victims of cyberbullying often suffer from emotional distress,
anxiety, and other negative psychological effects.
o Reference: Page 152, Section "Psychological Impact"
98. Which factor contributes to the rise of cyberbullying in schools?
o A) Lack of parental control
o B) Limited use of technology
o C) High curiosity among youth
o D) Strong disciplinary measures
o Correct Answer: A) Lack of parental control
o Explanation: Lack of parental control and monitoring can contribute to the rise of
cyberbullying among students.
o Reference: Page 153, Section "Contributing Factors"
99. What is a recommended strategy for addressing cyberbullying?
o A) Promoting anonymity online
o B) Developing massive education campaigns
o C) Limiting social media use
o D) Avoiding technological advancements
o Correct Answer: B) Developing massive education campaigns
o Explanation: Education campaigns can raise awareness and teach effective
strategies for preventing and addressing cyberbullying.
o Reference: Page 154, Section "Preventive Strategies"
100. Which workplace factor has increased the channels for cyberbullying? - A)
Strict supervision - B) Use of personal digital devices (BYOD) - C) Limited online
interactions - D) Strong parental guidance - Correct Answer: B) Use of personal digital
devices (BYOD) - Explanation: BYOD policies have increased the channels through
which employees can be bullied in the workplace. - Reference: Page 155, Section
"Workplace Cyberbullying"

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy