Deck 5: Computer Science and Ethics

Full screen (f)
exit full mode
Question
What is the first step in protecting yourself from identity theft?

A)never provide any personal data about yourself unless absolutely necessary
B)routinely check your records for signs of identity theft.
C)never use your real name on the internet
D)routinely check for spyware on your computer.
Use Space or
up arrow
down arrow
to flip the card.
Question
A backup is a ...................... against data loss

A)threat
B)security
C)countermeasure
D)abuse
Question
What is malware?

A)software that has some malicious purpose
B)software that is not functioning properly
C)software that damages your system
D)software that is not properly configured for your system
Question
Which of the following is a step that all computer users should take to protect against virus attacks?

A)purchase and configure a firewall
B)shut down all incoming ports
C)use non-standard e-mail clients
D)install and use antivirus software
Question
-------- uses the principles and tools of computer science to model or algorithmically specify complexes biological information system and computational systems with life-like capabilities.

A)virtual computing
B)artificial intelligent
C)bio-computing
D)cookies
Question
------ uses software to allow people to interact with three-dimensional simulated environment.

A)virtual computing
B)artificial intelligent
C)bio-computing
D)cookies
Question
The science and engineering of making intelligent machines, especially intelligent computer programs.

A)artificial intelligence
B)stress management
C)anti-virus
D)intellectual property right
Question
Computers are programmed to make decisions in real-life situations are known as

A)virtual reality
B)robotics
C)neural networks
D)expert system
Question
Computing systems, which imitate human brain through a network of highly interconnected processing elements.

A)virtual reality
B)robotics
C)neural networks
D)expert system
Question
Which among the following is not applicable to internet use

A)do not use email to strangers
B)do not give out your email address to people you doesn't know
C)do not open email attachments from people you don't know
D)pretend to be someone else when you are online.
Question
Which among the following is applicable to internet use

A)do not sent spam, worms and viruses into cyberspace
B)do not be rude or use bad language while you use email
C)do not disclose your personal information such as your bank a/c number, passwords etc
D)all of these
Question
Which among the following is unethical use of cell phone

A)do not accept call while driving
B)switch off cell phone inside an aircraft
C)do capture the images of others without permission of that person
D)keep silent tone in meetings
Question
A repetitive strain injury (RSI) in computer users caused by

A)improperly positioned key-boards
B)a/c room
C)proper lighting
D)adjustable chair
Question
The difficulty a person can have in understanding an issue and making decisions that can be caused by the presence of too much information

A)cyber addition
B)information overload
C)repetitive strain injury
D)virtual reality
Question
Which among the following is not an indication of cyber addition

A)a person frequently find on the internet longer than he wish
B)find a person running late to appointments because of too much time spent online
C)all the time one spends online leads isolation from family and friends and feel like no one in his real life
D)don't feel guilty or defensive about your internet use
Question
Which of the following is not true of ethical computing guidelines

A)not to use computer to promote lies
B)use computers with consideration and respect for others
C)avoid causing harm to othrs when using computer
D)snoop in other people's computer files.
Question
The following metric is a measure of the journal quality

A)impact factor
B)prize
C)article size
D)none of the above
Question
The main advantage(s) of online education is (are)

A)personalized education
B)better flexibility
C)better accessibility
D)all of the above
Question
Pick the odd one out

A)spam
B)spyware
C)antivirus
D)hoax
Question
A ............. is a small text file which is placed on your computer on the request made by the web server to your browser.

A)spam
B)cookie
C)web bugs
D)worms
Question
Established by the Ministry of Education, Government of India as an autonomous organization designed to bring back the entire tradition of Indian philosophy to its pristine and original form and promote new thinking through its intensive programs of research

A)university grand commission (ugc)
B)indian council of social science research (icssr)
C)indian council of philosophical research (icpr)
D)indira gandhi national open university (ignou)
Question
----- is an example of software being created independent of any money-making incentive or any property rights

A)spyware
B)adware
C)freeware
D)malware
Question
A computer user, who copies an application onto more than one computer, if the license agreement does not permit this, is participating in:

A)software piracy
B)personal privacy
C)computer theft
D)identity theft
Question
Experts who are performing a needed service for society by helping companies realize the vulerabilities that exist in their systems by break into system just for the challenge.

A)black-hat hackers
B)white-hat hackers
C)both black-hat hackers and white-hat hackers
D)neither black-hat hackers nor white-hat hackers
Question
If the antivirus software detects a virus signature or suspicious activity, it stops the execution of the file and virus and notifies you that it has dtected virus is known as:

A)quarantining
B)searching
C)phishing
D)all of these
Question
The discrepancy between the "haves" and "have-notes" with regards to computer technology is commonly referred as:

A)social justice
B)intellectual property right
C)digital divide
D)accountability
Question
Which among the following is true

A)internet is a democratic technology
B)internet protects personal privacy
C)internet facilitate the spread of right information
D)none of the above
Question
Which among the following skills need for locating appropriate information on the Internet

A)the ability to use internet tools such as search engines
B)having knowledge of search techniques and ability to execute the search.
C)one needs to have abilities such as searching for information, scanning and skimming information, and strategies such as planning, monitoring and evaluating in executing the search.
D)all of these
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/28
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Computer Science and Ethics
1
What is the first step in protecting yourself from identity theft?

