Midterm ITERA

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

MABALACAT CITY COLLEGE

Dolores, Mabalacat City, Pampanga


Institute of Computing Studies

MIDTERM EXAM
ITERA
Cycle 2, 1st Semester, Academic Year 2021-2022

Question: 1

Computer ethics has its roots in the work of ___ during World War II.

(A) Hermen Horllerith

(B) Norbert Wiener

(C) Blaise Pascal

(D) Charles Babbage

Question: 2

____ is a self- replicating program that can cause damage to data and files stored on your computer.

(A) Virus

(B) Freeware

(C) Piracy

(D) None of the given

Question: 3

Making and using duplicate hardware and software is called ___

(A) Piracy

(B) Free copy

(C) Copy right

(D) None of these


MABALACAT CITY COLLEGE
Dolores, Mabalacat City, Pampanga
Institute of Computing Studies

Question: 4

The protection of hardware, facilities magnetic disks, and other illegally accessed, stolen, damaged or

destroyed items refers to ____

(A) Physical security

(B) Personal security

(C) Personnel security

(D) None of the given

Question: 5

____ refers to software setups that permit only authorized access to the system.

(A) Personnel security

(B) Personal security

(C) Physical security

(D) None of these

Question: 6

General guidelines of computer ethics are needed for ____

(A) Cracking

(B) Computer crime

(C) Protection of personal data

(D) All the above


MABALACAT CITY COLLEGE
Dolores, Mabalacat City, Pampanga
Institute of Computing Studies

Question: 7

“Cracking” comes under ____

(A) Website Service

(B) Transcription

(C) Computer Crime

(D) Data Security

Question: 8

____ is the illegal access to the network or computer system.

(A) Security

(B) Cracking

(C) Virus

(D) Piracy

Question: 9

____ is a set of rules for determining moral standards or socially acceptable behaviour.

(A) Protocol

(B) Standard

(C) Ethics

(D) None of the given

Question: 10

Running other software on idle computer without the knowledge of the organization is called theft of ____

(A) Software

(B) Computer
MABALACAT CITY COLLEGE
Dolores, Mabalacat City, Pampanga
Institute of Computing Studies

(C) Computer time

(D) Use

Question: 11

_____ refers to protecting data and computer system against dishonesty or negligence of employees.

(A) Personnel security

(B) Personal security

(C) Physical security

(D) None of these

Question: 12

Which of the following is not a way of protection?

(A) Physical Security

(B) Personal Security

(C) Piracy

(D) Personnel security

Question: 13

Who among the following began to examine unethical and illegal uses of computers by computer

professionals in mid 1960s Menlo Park, California?

(A) Charles Babbage

(B) Bill Gates

(C) Norbert Wiener

(D) Donn Parker

Question: 14

You can protect sensitive data from prying eyes using


MABALACAT CITY COLLEGE
Dolores, Mabalacat City, Pampanga
Institute of Computing Studies

(A) File permissions

(B) File locks

(C) Passwords

(D) Encryption

Question: 15

A hacker contacts your phone or E-mail and attempts to acquire your password is called

(A) Spamming

(B) Spoofing

(C) Phishing

(D) None of these

Question: 16

Controlling access to sensitive electronic information so only those with a legitimate need to access it are
allowed to do so is known as?

o A. Piracy
o B. Ethics
o C. IT Security

Question: 17

Data cannot be changed without authorization is an example of?

o A. Confidentiality
o B. Integrity
o C. Availability

Question: 18

Backups, Data Encryption, Data Masking, and Data Erasure are components of?

o A. Incident management
MABALACAT CITY COLLEGE
Dolores, Mabalacat City, Pampanga
Institute of Computing Studies

o B. Digital forensics
o C. Data security

Question: 19
_____________  is used to ensure that an organization’s selection and application of human
resources (both employee and contractor) are controlled to promote security.

o A. Personnel security
o B. Physical security
o C. Training and awareness

Question: 20
_____________ raises employee awareness about basic information security, and to train
individuals with information security roles to increase their knowledge, skills and abilities.

o A. Training and awareness


o B. Enterprise continuity
o C. Incident management

 
Question: 21
A purchased, legal copy that is installed on more computers than the copy is licensed for is what?

o A. End-User piracy
o B. Internet piracy
o C. Captain hook
o D. Software Counterfeiting

Question: 22
Who does piracy hurt?

o A. Retail stores
o B. Software developers
o C. Legal software users
o D. All of the above

 
Question: 23
Software Piracy cost an estimated how much worldwide during 2007?

o A. $15 billion
o B. $20 billion
o C. $30 billion
o D. $40 billion
MABALACAT CITY COLLEGE
Dolores, Mabalacat City, Pampanga
Institute of Computing Studies

 
Question: 24
Approximately how much of the world's software is pirated?

o A. 15%
o B. 25%
o C. 35%
o D. 45%

 
Question: 25
Which of the following are member of the Business Software Alliance?

o A. Apple
o B. McAfee
o C. Symantec
o D. All of the above

 
Question: 26
What state has the highest fraud rate in the United States?

o A. Texas
o B. Wisconsin
o C. California
o D. Tennessee

 
Question: 27
What percentage of spyware transmits information about users browsing habits?

o A. 15%
o B. 25%
o C. 50%
o D. 60%
o E. 35%

 
Question: 28
In what year was the concept of computer ethics created by Walter Maner?

o A. 1986
o B. 1977
MABALACAT CITY COLLEGE
Dolores, Mabalacat City, Pampanga
Institute of Computing Studies

o C. 1976
o D. 1967

 
Question: 29
Which of the following is another IT Ethics issue that was not covered?

o A. Viruses
o B. Fruad
o C. Spam
o D. Spyware

 
Question: 30
The largest demographic age of people being affected by fraud is?

o A. Under 20 and over 60


o B. 20 - 29
o C. 30 - 39
o D. 40 - 49
o E. 50 - 59

You might also like