No student devices needed. Know more
30 questions
These are computer related morals, principals, and values.
Computer Abuse
Computer Ethics
Intellectual Property
Copyright
The term used to descibe when a person does not have legal rights to copy someone else's work is called?
Privacy Invasion
Copyright
Intellectual Property
Trolling
Any software that covertly gathers user information through the user's internet connection without his or her knowledge: usually for advertising purposes.
Trojan Horse
Free Ware
Computer Cookie
Spyware
Is a small text file which contains an ID tag, placed on computer by a website. The website saves a complementary file with a matching ID tag.
Spyware
Computer Worm
Computer Cookie
Computer Bomb
A form of software that collects information about the user in order to display advertisements in the browser based on the information it collects from the user's browsing patterns.
Adware
Free ware
Share ware
Public domain Software
This is misusing computer equipment to intentionally damage it.
Computer bomb
Computer Virus
Anti Virus Program
Computer Abuse
This is the unwanted and illegal copying and use of software.
Commercial Software
Public domain software
Software Policy
Site License
This is someone who uses a computer to gain illegal access to other computer systems, and files, usually through the use of telecommunications
Site license
Trojan Horse
Spyware
Computer Hacker
This is a program that automatically checks each disk as it is inserted into the disk drive and scans all data from telecommunication devices to locate and give warning of nay virus that may be likely to enter a computer.
Anti Virus Program
Computer bomb
Computer worm
Trojan Horse
These are ideas put into action, such as writing, music, art, computer code, and inventions that can be protected under copyright or patent laws.
Intellectual Property
Copy Protect
Share Ware
Public Domain Software
Grants the user the right to make a specified number of copies of a software program for the use on multiple computers.
Share Ware
Public Domain Software
Commercial Software
Site License
This is to protect software against unwanted or illegal duplication by writing computer code within the programs that prevents simple copying.
Intellectual Property
Share Ware
Copy Protect
Trojan Horse
This is a program used to search for viruses that may be established on a hard drive. (Doesn't automatically search)
Virus Disinfectant Program
Free Ware
Computer Worm
Spyware
This is a destructive code that gains access to a computer disguised as something such as a desirable software program. Once inside the computer, it can do damage but it cannot spread from disk to disk or computer to computer.
Computer worm
Adware
Trojan Horse
Computer Bomb
This is a destructive code that bores it way through a computer's files. It can move from computer to computer, dropping off segments of itself as it goes.
Trojan Horse
Computer Worm
Spyware
Computer Virus
This is copyrighted software that is distributed free of charge on a trial basis. A normal fee is charged if the user decides to keep it.
Share Ware
Site License
Adware
Free Ware
This is a program that contains destructive code with copies itself onto other computer files.
Computer Bomb
Computer Virus
Spyware
Computer Cookie
This is destructive code that is set to activate at a certain time or when a specific action is taken.
Spyware
Adware
Computer Bomb
Computer Virus
This is copyrighted software that is given away free of charge but is still the property of the owner and the user doesn't have the right to distribute copies, just the owner.
Free Ware
Adware
Share Ware
Public Domain Software
This is copyrighted software that is distributed free of charge on a trial basis. A normal fee is charged if the user decides to keep it.
Public Domain Software
Commercial Software
Share Ware
Software Piracy
This is software, donated for public use that can be freely copied and distributed.
Share Ware
Commercial Software
Copyright
Public Domain Software
This is copyrighted software available for purchase.
Site License
Commercial Software
Share Ware
Adware
What is another word for ethics?
Loyal
Character
Values
Honesty
Aiming abusive and insulting messages at another person online is called...
Targeting
Flaming
Spewing
Arguing
Using a source without giving credit to the original author is known as...
Plagiarism
Cheating
Copying/Pasting
Paraphrasing
When did the Computer Ethics Institute publish a code of ethics for computer users?
1995
1999
1988
1998
Which of the following is a question you should ask yourself before you make a move to do something questionable?
How would you feel if your behavior made front-page news?
How would you feel if your parents found out?
How would you feel about this next week?
How would you feel if your behavior was different?
Which of the following is NOT one of the Ten Commandments of Computer Ethics?
Thou shalt not use or copy software for which you have not paid.
Thous shalt think about the social consequences of the program you write.
Thou shalt not interfere with other people's computer work.
Thou shalt not use a computer to do something fun.
Etiquette on the Internet is known as...
Intiquette
Netiquette
Etiquette
Webiquette
Is copying facts such as phone number, addresses, and names considered plagiarism?
Yes
No
Explore all questions with a free account