Ethics of Using ICT – Quiz 2 (BECE Past Questions)
Quiz-summary
0 of 35 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You have to pass the previous Module’s quiz in order to start this quiz
Results
Results
0 of 35 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
Categories
- Ethics of Using ICT 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- Answered
- Review
-
Question 1 of 35
1. Question
Category: Ethics of Using ICTIt is a program in the cyberspace and intercepts messages containing specific text?
CorrectIncorrect -
Question 2 of 35
2. Question
Category: Ethics of Using ICTWhat are new facts entered into the computer to be processed, which consists of text, numbers, sounds, and images?
CorrectIncorrect -
Question 3 of 35
3. Question
Category: Ethics of Using ICTIt is a software that is created to intentionally destroy data.
CorrectIncorrect -
Question 4 of 35
4. Question
Category: Ethics of Using ICTWhen someone is connected to computer communication system such as internet, it is termed as …………………………
CorrectIncorrect -
Question 5 of 35
5. Question
Category: Ethics of Using ICTAn operating system such as windows 2000 professional, windows XP, and windows 7 which are designed by Microsoft are called …………………….
CorrectIncorrect -
Question 6 of 35
6. Question
Category: Ethics of Using ICTThey are virtual diaries created by individuals and stored on the internet.
CorrectIncorrect -
Question 7 of 35
7. Question
Category: Ethics of Using ICTThe process of applying standard codes of behaviour or common courtesy, when using the internet is called…………….
CorrectIncorrect -
Question 8 of 35
8. Question
Category: Ethics of Using ICTWhich of the following is not an advantage of using the internet?
CorrectIncorrect -
Question 9 of 35
9. Question
Category: Ethics of Using ICTA mode of communication which does not require all parties involved in the communication to be present and available at the same time is termed as …………..…………….
CorrectIncorrect -
Question 10 of 35
10. Question
Category: Ethics of Using ICTA state-granted right to protect a form of intellectual property such as patent right, copyright, etc is termed as……………..
CorrectIncorrect -
Question 11 of 35
11. Question
Category: Ethics of Using ICTA direct communication, where all parties involved in the communication are present at the same time is termed as ……………………………
CorrectIncorrect -
Question 12 of 35
12. Question
Category: Ethics of Using ICTComputer virus can spread through the following means except …………………..…………..
CorrectIncorrect -
Question 13 of 35
13. Question
Category: Ethics of Using ICTAll the following are signs of virus infection on the computer except ……………….……………
CorrectIncorrect -
Question 14 of 35
14. Question
Category: Ethics of Using ICTComputers can be protected from virus infections by………………..……………….
CorrectIncorrect -
Question 15 of 35
15. Question
Category: Ethics of Using ICTVirus infection can cause all the following except ……………..………….
CorrectIncorrect -
Question 16 of 35
16. Question
Category: Ethics of Using ICTA virus that copies itself repeatedly onto the computer memory or onto a disk drive until no more space is left thereby causing the computer to crash is known as…………………
CorrectIncorrect -
Question 17 of 35
17. Question
Category: Ethics of Using ICTA computer program that interferes with a computer’s hardware or operating system with the intention of causing a lot of problems on a computer for the user is called…………..
CorrectIncorrect -
Question 18 of 35
18. Question
Category: Ethics of Using ICTWhich of the following types of virus as destroy the instructions required for booting the computer?
CorrectIncorrect -
Question 19 of 35
19. Question
Category: Ethics of Using ICTA set of instructions that specifies the operations to be performed by the computer and the sequences in which they are to be performed is termed as………………….
CorrectIncorrect -
Question 20 of 35
20. Question
Category: Ethics of Using ICTA program used to detect the presence of a virus and sometime destroy them is termed as ……………..……………..
CorrectIncorrect -
Question 21 of 35
21. Question
Category: Ethics of Using ICTThe type that affects both files and the instructions required for booting the computer is known as ……………………………..
CorrectIncorrect -
Question 22 of 35
22. Question
Category: Ethics of Using ICTWhich of the following type of virus affects the files?
CorrectIncorrect -
Question 23 of 35
23. Question
Category: Ethics of Using ICTAll the following are ways of preventing virus infection except ……………….……………….
CorrectIncorrect -
Question 24 of 35
24. Question
Category: Ethics of Using ICTAll the following is or are application software except …………………………
I. spreadsheet
II.word processing
III.windows 7
IV.MS access
CorrectIncorrect -
Question 25 of 35
25. Question
Category: Ethics of Using ICTA set of well defined principles, values or codes observed in the field of ICT is termed as……………….
CorrectIncorrect -
Question 26 of 35
26. Question
Category: Ethics of Using ICTAny event or action that can cause a loss or damage to computer equipment, software, data information, or processing capability is termed as ……………..…………………
CorrectIncorrect -
Question 27 of 35
27. Question
Category: Ethics of Using ICTA branch of law that gives authors the exclusive right to duplicate, share out, execute or exhibit creative work is known as ……………..……………….
CorrectIncorrect -
Question 28 of 35
28. Question
Category: Ethics of Using ICTAll the following are computer threats except ………………….………………
CorrectIncorrect -
Question 29 of 35
29. Question
Category: Ethics of Using ICTAll the following can cause computer threats except ……………………………
CorrectIncorrect -
Question 30 of 35
30. Question
Category: Ethics of Using ICTWhich of the following is an ethical issue in computing?
CorrectIncorrect -
Question 31 of 35
31. Question
Category: Ethics of Using ICTTo ensure copyright protection, a work must be both ………………………. and ………………………….
CorrectIncorrect -
Question 32 of 35
32. Question
Category: Ethics of Using ICTAll the following are examples of copyright issues except ……………………………
CorrectIncorrect -
Question 33 of 35
33. Question
Category: Ethics of Using ICTFor a work to be original to qualify for copyright protection ……………..
CorrectIncorrect -
Question 34 of 35
34. Question
Category: Ethics of Using ICTWhich of the following consequences is one likely to encounter when she/he violates copyright law?
CorrectIncorrect -
Question 35 of 35
35. Question
Category: Ethics of Using ICTWhen the author wants to give everyone the software for free, it is known as ………………..……………..
CorrectIncorrect