Here are 100 multiple-choice questions (MCQs) on the Fundamentals of Computer Ethics and Privacy MCQs, along with their answers and explanations.
These MCQs Cover below lists of topics:
– Digital citizenship and online behavior.
– Ethical dilemmas in technology.
– Responsible use of technology
– Copyright and intellectual property rights
– Privacy concerns and data protection

PRACTICE IT NOW TO SHARPEN YOUR CONCEPT AND KNOWLEDGE

view hide answers

1. Which of the following actions is considered a violation of copyright?

  • Purchasing a legal copy of a software program
  • Creating a backup copy of a copyrighted movie you own
  • Distributing copyrighted music without permission
  • Using a copyrighted image for educational purposes
  • Creative Commons work
  • Fair use work
  • Public domain work
  • Copyrighted work
  • Remove the image's watermark
  • Provide proper attribution to the image's creator
  • Alter the image to make it unrecognizable
  • Use the image without permission

4. In the context of intellectual property, what is a trademark used to protect?

  • Inventions and discoveries
  • Literary works
  • Brand names, logos, and symbols
  • Scientific research
  • Infringement
  • Public domain
  • Licensing
  • Attribution

6. Which of the following is an example of personal information that should be protected online?

  • Public social media posts
  • Home address and phone number
  • News articles
  • Weather forecasts

7. What is the term for the practice of gaining unauthorized access to computer systems and networks with malicious intent?

  • Privacy invasion
  • Hacking
  • Digital literacy
  • Encryption

8. Which of the following is an example of a privacy breach?

  • Sharing vacation photos on social media
  • Encrypting sensitive emails
  • Unauthorized access to personal medical records
  • Deleting browser cookies

9. What is the primary purpose of a privacy policy on a website or app?

  • To collect personal information from users
  • To disclose sensitive information to third parties
  • To inform users about how their data is collected and used
  • To encourage users to share personal details

10. Which of the following is a common method to secure personal data and protect online privacy?

  • Posting personal information on public forums
  • Sharing login credentials with friends
  • Using strong and unique passwords
  • Providing credit card details to unknown websites

11. What is the term for the act of intentionally spreading computer viruses, malware, or other harmful software?

  • Ethical hacking
  • Responsible technology use
  • Cybersecurity
  • Malicious software distribution

12. Which of the following is a potential consequence of engaging in cyberbullying?

  • Improved online reputation
  • Legal consequences and loss of internet privileges
  • Increased social media followers
  • Online popularity

13. What should you do if you come across online content that promotes hate speech or discrimination?

  • Share it to raise awareness
  • Report it to the platform or authorities
  • Ignore it and move on
  • Engage in a heated online debate

14. What ethical principle encourages individuals to be transparent and open about their online actions and intentions?

  • Accountability
  • Privacy
  • Honesty
  • Fair use

15. What is the term for the act of using technology to advocate for social or political causes?

  • Cyberbullying
  • Ethical hacking
  • Online activism
  • Disinformation

16. Which of the following actions is generally considered fair use of copyrighted material?

  • Using copyrighted images in a commercial advertisement without permission
  • Reproducing an entire copyrighted book and distributing it for free
  • Quoting a small portion of a copyrighted text for a book review
  • Remixing copyrighted music and selling it without attribution
  • Copyright
  • Patent
  • Trademark
  • Fair use

18. What is the purpose of a Creative Commons license?

  • To prohibit the use of creative works
  • To allow unlimited use of creative works without attribution
  • To grant permission for specific uses of creative works with certain conditions
  • To automatically transfer ownership of creative works

19. Which of the following actions is NOT a violation of copyright?

  • Creating an original piece of music
  • Using copyrighted images in a school project with proper attribution
  • Replicating and distributing a copyrighted video game without permission
  • Copying a public domain text

20. What is the term for the act of using someone else's work and giving them credit for it?

  • Plagiarism
  • Attribution
  • Copyright infringement
  • Fair use

21. What is the term for software or hardware that filters out certain content or websites to protect users from harmful or inappropriate material?

