1.
An ethical ______ is when one's responsibilites seem to lead in opposite directions.
Correct Answer
A. Dilemma
Explanation
An ethical dilemma occurs when an individual is faced with a situation where their responsibilities or obligations seem to conflict or point in different directions. This can create a difficult decision-making process as one must weigh the potential consequences and ethical implications of each possible action. In such cases, individuals may feel torn between doing what is morally right and fulfilling their duties, leading to a sense of ethical dilemma.
2.
____- are the principles and standards that guide our behavior toward other people.
Correct Answer
B. Ethics
Explanation
Ethics refers to the principles and standards that guide our behavior toward other people. It involves understanding what is right and wrong and making decisions that are morally acceptable. Ethics help individuals determine how they should treat others and what actions are considered morally acceptable in different situations. By following ethical principles, individuals can ensure that their behavior is respectful, fair, and considerate towards others.
3.
At the innermost middle ring of your ethical structure you are faced with very serious ethical ________.
Correct Answer
A. Violations
Explanation
At the innermost middle ring of your ethical structure, you are faced with very serious ethical violations. This suggests that at this level, the actions or decisions being considered go against established ethical principles or standards. These violations may involve actions that are considered morally wrong or unethical, and they can have significant negative consequences for individuals or society as a whole. It is important to address and rectify these violations to maintain a strong ethical foundation.
4.
With respect to the circumstances that surround making an ethical decision, your preception of how many people will be affected by your intended action is called ______.
Correct Answer
A. Reach of results
Explanation
The term "reach of results" refers to the perception of how many people will be impacted by the intended action when making an ethical decision. It implies considering the potential consequences and effects of the action on a broader scale, beyond just immediate or direct outcomes. Understanding the reach of results helps individuals evaluate the ethical implications of their choices and consider the potential impact on a larger group of people.
5.
With respect to the circumstances that surround making an ethical decision, _____ refers to the probability of the harm or benefit that will occur if you take an action.
Correct Answer
A. Likeihood effect
Explanation
The term "likelihood effect" refers to the probability of the harm or benefit that will occur if you take an action in the context of making an ethical decision. It suggests that when considering the potential consequences of an action, one must assess the likelihood or probability of those consequences occurring. This helps in evaluating the potential harm or benefit that may result from the action and aids in making an informed ethical decision.
6.
With respect to the circumstances that surround making an ethical decision, _____ is the length of time it will take for the benefit or harm to take effect.
Correct Answer
A. Time of consequences
Explanation
The term "time of consequences" refers to the length of time it will take for the benefit or harm of an ethical decision to be realized. In other words, it considers the timeframe in which the effects of the decision will manifest. This factor is important to consider when making ethical decisions as it helps to evaluate the potential impact and weigh the long-term consequences against short-term gains or harms.
7.
With respect to the circumstances that surround making an ethical decision, how much you identify with the person or persons who will receive the benefit or suffer the harm of your actions is termed _____.
Correct Answer
A. Relatedness
Explanation
Relatedness refers to the extent to which an individual identifies with the person or persons who will be affected by their actions. It involves understanding and empathizing with others and considering their well-being when making ethical decisions. By considering relatedness, individuals are more likely to make decisions that prioritize the benefit and minimize harm to those who will be impacted by their actions.
8.
With respect to the circumstances that surround making an ethical decision, _____ refers to how much or how little benefit or harm will come from a particular decision.
Correct Answer
A. Consequences
Explanation
The term "consequences" refers to the outcomes or results that may occur as a result of a particular decision. When making an ethical decision, it is important to consider the potential benefits or harms that may arise from that decision. By evaluating the consequences, individuals can determine whether the decision aligns with ethical principles and choose the option that will bring about the greatest overall benefit or the least harm.
9.
With respect to the circumstances that surround making an ethical decision, your perception of what society thinks of your intended action is called _____.
Correct Answer
A. Society opinion
Explanation
The correct answer is "society opinion". When making an ethical decision, your perception of what society thinks of your intended action is important. Society opinion refers to the collective viewpoint or judgment of the community or society in which you live. It influences your ethical decision-making process as you consider the potential impact and consequences of your actions on others and how they will be perceived by society.
10.
_____ is intangible creative work that is embodied in physical form.
Correct Answer
A. Intellectual property
Explanation
Intellectual property refers to intangible creative work that is expressed in a physical form. This includes original ideas, inventions, designs, logos, and artistic works that are protected by copyright, trademarks, and patents. Intellectual property rights grant creators exclusive ownership and control over their work, allowing them to profit from their creations and prevent others from using or copying them without permission.
