Site MapHelpFeedbackMultiple Choice
Multiple Choice
(See related pages)



1

Standards of moral conduct are also called:
A)Manners.
B)Legal system.
C)Regulations.
D)Ethics.
2

_________ refers to how we behave when the effects generally are not likely to be far-reaching for others.
A)Laws
B)Manners.
C)Ethics.
D)Legislation.
3

It is illegal to copy a copyrighted:
A)Song.
B)Video game.
C)Picture.
D)Any of the above.
4

A type of legal protection accorded to intellectual property is a:
A)Patent.
B)Copyright.
C)Trade mark.
D)Statue.
5

Which one of the following is moslikely to be protected under the copyright software law?
A)Shareware software.
B)Freeware software.
C)Public domain software.
D)Microsoft Office.
6

The Fair Use Doctrine says that:
A)Intellectual property is intangible creative work that is embodied in physical form.
B)Copyright is the legal protection afforded an expression of an idea.
C)You may use copyrighted materials in certain situations.
D)Software cannot be copied and distributed without permission.
7

Pirated software can best be described as:
A)Software that is copied and distributed without permission.
B)The legal protection afforded an expression of an idea.
C)The Fair Use Doctrine that allows for the use of copyrighted materials.
D)Intangible creative work that is embodied in physical form.
8

The commission of illegal acts through the use of a computer or against a computer system is called computer __________.
A)abuse
B)crime
C)hacking
D)privacy
9

A benign virus:
A)Does damage to your computer system.
B)Displays a message or slows your computer down, but it does not destroy any information.
C)Scans the number off credit cards.
D)Monitors those logged onto a network.
10

Which virus spreads by binding itself to software such as Word or Excel?
A)Macro virus.
B)Worm.
C)Denial-of-service attack.
D)Distributed denial-of-service attack.
11

Which virus replicates and spreads itself, not only from file to file, but also from computer to computer via e-mail and other Internetraffic?
A)Macro virus.
B)Worm.
C)Denial-of-service attack.
D)Distributed denial-of-service attack.
12

Repeated access attempts that tie up the computer hosting a Web site so that legitimate visitors are denied access is called:
A)Spam.
B)Denial-of-service attack.
C)Spoofing.
D)Sniffing.
13

These hackers steal passwords, exploior destroy information, and otherwise cause harm:
A)Green-hat hackers.
B)Orange-hat hackers.
C)White-hat hackers.
D)Black-hat hackers.
14

These hackers are hired to break into a system to steal:
A)Hackers.
B)Surfers.
C)Spammers.
D)Crackers.
15

These politically motivated hackers who use the Internet to send a political message of some kind are called:
A)Crackers.
B)Black-hat hackers.
C)Hacktivists.
D)Cyberterrorists.
16

Which type of hackers seek to cause harm to people or destroy critical systems or information?
A)Crackers.
B)Black-hat hackers.
C)Hacktivists.
D)Cyberterrorists.
17

Which hackers are hired to find vulnerabilities in a network?
A)Black-hat.
B)White-hat.
C)Thrill-seeker.
D)Cracker.
18

Information about how often you visit a Web site can be stored in a(n) ________on your hard drive.
A)info-byte
B)cookie
C)info-bit
D)history file
19

Which software forges the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender?
A)Spoofing.
B)Trojan horse virus.
C)Key logger.
D)Web defacing.
20

What scrambles the contents of a file so that you can't read it without having the right key?
A)Encryption.
B)Steganography.
C)Unallocated space.
D)Compressed files.







haagcc2eOnline Learning Center

Home > Chapter 9 > Multiple Choice Quiz