  • Online tracking
  • Data encryption
  • Privacy invasion
  • Parental control software

22. Which of the following actions can help protect personal data when using public Wi-Fi networks?

  • Sharing sensitive information freely
  • Using unsecured websites for online shopping
  • Enabling a virtual private network (VPN)
  • Leaving devices unattended
  • Privacy breach
  • Data encryption
  • Privacy policy
  • Online tracking

24. What is the role of a chief privacy officer (CPO) in an organization?

  • Handling cybersecurity incidents
  • Overseeing ethical hacking operations
  • Ensuring compliance with data protection laws and policies
  • Managing hardware and software updates

25. What does HIPAA stand for in the context of healthcare data protection?

  • Health Insurance Portability and Accountability Act
  • Healthcare Information Privacy and Assurance Act
  • High-Intensity Privacy and Access Authorization
  • Hospital Information Protection and Access Act

26. What is the term for the act of using technology to gain unauthorized access to computer systems for ethical and lawful purposes, such as identifying vulnerabilities?

  • Cyberbullying
  • Malware distribution
  • Ethical hacking
  • Online tracking

27. Which of the following actions is NOT considered responsible technology use?

  • Respecting others' online privacy
  • Protecting personal data
  • Spreading false rumors online
  • Reporting cyberbullying incidents

28. What is the term for the practice of creating and maintaining a false online identity to deceive others?

  • Ethical hacking
  • Privacy invasion
  • Online tracking
  • Catfishing

29. Which ethical principle emphasizes the importance of being accountable for one's actions in the digital realm?

  • Transparency
  • Honesty
  • Accountability
  • Privacy

30. What is the term for the act of using technology to track and record a user's online activities without their consent?

  • Privacy invasion
  • Digital citizenship
  • Cybersecurity
  • Ethical hacking

31. What is the term for the act of using copyrighted material for educational purposes, criticism, commentary, or news reporting, which is generally considered fair use?

  • Public domain
  • Attribution
  • Plagiarism
  • Fair use

32. Which of the following is NOT typically protected by copyright?

  • A novel written by an author
  • An original painting by an artist
  • A list of commonly used phone numbers
  • A piece of software
  • Fair use doctrine
  • Public domain license
  • End-user license agreement (EULA)
  • Copyright infringement

34. Which of the following actions is generally considered a violation of copyright?

  • Purchasing a music album and sharing it with friends
  • Using copyrighted images in a school project with proper attribution
  • Reproducing and distributing copyrighted movie DVDs without permission
  • Creating an original piece of artwork

35. What is the term for the act of using copyrighted material without proper attribution or permission, presenting it as one's own work?

  • Copyright infringement
  • Fair use
  • Public domain
  • Attribution

36. What is the term for the practice of securing sensitive data by encoding it so that only authorized parties can access it?

  • Privacy invasion
  • Digital citizenship
  • Encryption
  • Online tracking

37. Which of the following actions can help protect against identity theft online?

  • Sharing personal information freely on social media
  • Using the same password for all online accounts
  • Monitoring bank statements and credit reports regularly
  • Providing personal information to unsolicited email requests
  • Fair use doctrine
  • Encryption policy
  • Data breach notification law
  • Data protection regulation

39. What is the term for the practice of obtaining sensitive information through deceptive emails or websites?

  • Privacy breach
  • Phishing
  • Encryption
  • Data encryption

40. What is the primary purpose of using secure and unique passwords for online accounts?

  • To make it easier to remember passwords
  • To share passwords with friends and family
  • To protect accounts from unauthorized access
  • To use the same password for all accounts

41. What is the term for the act of sending unsolicited and often irrelevant messages to a large number of email addresses for advertising or other purposes?

  • Ethical hacking
  • Phishing
  • Cyberbullying
  • Spamming

42. What should individuals do to protect their personal information and privacy when using social media platforms?

  • Share personal details openly
  • Accept all friend requests without verification
  • Review and adjust privacy settings
  • Use the same password for all social media accounts

43. What is the term for the practice of using technology to harass, threaten, or intimidate others online?

  • Ethical hacking
  • Cyberbullying
  • Privacy invasion
  • Malicious software distribution

44. Which ethical principle encourages individuals to be mindful of the potential consequences of their online actions?

  • Transparency
  • Honesty
  • Accountability
  • Fair use

45. What is the term for the act of using technology to gain unauthorized access to computer systems with malicious intent?

  • Ethical hacking
  • Privacy invasion
  • Hacking
  • Online tracking

46. What is the term for a unique symbol, word, or phrase used to identify and distinguish a company's products or services?

  • Copyright
  • Patent
  • Trademark
  • Fair use

47. In the context of copyright, what is the term for the right to control how a work is used and to receive payment for its use?

  • Fair use
  • Attribution
  • Public domain
  • Copyright
  • Public domain
  • Attribution
  • Fair use
  • Copyright infringement

49. What is the term for a license that allows creators to retain certain rights while permitting others to use, share, and build upon their work?