11.
_____ is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents.
Correct Answer
A. Copyright
Explanation
Copyright is the legal protection given to the expression of an idea, such as a song, video game, or proprietary documents. It grants the creator exclusive rights to reproduce, distribute, and publicly display their work. This protection allows creators to control and monetize their creations, preventing others from using or copying them without permission.
12.
_____ law protects an idea.
Correct Answer
A. Copy right
Explanation
Copyright law protects an idea by granting exclusive rights to the creator or owner of an original work. It gives them the authority to reproduce, distribute, and display their work, as well as the right to create derivative works based on the original idea. This protection ensures that others cannot copy or use the idea without permission, thus safeguarding the creator's intellectual property rights.
13.
The _____ says that you may use copyrighted material in certain situations — for example, in the creation of new work or, within certain limits, for teaching purposes.
Correct Answer
A. Fair use doctrine
Explanation
The fair use doctrine is a legal principle that allows the use of copyrighted material without permission from the copyright owner. It provides exceptions to copyright infringement, allowing for the use of copyrighted material in certain situations such as for the creation of new work or for educational purposes, as long as it is done within certain limits. This doctrine aims to balance the rights of copyright owners with the public's interest in accessing and using copyrighted material.
14.
_____ software is the unauthorized use, duplication, distribution or sale of copyrighted software.
Correct Answer
A. Pirated
Explanation
Pirated software refers to the unauthorized use, duplication, distribution, or sale of copyrighted software. This means that individuals are using or distributing software without obtaining the necessary licenses or permissions from the copyright holder. It is considered illegal and a violation of intellectual property rights.
15.
_____ is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
Correct Answer
A. Privacy
Explanation
Privacy is the correct answer because it refers to the right to be left alone when desired, to have control over personal possessions, and to not be observed without consent. It encompasses the idea of personal autonomy and the ability to keep certain aspects of one's life private.
16.
Many Web sites are offering programs, collectively referred to as _____, to help people monitor what's happening on a computer
Correct Answer
A. Snoopware
Explanation
Snoopware refers to programs that are designed to monitor and track activities on a computer. These programs allow users to keep an eye on what is happening on their computer, such as websites visited, keystrokes entered, and screenshots taken. Snoopware can be used for various purposes, including monitoring employee activities, parental control, or detecting unauthorized access. It is important to note that the use of snoopware can raise privacy concerns and should be used responsibly and legally.
17.
_____ is a program, that when installed on a computer, records every keystroke and mouse click.
Correct Answer
A. Key logger
Explanation
A key logger is a program that, when installed on a computer, records every keystroke and mouse click. This allows the user of the program to monitor and track all activity on the computer, including passwords, personal information, and online activity. It can be used for various purposes, such as monitoring employees or detecting unauthorized access.
18.
A(n) _____ program captures screen images
Correct Answer
A. Screen capture
Explanation
A screen capture program is a software tool that captures and saves images of what is displayed on a computer screen. It allows users to take screenshots of their desktop, specific windows, or selected areas of the screen. This can be useful for various purposes such as creating tutorials, documenting software issues, or saving important information.
19.
A(n) _____ examines information passing through switches, hubs, or routers.
Correct Answer
A. Sniffers
Explanation
A sniffer is a tool that examines information passing through switches, hubs, or routers. It is used to capture and analyze network traffic, allowing users to monitor and troubleshoot network issues, as well as detect any suspicious or unauthorized activities. Sniffers are commonly used by network administrators and security professionals to ensure the integrity and security of a network.
20.
_____ occurs when someone forges your identity for fraudulent purposes.
Correct Answer
A. Identy theft
Explanation
Identity theft occurs when someone forges your identity for fraudulent purposes. This can involve stealing personal information such as your name, social security number, or financial details, and using it to commit various crimes, such as opening credit accounts, making unauthorized purchases, or even filing fraudulent tax returns. The perpetrator may use this stolen identity to impersonate you and carry out illegal activities, causing significant financial and emotional harm to the victim. It is important to safeguard personal information and be vigilant against potential identity theft threats.
21.
_____ is a technique used to gain personal information for the purpose of identity theft.
Correct Answer
A. Fraud
Explanation
Fraud is a technique used to gain personal information for the purpose of identity theft. This involves deceiving individuals into providing sensitive information such as passwords, social security numbers, or credit card details. Perpetrators may use various methods like phishing emails or phone scams to trick their victims. Once they have obtained the personal information, they can then use it for fraudulent activities, such as making unauthorized purchases or opening accounts in the victim's name.
