Computer Ethics MCQ Quiz

Reviewed by Godwin Iheuwa
Godwin Iheuwa, MS (Computer Science) |
Database Administrator
Review Board Member
Godwin Iheuwa, a Database Administrator at MTN Nigeria, holds an MS in Computer Science, specializing in Agile Methodologies and Database Administration from the University of Bedfordshire and a Bachelor's in Computer Science from the University of Port Harcourt. His proficiency in SQL Server Integration Services (SSIS) and SQL Server Management Studio contributes to his expertise in database management.
, MS (Computer Science)
Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Celeste Gillis
C
Celeste Gillis
Community Contributor
Quizzes Created: 1 | Total Attempts: 40,173
Questions: 10 | Attempts: 40,231

Settings

Computer ethics MCQ quiz! With the introduction of computers, there is a lot of evil spread through the Internet, and people use it to cause damage to others. If you are new to some organization, there are some computer ethics you will be expected to follow. So, how knowledgeable are you when it comes to computer ethics? Take the test below and get to find out!


Questions and Answers
  • 1. 

    What is NOT an example of cyberbullying?

    • A.

      Creating an embarrassing picture of your classmate and forwarding it to your friend's email addresses

    • B.

      Sending someone a mean text

    • C.

      Bullying someone in the hallway

    • D.

      Threatening someone in an instant message

    Correct Answer
    C. Bullying someone in the hallway
    Explanation
    Bullying someone in the hallway is not an example of cyberbullying because it does not involve the use of electronic communication or technology. Cyberbullying refers to the act of using digital platforms to harass, intimidate, or harm others, such as creating embarrassing pictures and forwarding them, sending mean texts, or threatening someone through instant messages.

    Rate this question:

  • 2. 

    Which is an example of plagiarism?

    • A.

      Reading a paragraph online and retyping it in your own words.

    • B.

      Copying and pasting someone else's work into your paper using quotation marks and citing the author

    • C.

      Typing a paper in your own words

    • D.

      Copying and pasting a sentence from the Internet into your paper.

    Correct Answer
    D. Copying and pasting a sentence from the Internet into your paper.
    Explanation
    Copying and pasting a sentence from the Internet into your paper is an example of plagiarism because it involves directly taking someone else's work without giving proper credit or citation. This action does not involve rephrasing or summarizing the information in your own words, which is necessary to avoid plagiarism.

    Rate this question:

  • 3. 

    Which is NOT a consequence of copying or distributing copyrighted software?

    • A.

      Community Service

    • B.

      Imprisonment

    • C.

      Up to $10,000 in legal fees

    • D.

      Up to $50,000 in civil fees

    Correct Answer
    A. Community Service
    Explanation
    Copying or distributing copyrighted software without permission is illegal and can result in various consequences. Community service is not typically a consequence of this action. Instead, the possible consequences include imprisonment, legal fees of up to $10,000, and civil fees of up to $50,000.

    Rate this question:

  • 4. 

    Which is not a type of cyberbully?

    • A.

      "Mean Girls"

    • B.

      Power Hungry or Revenge of the Nerds

    • C.

      Big, Bad Bully

    • D.

      The Vengeful Angel

    • E.

      The Inadvertent Cyberbully "Because I Can"

    Correct Answer
    C. Big, Bad Bully
    Explanation
    The correct answer is "Big, Bad Bully." This is because the other options, such as "Mean Girls," "Power Hungry or Revenge of the Nerds," "The Vengeful Angel," and "The Inadvertent Cyberbully 'Because I Can,'" all describe different types of cyberbullies. However, "Big, Bad Bully" does not accurately describe a specific type of cyberbully.

    Rate this question:

  • 5. 

    Check TWO ways to prevent or stop cyberbullying.

    • A.

      Forward a mean message about a bully to your friends.

    • B.

      Tell your parents, and teachers, or inform the administrator.

    • C.

      Not forwarding mean texts which are sent to you about a classmate.

    • D.

      Use instant messenger to talk to your friends about someone's outfit you did not like that day at school.

    Correct Answer(s)
    B. Tell your parents, and teachers, or inform the administrator.
    C. Not forwarding mean texts which are sent to you about a classmate.
    Explanation
    The correct answer is to tell your parent, or teacher, or inform the administrator, and not to forward mean texts that are sent to you about a classmate. By informing a trusted adult or authority figure, you are seeking help and support in dealing with the cyberbullying situation. Additionally, by refusing to forward mean texts, you are actively choosing not to participate in the spread of harmful content, which can help to prevent the escalation of cyberbullying incidents.

