BECE ICT past questions – Ethics of Using ICT
Quiz-summary
0 of 75 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You have to pass the previous Module’s quiz in order to start this quiz
Results
Results
0 of 75 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Earned Points: 0 of 0, (0)
0 Essay(s) Pending (Possible Points: 0)
Average score |
|
Your score |
|
Categories
- Ethics of Using ICT 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- Answered
- Review
-
Question 1 of 75
1. Question
Category: Ethics of Using ICTWhich of the following is not a way to connect with your audience when speaking to a group?
CorrectIncorrect -
Question 2 of 75
2. Question
Category: Ethics of Using ICTWhat is copyright?
CorrectIncorrect -
Question 3 of 75
3. Question
Category: Ethics of Using ICTWhich of the following kinds of software can you download legally and ethically from the internet for free?
CorrectIncorrect -
Question 4 of 75
4. Question
Category: Ethics of Using ICTShareware means ………………..……………
CorrectIncorrect -
Question 5 of 75
5. Question
Category: Ethics of Using ICTPublic domain
CorrectIncorrect -
Question 6 of 75
6. Question
Category: Ethics of Using ICTA student went to Acme art company online and copied a picture of some art for sale, without permission. This action would be considered ………………………….
CorrectIncorrect -
Question 7 of 75
7. Question
Category: Ethics of Using ICTCopying material word for word and claiming that it is yours is called
CorrectIncorrect -
Question 8 of 75
8. Question
Category: Ethics of Using ICTWhich of the following situations would be considered ethical?
CorrectIncorrect -
Question 9 of 75
9. Question
Category: Ethics of Using ICTIf you see a picture on the internet you want to use, you should make sure that it is
CorrectIncorrect -
Question 10 of 75
10. Question
Category: Ethics of Using ICTIf you copy materials that is copyrighted, the worst thing that could happen to you is
CorrectIncorrect -
Question 11 of 75
11. Question
Category: Ethics of Using ICTThis protects someone’s work from being copied.
CorrectIncorrect -
Question 12 of 75
12. Question
Category: Ethics of Using ICTIn order to avoid plagiarism, always ………….………………
CorrectIncorrect -
Question 13 of 75
13. Question
Category: Ethics of Using ICTThis cannot be copyrighted.
CorrectIncorrect -
Question 14 of 75
14. Question
Category: Ethics of Using ICTMy friend bought a CD at the music store and let me borrow it so that I could copy my favorite song. Since it has already been paid for, it is perfectly legal for me to make one copy for myself, as long as I don’t share it with anyone else and give the CD /file back to them.
CorrectIncorrect -
Question 15 of 75
15. Question
Category: Ethics of Using ICTBecause of the ease of the internet, I can print, copy, and distribute material from the internet and I am not violating the copyright law.
CorrectIncorrect -
Question 16 of 75
16. Question
Category: Ethics of Using ICTWhen you copy a song from the internet using a file sharing software service, you can remain anonymous and no one can find you.
CorrectIncorrect -
Question 17 of 75
17. Question
Category: Ethics of Using ICTYou are protected by law when you create something.
CorrectIncorrect -
Question 18 of 75
18. Question
Category: Ethics of Using ICTYou just read a great line from Shakespeare and you think it would make a great start for a song. Now you need to get permission to use the story from the copyright owner.
CorrectIncorrect -
Question 19 of 75
19. Question
Category: Ethics of Using ICTAs a student if you check out a book at the library, is it okay to copy just small portion of the book for educational reasons without the author’s permission?
CorrectIncorrect -
Question 20 of 75
20. Question
Category: Ethics of Using ICTViolating copyright laws can be ruled as criminal in nature. If you get caught you may have to go to jail.
CorrectIncorrect -
Question 21 of 75
21. Question
Category: Ethics of Using ICTYou wrote something and you want to send it to a writing contest. How would you copyright it?
CorrectIncorrect -
Question 22 of 75
22. Question
Category: Ethics of Using ICTCopyright is intended to protect the author’s right to control his/her work.
CorrectIncorrect -
Question 23 of 75
23. Question
Category: Ethics of Using ICTFor a work to be protected under copyright, it must …………………………….
CorrectIncorrect -
Question 24 of 75
24. Question
Category: Ethics of Using ICTA work of an author/song writer who died last year is now automatically in the public domain (can be copied freely).
