You are on page 1of 2

DTT105 COMPUTER ETHICS

QUIZ 1

1. Which of the following is an example of a negative right or liberty?
(a) freedom of speech
(b) freedom of religion
(c) the right to use your labor, skills or mind to create goods and services
(d) all of the above

2. Claim rights or positive rights
(a) are rights to act without interference
(b) are rights to be free
(c) impose an obligation on some people to provide certain things for others
(d) all of the above

3. When a person visits a Web site, his or her IP address and the links he or she clicked on are
automatically recorded. This is an example of
(a) secondary use
(b) invisible information gathering
(c) data spillage
(d) data mining

4. A cookie is
(a) a feature of a Web site designed to attract children
(b) an illegal use of information about a customer
(c) a file that a Web site stores on a visitor's computer
(d) a small reward that can be redeemed on a Web site

5. If a business follows an "opt-in" policy for handling personal data, information about a customer
(a) may not be released under any conditions
(b) may not be released unless the customer gives permission
(c) may be released unless the customer requests that the information be kept private
(d) may be released for any legitimate business purpose

6. In the term "Free Software," free implies all of the following except one. Which one?
(a) Free of cost
(b) Free to copy
(c) Freedom
(d) Free to modify

7) Do privacy policies guarantee that your information will be kept private?
(a) Yes
(b) No

8) Which of these are not recommended to share while using a public WiFi connection?
(a) Your credit card
(b) Your bank account information
(c) Your social security number
(d) All of the above

9) You really need to purchase a late birthday gift for your friend online but you are away on vacation.
You have paid for a hotel public WiFi connection so your personal information will be secure. Its ok to
purchase a gift for your friend while using the hotel public WiFi.
(a) True
(b) False

10) What is the best way to use social networking sites?
(a) Set the privacy and security settings to your personal comfort level for information sharing.
(b) Avoid sharing compromising photos and information.
(c) You rely on default security settings every time
(d) Option A and B

11) Once I set my privacy settings on a product or service, I dont need to set them again.
(a) True
(b) Falsef

12) Which one of these passwords is the strongest?
(a) eNcrYP0123tion$
(b) encryptioniscoo
(c) C.Encryption123


Essay Questions

13. What is DEONTOLOGICAL THEORY ? Give a case scenario example to support your definition.


















14. What is UTILITIARIANISM THEORY ? Give a case scenario example to support your definition.

You might also like