    Rate this question:

  • 6. 

    Which of the following is a key principle of computer ethics that involves ensuring the privacy and confidentiality of user data?

    • A.

      Plagiarism

    • B.

      Intellectual Property Rights

    • C.

      Data Integrity

    • D.

      Information Privacy

    Correct Answer
    D. Information Privacy
    Explanation
    Information Privacy is a key principle of computer ethics that involves protecting the privacy and confidentiality of user data. This principle ensures that personal information is not disclosed without consent and is safeguarded against unauthorized access. Plagiarism refers to using someone else's work without giving credit, Intellectual Property Rights protect creators' inventions and works, and Data Integrity ensures the accuracy and consistency of data.

    Rate this question:

  • 7. 

    Which of the following is NOT a rule listed in Computer Discovery's Ten Commandments of Computer Ethics?

    • A.

      Thou shalt not use a computer to email.

    • B.

      Thou shalt not use a computer to cyber bully.

    • C.

      Thou shalt not use a computer to interfere with other people's computer work.

    • D.

      Thou shalt not use a computer to be nosy or snoop into other people's computer files.

    • E.

      Thou shalt not use a computer to steal.

    Correct Answer
    A. Thou shalt not use a computer to email.
    Explanation
    The correct answer is "Thou shalt not use a computer to email." This is not listed as a rule in Computer Discovery's Ten Commandments of Computer Ethics. The other options are all listed as rules, such as not using a computer to cyberbully, interfere with other people's computer work, be nosy or snoop into other people's computer files, or steal.

    Rate this question:

  • 8. 

    Which of the following is NOT a rule listed in Computer Discovery's Ten Commandments of Computer Ethics?

    • A.

      Thou Shalt not use a computer to lie.

    • B.

      Thou shalt not copy copyrighted software and materials.

    • C.

      Thou shalt not let others borrow your computer.

    • D.

      Thou shalt not use a computer to plagiarize.

    • E.

      Thou shalt respect others at all times when using the computer.

    Correct Answer
    C. Thou shalt not let others borrow your computer.
    Explanation
    The correct answer is "Thou shalt not let others borrow your computer." This statement is not listed in Computer Discovery's Ten Commandments of Computer Ethics. The other four options are all mentioned in the commandments: not using a computer to lie, not copying copyrighted software and materials, not using a computer to plagiarize, and respecting others at all times when using the computer.

    Rate this question:

  • 9. 

    Thou shalt not create ______________________ software or games.

    • A.

      Difficult

    • B.

      Copyrighted

    • C.

      Easy

    • D.

      Harmful

    Correct Answer
    D. Harmful
    Explanation
    The phrase "Thou shalt not" is a biblical commandment that means "you shall not." In this context, it is instructing not to create software or games that are harmful. Harmful software or games can refer to those that cause damage, pose a threat to users' privacy or security, promote violence or hate speech, or have negative impacts on individuals or society. Creating such software or games goes against ethical and moral principles, and can have legal consequences as well.

    Rate this question:

  • 10. 

    Thou shalt not copy ___________________________ software or materials.

    • A.

      Public-domain

    • B.

      Copyrighted

    • C.

      Self-created

    • D.

      Self-published

    Correct Answer
    B. Copyrighted
    Explanation
    The phrase "Thou shalt not copy copyrighted software or materials" suggests that it is prohibited to reproduce or duplicate software or materials that are protected by copyright laws. Copyrighted materials are those that are owned by someone and are protected by law, granting the owner exclusive rights to control their reproduction and distribution. Therefore, copying copyrighted software or materials without permission would be considered a violation of the law.

    Rate this question:

Godwin Iheuwa |MS (Computer Science) |
Database Administrator
Godwin Iheuwa, a Database Administrator at MTN Nigeria, holds an MS in Computer Science, specializing in Agile Methodologies and Database Administration from the University of Bedfordshire and a Bachelor's in Computer Science from the University of Port Harcourt. His proficiency in SQL Server Integration Services (SSIS) and SQL Server Management Studio contributes to his expertise in database management.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 29, 2024
    Quiz Edited by
    ProProfs Editorial Team

    Expert Reviewed by
    Godwin Iheuwa
  • Oct 27, 2009
    Quiz Created by
    Celeste Gillis
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.