1.
A ________ is a person who gains unauthorized access to a computer network for the purpose of corrupting or stealing data.
Correct Answer
B. Hacker
Explanation
A hacker is a person who gains unauthorized access to a computer network for the purpose of corrupting or stealing data. Hackers use their technical skills and knowledge to exploit vulnerabilities in computer systems and networks, allowing them to bypass security measures and gain access to sensitive information. They may also manipulate or corrupt data for personal gain or to cause harm. Hackers are often motivated by curiosity, personal gain, or even political or ideological reasons.
2.
You accidentally see your teacher’s password for the grading program used at your school. Ethically, you should do which of the following:
Correct Answer
B. Explain to your teacher and suggest she change her password.
Explanation
Explain to your teacher and suggest she change her password. This option is the most ethical because it involves taking responsibility for the situation and addressing the breach of security appropriately. By informing the teacher, you are helping to protect the integrity of the grading program and prevent any potential misuse of the password. This action demonstrates honesty, integrity, and a commitment to upholding ethical standards.
3.
What is “software piracy”?
Correct Answer
A. Illegally copying computer programs
Explanation
Software piracy refers to the act of illegally copying computer programs. This involves making unauthorized duplicates of software without the permission of the copyright holder. It is considered an infringement of intellectual property rights and is against the law. Software piracy can occur through various means such as downloading pirated software from the internet or sharing unauthorized copies with others. This practice not only deprives software developers of their rightful income but also undermines the industry as a whole.
4.
Which of the following is not an advantage of buying your own software?
Correct Answer
B. Making copies and reselling them for a profit
Explanation
Making copies and reselling them for a profit is not an advantage of buying your own software because it is illegal and violates copyright laws. When you purchase software, you are typically only granted a license to use it for personal or business purposes, not to duplicate and sell it for profit.
5.
__________ is software that you can use on a limited trial basis before you buy it.
Correct Answer
C. Shareware
Explanation
Shareware refers to software that is available for users to try on a limited trial basis before they decide to purchase it. This allows users to evaluate the software's features, functionality, and compatibility with their needs before making a financial commitment. Unlike freeware, which is available for free, shareware typically requires a payment or registration to unlock the full version of the software. Therefore, shareware is the correct answer in this context.
6.
A ______ is a virus that is often disguised as a useful computer program.
Correct Answer
A. Trojan Horse
Explanation
A Trojan Horse is a type of virus that is designed to deceive users by disguising itself as a useful computer program. It tricks users into downloading or installing it, often by appearing as a harmless or beneficial software. Once inside the system, the Trojan Horse can perform malicious activities, such as stealing personal information, damaging files, or allowing unauthorized access to the computer. Unlike hackers, worms, or pirates, Trojan Horses specifically rely on deception to gain entry and carry out their harmful actions.
7.
_________ domain software can be copied, modified and redistributed free of charge and restriction.
Correct Answer
C. Public
Explanation
Public domain software refers to software that is not protected by copyright and is available for anyone to use, modify, and distribute freely without any charge or restrictions. This means that users have the freedom to copy, share, and even make changes to the software as they see fit. Public domain software is often created by individuals or organizations who voluntarily release their work into the public domain, allowing others to benefit from their contributions without any legal limitations.
8.
Which of the following should be done if you discover a virus on your computer?
Correct Answer
C. Disinfect your computer using antivirus software
Explanation
If you discover a virus on your computer, the recommended action is to disinfect your computer using antivirus software. Antivirus software is specifically designed to detect and remove viruses from your system, ensuring that your computer is protected and the virus is eliminated. This is a proactive step to prevent further damage to your computer and to ensure the safety of your data and personal information. E-mailing all your friends to warn them of the virus may be helpful, but it is not the most immediate and effective solution. Removing and destroying all files with the .exe extension is not necessary as not all .exe files are viruses. Purchasing another computer is an unnecessary expense and does not address the issue at hand.
9.
A broad range of issues and standards of conduct related to the use of computer technology is:
Correct Answer
D. Ethics
Explanation
The correct answer is ethics because a broad range of issues and standards of conduct related to the use of computer technology encompasses ethical considerations. Ethics in computer technology involves making moral decisions and adhering to principles that govern the appropriate and responsible use of technology. This includes issues such as privacy, data protection, cyberbullying, and ensuring fair and equitable access to technology.
10.
How can software developers keep users from making illegal copies of their software?
Correct Answer
A. Copyright the software
Explanation
Software developers can protect their software from illegal copying by copyrighting it. Copyrighting provides legal protection to the original work, preventing others from reproducing, distributing, or selling the software without the developer's permission. This helps to safeguard the intellectual property rights of the software developer and discourages unauthorized copying, thereby reducing the chances of illegal copies being made.
11.
_________ software is made available by the author to others at no cost, but cannot be resold or distributed for profit.
Correct Answer
D. Freeware
Explanation
Freeware refers to software that is provided by the author to others at no cost. However, it cannot be resold or distributed for profit. This means that users are allowed to use the software for free, but they cannot sell it or distribute it to others in exchange for money. Freeware is different from open-source software, as the source code is not necessarily available for modification or redistribution.
12.
When safely using the Internet it is recommended that you do which of the following?
Correct Answer
C. Never agree to meet someone you do not know
Explanation
When safely using the Internet, it is important to prioritize personal safety. Agreeing to meet someone you do not know can be dangerous as you cannot guarantee their intentions or trustworthiness. Therefore, it is recommended to never agree to meet someone you do not know in order to protect oneself from potential harm or risky situations.
13.
Which of the following is a true statement concerning plagiarism and the Internet?
Correct Answer
C. Always site Internet sources in a bibliograpHy.
Explanation
Plagiarism is a serious issue, and it applies to the Internet as well. When using information from the Internet, it is important to properly cite the sources in a bibliography. This helps to give credit to the original authors and avoid plagiarism.
14.
The ________ divide can refer to the differences between individuals within a particular country, as well as between one country and another.
Correct Answer
B. Digital
Explanation
The term "digital divide" refers to the gap or disparity between individuals or groups who have access to and use digital technologies and those who do not. This divide can exist within a country, where some individuals have access to digital technologies while others do not, and it can also exist between different countries, where some countries have more advanced digital infrastructure and resources compared to others.
15.
A message that appears to come from a person or company other than the real sender is a ________.
Correct Answer
D. Spoof
Explanation
A message that appears to come from a person or company other than the real sender is a spoof. This term is commonly used to describe fraudulent emails or messages that mimic the identity of a trusted individual or organization in order to deceive recipients. Spoofing is often done for malicious purposes, such as phishing or spreading malware, and it is important to be cautious and verify the authenticity of such messages before taking any action.
16.
The electronic equilvalent of junk mail is known as:
Correct Answer
B. Spam
Explanation
The correct answer is "spam" because spam refers to unsolicited and unwanted electronic messages, typically sent in bulk. Just like junk mail, spam is often sent for advertising purposes or to spread malicious content. Adware refers to software that displays advertisements, cyberfraud refers to fraudulent activities conducted online, and packets refer to units of data transmitted over a network. However, none of these options accurately represent the electronic equivalent of junk mail except for spam.