22.
_____ is a technique which reroutes your request for a legitimate Web site to a fake site that collects information from you.
Correct Answer
A. pHarming
Explanation
Pharming is a technique that redirects a user's request for a genuine website to a fraudulent website, with the intention of collecting sensitive information. This is done by manipulating the DNS (Domain Name System) or by exploiting vulnerabilities in the user's computer or network. Unlike phishing, where the attacker lures the user to a fake website through deceptive emails or messages, pharming directly redirects the user's traffic without their knowledge or consent. This allows the attacker to gather personal information, such as login credentials or financial details, without raising suspicion from the user.
23.
_____ is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.
Correct Answer
A. Hardware key logger
Explanation
A hardware key logger is a device that captures keystrokes made on a keyboard before they reach the motherboard. This device is typically installed between the keyboard and the motherboard, allowing it to record all keystrokes made by the user. It is often used for surveillance or monitoring purposes, and can be difficult to detect as it operates at a hardware level rather than relying on software.
24.
A(n) _____ is a small record deposited on your hard disk by a Web site containing information about you and your Web activities.
Correct Answer
A. Cookie
Explanation
A cookie is a small record deposited on your hard disk by a Web site containing information about you and your Web activities.
25.
_____ cookies start out as a unique cookie, but the original site sold access to it to a third party that can then change the cookie and track the surfer's activity across many sites.
Correct Answer
A. Common
Explanation
Common cookies start out as a unique cookie, but the original site sold access to it to a third party that can then change the cookie and track the surfer's activity across many sites.
26.
_____ is unsolicited e-mail that advertises goods and services.
Correct Answer
A. SPAM
Explanation
SPAM is unsolicited e-mail that advertises goods and services. It is commonly used to refer to unwanted or junk emails that are sent in bulk to a large number of recipients without their consent. SPAM emails often contain advertisements, promotions, or links to malicious websites. Adware, trojan horse, and spyware are different types of malicious software that can be delivered through various means, but they do not specifically refer to unsolicited e-mails.
27.
_____ is software to generate ads that installs itself on your computer when you download some other (usually free) program from the Web.
Correct Answer
A. Adware
Explanation
Adware is software that generates ads and installs itself on your computer when you download another program from the internet, typically a free program. This type of software is designed to display advertisements on your computer, often in a disruptive or intrusive manner. It is important to be cautious when downloading free programs from the web to avoid inadvertently installing adware on your computer.
28.
_____ software is software you do not want hidden inside software you do want
Correct Answer
A. Trojan horse
Explanation
A trojan horse is a type of malicious software that appears to be legitimate or desirable, but actually contains hidden harmful code or functionality. In this context, the statement suggests that trojan horse software is something that you do not want hidden within software that you do want. This means that while you may want and trust the software you are using, the presence of a trojan horse within it can cause harm or compromise the security of your system.
29.
_____ is software that comes hidden in free downloadable software and collects information about you and your computer and reports it to someone without your permission.
Correct Answer
A. Spyware
Explanation
Spyware is a type of software that is often bundled with free downloadable software and remains hidden on a user's computer. Its purpose is to collect information about the user and their computer activities without their knowledge or consent. This information is then reported back to someone else, typically for malicious purposes.
30.
A(n) _____ consists of one line of information for every visitor to a Web site and is usually stored on a Web server.
Correct Answer
A. Web log
Explanation
A web log, also known as a "blog," is a type of website that contains a series of entries or posts in reverse chronological order. It consists of one line of information for every visitor to a website and is usually stored on a web server. This log keeps track of various details such as the visitor's IP address, the pages they accessed, the time of their visit, and other relevant information. It is commonly used for website analytics, tracking user behavior, and identifying trends in website traffic.
31.
A(n) _____ records information about you during a Web surfing session such as what Web sites you visited, how long you were there, what ads you looked at, and what you bought.
Correct Answer
A. Click stream
Explanation
A click stream refers to the recording of information about a user's web browsing session, including the websites visited, duration of visit, advertisements viewed, and purchases made. It allows for the analysis of user behavior and preferences, aiding in targeted advertising and improving website design and functionality.
32.
In 2001, the FBI acknowledged an enhancement to DCS-1000 called _____, which is key logger software.
Correct Answer
A. Magic lantern
Explanation
The correct answer is "Magic lantern". In 2001, the FBI acknowledged an enhancement to DCS-1000, which is key logger software. This enhancement was called Magic lantern.
33.
_____ crime in general, accounts for at least $ billion in losses among US businesses every year - and information technology makes it easier to accomplish and conceal the crime.