CorrectIncorrect -
Question 25 of 75
25. Question
Category: Ethics of Using ICTIf a work doesn’t have a copyright notice, it is not copyrighted and therefore okay to take and use.
CorrectIncorrect -
Question 26 of 75
26. Question
Category: Ethics of Using ICTWhich of the following statement is not correct? Some purposes of copyright law are to…………………….…..
CorrectIncorrect -
Question 27 of 75
27. Question
Category: Ethics of Using ICTIf you own an artist’s painting (famous or not), you now own the copyright to the painting and can make copies of it.
CorrectIncorrect -
Question 28 of 75
28. Question
Category: Ethics of Using ICTIf you are sent a picture music/game/etc from the author, you own the copyright.
CorrectIncorrect -
Question 29 of 75
29. Question
Category: Ethics of Using ICTThe ethical issue that relates to the responsibility of those who collect data to ensure that data is correct is……………..
CorrectIncorrect -
Question 30 of 75
30. Question
Category: Ethics of Using ICTSoftware that was written with malicious intent to cause annoyance or damage is a (an) ……………………………..
CorrectIncorrect -
Question 31 of 75
31. Question
Category: Ethics of Using ICTIn which of these sectors is computers wrongly used?
CorrectIncorrect -
Question 32 of 75
32. Question
Category: Ethics of Using ICT………………………… is a term used to describe a wide range of programs that secretly record and report an individual’s activities on the internet?
CorrectIncorrect -
Question 33 of 75
33. Question
Category: Ethics of Using ICTThe ethical issue that concerns the collection and use of data about individual is ……………………………
CorrectIncorrect -
Question 34 of 75
34. Question
Category: Ethics of Using ICTThe largest category of computer criminals is ………….…………………..
CorrectIncorrect -
Question 35 of 75
35. Question
Category: Ethics of Using ICT…………………………. is/are concerned with protective information, hardware and software.
CorrectIncorrect -
Question 36 of 75
36. Question
Category: Ethics of Using ICTIt fills a computer system with self-replicating information.
CorrectIncorrect -
Question 37 of 75
37. Question
Category: Ethics of Using ICTEncoding information so that only authorized users read or use it.
CorrectIncorrect -
Question 38 of 75
38. Question
Category: Ethics of Using ICTWhich of the following is associated with computer disease?
CorrectIncorrect -
Question 39 of 75
39. Question
Category: Ethics of Using ICTWhat is Netiquette?
CorrectIncorrect -
Question 40 of 75
40. Question
Category: Ethics of Using ICTThe only data that a computer can understand is 0 and 1
CorrectIncorrect -
Question 41 of 75
41. Question
Category: Ethics of Using ICTIt is a program in the cyberspace and intercepts messages containing specific text?
CorrectIncorrect -
Question 42 of 75
42. Question
Category: Ethics of Using ICTWhat are new facts entered into the computer to be processed, which consists of text, numbers, sounds, and images?
CorrectIncorrect -
Question 43 of 75
43. Question
Category: Ethics of Using ICTIt is a software that is created to intentionally destroy data.
CorrectIncorrect -
Question 44 of 75
44. Question
Category: Ethics of Using ICTWhen someone is connected to computer communication system such as internet, it is termed as …………………………
CorrectIncorrect -
Question 45 of 75
45. Question
Category: Ethics of Using ICTAn operating system such as windows 2000 professional, windows XP, and windows 7 which are designed by Microsoft are called …………………….
CorrectIncorrect -
Question 46 of 75
46. Question
Category: Ethics of Using ICTThey are virtual diaries created by individuals and stored on the internet.
CorrectIncorrect -
Question 47 of 75
47. Question
Category: Ethics of Using ICTThe process of applying standard codes of behaviour or common courtesy, when using the internet is called…………….
CorrectIncorrect -
Question 48 of 75
48. Question
Category: Ethics of Using ICTWhich of the following is not an advantage of using the internet?
CorrectIncorrect -
Question 49 of 75
49. Question
Category: Ethics of Using ICTA mode of communication which does not require all parties involved in the communication to be present and available at the same time is termed as …………..…………….
CorrectIncorrect -
Question 50 of 75
50. Question
Category: Ethics of Using ICTA state-granted right to protect a form of intellectual property such as patent right, copyright, etc is termed as……………..
