100% found this document useful (1 vote)
1K views5 pages

Ethics in IT MCQs With Answers

The document discusses ethics in IT and contains 15 multiple choice questions about topics like computer ethics, intellectual property rights including copyright, patents and trademarks, network security, passwords, hackers and software piracy.

Uploaded by

09whitedevil90
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views5 pages

Ethics in IT MCQs With Answers

The document discusses ethics in IT and contains 15 multiple choice questions about topics like computer ethics, intellectual property rights including copyright, patents and trademarks, network security, passwords, hackers and software piracy.

Uploaded by

09whitedevil90
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
  • Ethics in IT MCQs with Answers: Contains multiple-choice questions related to ethics in IT, including topics like copyright and intellectual property.
  • Answer Keys: Provides the correct answers to the multiple-choice questions presented in the previous section.

Ethics in IT MCQs with Answers

netexplanations.com/ethics-in-it-mcqs-with-answers

August 2, 2021

1) The application of moral principles to the use of computers and the Internet.

a) Computer ethics

b) Protocols

c) Software

d) All of these

2) These are the rights of the owner of information to decide how much information
is to be exchanged, shared or distributed.

a) Computer Ethics

b) Intellectual property rights

c) Cyber law

d) labour law

3) Copyright, patents and trademarks are the examples of

a) Protocols

b) Cyber Law

c) Ethics

d) Intellectual property rights

4) © symbol, the alphabet C is enclosed within the circle, that you see on different
items, books, magzines and even web pages.

a) Protocol

b) patents

c) trademarks

d) copyright

5) It is a distinctive sign that identifies certain goods or services produced or


provided by an individual or a company.

1/5
a) Patents

b) Trademarks

c) Copyright

d) None of these

6) It contains one or more than one combination of words, letters and numerals.

a) Protocol

b) patents

c) trademarks

d) copyright

7) The holders of …………………. are granted the exclusive rights to prevent others
from using, commercializing or importing the patented products or processes.

a)Patents

b) Trademarks

c) Copyright

d) Both A and C

8) It ensures that the owners of marks have the exclusive rights to use them to
identify goods or services or to authorize others to use them in return for payment.

a) Copyright

b) Patents

c) Trademarks

d) All of these

9) The symbol generally comes before a statement, All Rights Reserved which
indicates that the materials and information are protected (copyrighted) and are the
sole property of the owner.

a) Trademarks

b) Copyright

c) Patents

d) None of these

2/5
10) It means that data is protected from unauthorised changes to ensure that it is
reliable and correct.

a) privacy

b) security

c) Integrity

d) defence

11) A network security system that manages and regulates the network traffic
based on some protocols.

a) Network security

b) Integrity

c) Internet security

d) Firewalls

12) The security that is provided to protect a network from unauthorised acces and
risks.

a) Copyright

b) Firewalls

c) Network security

d) Patents

13) It is a key or secret word which is used to protect your information from an
unauthorised access.

a) Password

b) Patent

c) Copyright

d) Trademark

14) A person who breaks into a computer system to get illegal access to the
information stored there.

a) Cracker

b) Hacker

3/5
c) Information warriors

d) virus programmers

15) It is an act of stealing (like copying, distributing, modifying, selling) of software


that is legally protected.

a) Renting.

b) Software piracy

c) copyright

d) Hacking

Answer Keys

1 C

2 B

3 D

4 D

5 B

6 C

7 A

8 C

9 B

10 C

11 D

12 C

13 A

4/5
14 B

15 B

5/5

You might also like