A)never provide any personal data about yourself unless absolutely necessary
B)routinely check your records for signs of identity theft.
C)never use your real name on the internet
D)routinely check for spyware on your computer.
never provide any personal data about yourself unless absolutely necessary
2
A backup is a ...................... against data loss

A)threat
B)security
C)countermeasure
D)abuse
security
3
What is malware?

A)software that has some malicious purpose
B)software that is not functioning properly
C)software that damages your system
D)software that is not properly configured for your system
software that has some malicious purpose
4
Which of the following is a step that all computer users should take to protect against virus attacks?

A)purchase and configure a firewall
B)shut down all incoming ports
C)use non-standard e-mail clients
D)install and use antivirus software
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
5
-------- uses the principles and tools of computer science to model or algorithmically specify complexes biological information system and computational systems with life-like capabilities.

A)virtual computing
B)artificial intelligent
C)bio-computing
D)cookies
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
6
------ uses software to allow people to interact with three-dimensional simulated environment.

A)virtual computing
B)artificial intelligent
C)bio-computing
D)cookies
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
7
The science and engineering of making intelligent machines, especially intelligent computer programs.

A)artificial intelligence
B)stress management
C)anti-virus
D)intellectual property right
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
8
Computers are programmed to make decisions in real-life situations are known as

A)virtual reality
B)robotics
C)neural networks
D)expert system
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
9
Computing systems, which imitate human brain through a network of highly interconnected processing elements.

A)virtual reality
B)robotics
C)neural networks
D)expert system
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
10
Which among the following is not applicable to internet use

A)do not use email to strangers
B)do not give out your email address to people you doesn't know
C)do not open email attachments from people you don't know
D)pretend to be someone else when you are online.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
11
Which among the following is applicable to internet use

A)do not sent spam, worms and viruses into cyberspace
B)do not be rude or use bad language while you use email
C)do not disclose your personal information such as your bank a/c number, passwords etc
D)all of these
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
12
Which among the following is unethical use of cell phone

A)do not accept call while driving
B)switch off cell phone inside an aircraft
C)do capture the images of others without permission of that person
D)keep silent tone in meetings
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
13
A repetitive strain injury (RSI) in computer users caused by

A)improperly positioned key-boards
B)a/c room
C)proper lighting
D)adjustable chair
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
14
The difficulty a person can have in understanding an issue and making decisions that can be caused by the presence of too much information

A)cyber addition
B)information overload
C)repetitive strain injury
D)virtual reality
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
15
Which among the following is not an indication of cyber addition

A)a person frequently find on the internet longer than he wish
B)find a person running late to appointments because of too much time spent online
C)all the time one spends online leads isolation from family and friends and feel like no one in his real life
D)don't feel guilty or defensive about your internet use
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is not true of ethical computing guidelines

A)not to use computer to promote lies
B)use computers with consideration and respect for others
C)avoid causing harm to othrs when using computer
D)snoop in other people's computer files.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
17
The following metric is a measure of the journal quality

A)impact factor
B)prize
C)article size
D)none of the above
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
18
The main advantage(s) of online education is (are)

A)personalized education
B)better flexibility
C)better accessibility
D)all of the above
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
19
Pick the odd one out

A)spam
B)spyware
C)antivirus
D)hoax
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
20
A ............. is a small text file which is placed on your computer on the request made by the web server to your browser.

A)spam
B)cookie
C)web bugs
D)worms
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
21
Established by the Ministry of Education, Government of India as an autonomous organization designed to bring back the entire tradition of Indian philosophy to its pristine and original form and promote new thinking through its intensive programs of research

A)university grand commission (ugc)
B)indian council of social science research (icssr)
C)indian council of philosophical research (icpr)
D)indira gandhi national open university (ignou)
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
22
----- is an example of software being created independent of any money-making incentive or any property rights

A)spyware
B)adware
C)freeware
D)malware
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
23
A computer user, who copies an application onto more than one computer, if the license agreement does not permit this, is participating in:

A)software piracy
B)personal privacy
C)computer theft
D)identity theft
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
24
Experts who are performing a needed service for society by helping companies realize the vulerabilities that exist in their systems by break into system just for the challenge.

A)black-hat hackers
B)white-hat hackers
C)both black-hat hackers and white-hat hackers
D)neither black-hat hackers nor white-hat hackers
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
25
If the antivirus software detects a virus signature or suspicious activity, it stops the execution of the file and virus and notifies you that it has dtected virus is known as:

A)quarantining
B)searching
C)phishing
D)all of these
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
26
The discrepancy between the "haves" and "have-notes" with regards to computer technology is commonly referred as:

A)social justice
B)intellectual property right
C)digital divide
D)accountability
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
27
Which among the following is true

A)internet is a democratic technology
B)internet protects personal privacy
C)internet facilitate the spread of right information
D)none of the above
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
28
Which among the following skills need for locating appropriate information on the Internet

A)the ability to use internet tools such as search engines
B)having knowledge of search techniques and ability to execute the search.
C)one needs to have abilities such as searching for information, scanning and skimming information, and strategies such as planning, monitoring and evaluating in executing the search.
D)all of these
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 28 flashcards in this deck.