Correct Answer
A. White collar
Explanation
White collar crime refers to non-violent crimes committed by individuals in professional or business settings. These crimes typically involve deceit, fraud, or manipulation for financial gain. The given statement suggests that white collar crime, aided by advancements in information technology, leads to billions of dollars in losses for US businesses annually. This explanation highlights the significance of white collar crime and its impact on the economy, emphasizing the role of technology in facilitating and hiding such criminal activities.
34.
_____ are generally very knowledgeable computer users who use their knowledge to invade other people's computer
Correct Answer
A. Hackers
Explanation
Hackers are generally very knowledgeable computer users who use their knowledge to invade other people's computers. They often exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, or cause damage. Unlike crackers, who have malicious intent, hackers can be classified into different categories based on their motivations and actions, such as white hat hackers (ethical hackers) who help organizations identify and fix security vulnerabilities, and black hat hackers who engage in illegal activities. Therefore, hackers are the correct answer in this context.
35.
A(n) _____ is a type of hacker who is engaged in corporate espionage
Correct Answer
A. Crackers
Explanation
Crackers are a type of hacker who engage in corporate espionage. They infiltrate computer systems and networks to gain unauthorized access to sensitive information or trade secrets for personal gain or to sell to competitors. Unlike hackers who may have different motivations such as curiosity or activism, crackers specifically target corporate entities for financial or competitive advantage.
36.
A hacker who has been stealing credit card number would be considered a _____ hacker.
Correct Answer
A. Black hat
Explanation
A hacker who steals credit card numbers would be considered a black hat hacker. This term refers to hackers who engage in illegal activities and use their skills for malicious purposes, such as stealing personal information or causing damage to computer systems. Black hat hackers typically have criminal intent and operate outside the boundaries of the law.
37.
A(n) _____ is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other Internet traffic.
Correct Answer
A. Worm
Explanation
A worm is a type of virus that can spread itself not only through files, but also through computer networks, such as email and other forms of Internet traffic. Unlike other viruses, which typically require user interaction to spread, worms can replicate and spread automatically, making them highly efficient at infecting multiple computers.
38.
A(n) _____ attack floods a Web site with so many requests for service that it slows down or crashes.
Correct Answer
A. Denial of service
Explanation
A denial of service attack is a type of cyber attack where a website is flooded with an overwhelming amount of requests for service, causing it to slow down or crash. This is achieved by exploiting vulnerabilities in the website's servers or network infrastructure. The attacker aims to make the website unavailable to its intended users, disrupting its normal functioning.
39.
_____ software detects and removes or quarantines computer viruses.
Correct Answer
A. Anti-virus
Explanation
Anti-virus software is designed to detect and remove or isolate computer viruses. It scans files and programs on a computer to identify any malicious code or patterns associated with viruses. Once detected, the software can either remove the virus or quarantine it, preventing it from causing further damage. This software is essential for protecting computers and networks from the harmful effects of viruses.
40.
Hardware and/or software that protects computers from outsides is called a(n) _____.
Correct Answer
A. Firewall
Explanation
A firewall is a security device or software that is designed to protect computers from outside threats. It acts as a barrier between a private internal network and the public internet, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. Firewalls can prevent unauthorized access, filter out malicious content, and detect and block suspicious activities. They are essential in safeguarding computer systems and networks from potential cyber attacks, making the correct answer for this question "firewall".
41.
_____ use physical characteristics to assess access rights.
Correct Answer
A. Biometers
Explanation
Biometers refer to the use of physical characteristics, such as fingerprints or facial recognition, to assess access rights. This means that biometric technology is used to verify a person's identity based on their unique physical traits. By using biometers, organizations can ensure enhanced security and prevent unauthorized access to sensitive information or restricted areas.
42.
_____ scrambles the contents of a file so you can't read it without having the right decryption key.
Correct Answer
A. Encryption
Explanation
Encryption is a process that scrambles the contents of a file in such a way that it becomes unreadable without the correct decryption key. It is a security measure used to protect sensitive information from unauthorized access. By encrypting a file, it ensures that even if someone gains access to the file, they will not be able to understand its contents without the appropriate key.
43.
_____ is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient.
Correct Answer
A. Public key encryption
Explanation
Public key encryption is a type of encryption system that uses two keys, a public key and a private key. The public key is available to everyone, while the private key is only known to the recipient. This system allows for secure communication between parties, as messages encrypted with the public key can only be decrypted with the corresponding private key. It is commonly used in secure online transactions and communication protocols.