CorrectIncorrect -
Question 51 of 75
51. Question
Category: Ethics of Using ICTA direct communication, where all parties involved in the communication are present at the same time is termed as ……………………………
CorrectIncorrect -
Question 52 of 75
52. Question
Category: Ethics of Using ICTComputer virus can spread through the following means except …………………..…………..
CorrectIncorrect -
Question 53 of 75
53. Question
Category: Ethics of Using ICTAll the following are signs of virus infection on the computer except ……………….……………
CorrectIncorrect -
Question 54 of 75
54. Question
Category: Ethics of Using ICTComputers can be protected from virus infections by………………..……………….
CorrectIncorrect -
Question 55 of 75
55. Question
Category: Ethics of Using ICTVirus infection can cause all the following except ……………..………….
CorrectIncorrect -
Question 56 of 75
56. Question
Category: Ethics of Using ICTA virus that copies itself repeatedly onto the computer memory or onto a disk drive until no more space is left thereby causing the computer to crash is known as…………………
CorrectIncorrect -
Question 57 of 75
57. Question
Category: Ethics of Using ICTA computer program that interferes with a computer’s hardware or operating system with the intention of causing a lot of problems on a computer for the user is called…………..
CorrectIncorrect -
Question 58 of 75
58. Question
Category: Ethics of Using ICTWhich of the following types of virus as destroy the instructions required for booting the computer?
CorrectIncorrect -
Question 59 of 75
59. Question
Category: Ethics of Using ICTA set of instructions that specifies the operations to be performed by the computer and the sequences in which they are to be performed is termed as………………….
CorrectIncorrect -
Question 60 of 75
60. Question
Category: Ethics of Using ICTA program used to detect the presence of a virus and sometime destroy them is termed as ……………..……………..
CorrectIncorrect -
Question 61 of 75
61. Question
Category: Ethics of Using ICTThe type that affects both files and the instructions required for booting the computer is known as ……………………………..
CorrectIncorrect -
Question 62 of 75
62. Question
Category: Ethics of Using ICTWhich of the following type of virus affects the files?
CorrectIncorrect -
Question 63 of 75
63. Question
Category: Ethics of Using ICTAll the following are ways of preventing virus infection except ……………….……………….
CorrectIncorrect -
Question 64 of 75
64. Question
Category: Ethics of Using ICTAll the following is or are application software except …………………………
I. spreadsheet
II.word processing
III.windows 7
IV.MS access
CorrectIncorrect -
Question 65 of 75
65. Question
Category: Ethics of Using ICTA set of well defined principles, values or codes observed in the field of ICT is termed as……………….
CorrectIncorrect -
Question 66 of 75
66. Question
Category: Ethics of Using ICTAny event or action that can cause a loss or damage to computer equipment, software, data information, or processing capability is termed as ……………..…………………
CorrectIncorrect -
Question 67 of 75
67. Question
Category: Ethics of Using ICTA branch of law that gives authors the exclusive right to duplicate, share out, execute or exhibit creative work is known as ……………..……………….
CorrectIncorrect -
Question 68 of 75
68. Question
Category: Ethics of Using ICTAll the following are computer threats except ………………….………………
CorrectIncorrect -
Question 69 of 75
69. Question
Category: Ethics of Using ICTAll the following can cause computer threats except ……………………………
CorrectIncorrect -
Question 70 of 75
70. Question
Category: Ethics of Using ICTWhich of the following is an ethical issue in computing?
CorrectIncorrect -
Question 71 of 75
71. Question
Category: Ethics of Using ICTTo ensure copyright protection, a work must be both ………………………. and ………………………….
CorrectIncorrect -
Question 72 of 75
72. Question
Category: Ethics of Using ICTAll the following are examples of copyright issues except ……………………………
CorrectIncorrect -
Question 73 of 75
73. Question
Category: Ethics of Using ICTFor a work to be original to qualify for copyright protection ……………..
CorrectIncorrect -
Question 74 of 75
74. Question
Category: Ethics of Using ICTWhich of the following consequences is one likely to encounter when she/he violates copyright law?
CorrectIncorrect -
Question 75 of 75
75. Question
Category: Ethics of Using ICTWhen the author wants to give everyone the software for free, it is known as ………………..……………..
CorrectIncorrect