  • Fair use license
  • Public domain license
  • Copyright license
  • Creative Commons license
  • Public domain work
  • Attribution work
  • Fair use work
  • Licensed work

51. What is the term for a set of rules and practices that organizations follow to protect personal data and ensure privacy compliance?

  • Data breach notification law
  • Privacy policy
  • Data encryption
  • Cybersecurity

52. Which of the following actions can help protect against online identity theft?

  • Sharing personal information openly on social media
  • Using easily guessable passwords
  • Enabling two-factor authentication (2FA)
  • Providing personal information to unknown websites

53. What is the term for the act of notifying individuals and authorities when a data breach occurs and personal information is compromised?

  • Data encryption
  • Data breach notification
  • Privacy invasion
  • Digital citizenship

54. What is the role of a data protection officer (DPO) in an organization?

  • Handling cybersecurity incidents
  • Managing hardware and software updates
  • Ensuring compliance with data protection laws and policies
  • Conducting ethical hacking operations

55. What does CCPA stand for in the context of data protection and privacy?

  • California Consumer Privacy Act
  • Computer Cybersecurity and Privacy Act
  • Cybersecurity and Data Protection Act
  • Consumer Confidentiality and Privacy Agreement

56. What is the term for the act of intentionally spreading false information or rumors online with the intent to deceive?

  • Cybersecurity
  • Transparency
  • Disinformation
  • Ethical hacking

57. Which of the following actions is considered a responsible use of social media?

  • Sharing personal details without restrictions
  • Engaging in online harassment
  • Promoting positive and constructive discussions
  • Creating fake accounts to impersonate others

58. What is the term for the act of using technology to gain unauthorized access to computer systems for malicious purposes, such as data theft or disruption?

  • Privacy invasion
  • Ethical hacking
  • Hacking
  • Accountability

59. Which ethical principle emphasizes the importance of respecting the rights and privacy of individuals in the digital age?

  • Fair use
  • Accountability
  • Privacy
  • Transparency

60. What is the term for the act of tracking and collecting information about a user's online activities across various websites and services without their knowledge?

  • Privacy invasion
  • Cyberbullying
  • Data encryption
  • Online tracking
  • Fair use
  • Public domain
  • Copyright
  • Creative Commons

62. Which of the following is NOT typically protected by copyright?

  • An original song composition
  • A photography exhibition
  • A common mathematical formula
  • A computer program's source code

63. What is the term for the act of using someone else's work without permission and presenting it as one's own, often in academic or creative contexts?

  • Copyright infringement
  • Fair use
  • Attribution
  • Plagiarism

64. What is the purpose of a public domain license for creative works?

  • To restrict the use of creative works
  • To grant unlimited use of creative works without attribution
  • To allow certain uses of creative works without permission
  • To automatically transfer ownership of creative works

65. Which of the following actions is generally considered fair use of copyrighted material?

  • Reproducing an entire copyrighted book for personal use
  • Using copyrighted images in a commercial advertisement without permission
  • Quoting a small portion of a copyrighted text for a research paper
  • Sharing copyrighted software with friends

66. What is the term for the act of securing data by encoding it so that only authorized parties can read and use it?

  • Data breach
  • Privacy invasion
  • Encryption
  • Phishing

67. Which of the following actions can help protect personal data and privacy when using public Wi-Fi networks?

  • Sharing sensitive information freely
  • Disabling firewalls
  • Using strong, unique passwords
  • Keeping devices unlocked and unattended
  • Data encryption
  • Privacy breach
  • Privacy policy
  • Phishing attempt

69. What is the role of a chief information security officer (CISO) in an organization?

  • Managing hardware and software updates
  • Overseeing ethical hacking operations
  • Ensuring compliance with data protection laws
  • Conducting data breach investigations

70. What does GDPR stand for in the context of data protection and privacy?

  • General Data Protection Regulation
  • Global Data Privacy Rule
  • Government Data Protection Requirement
  • General Digital Privacy Record

71. What does computer ethics primarily concern?

  • Hardware maintenance
  • Responsible technology use and ethical behavior
  • Social media trends
  • Software development

72. Which of the following is an example of responsible technology use?

  • Sharing someone else's private information online
  • Regularly updating antivirus software
  • Hacking into a company's database
  • Creating fake social media profiles

73. What is the term for the act of pretending to be someone else online for malicious purposes?

  • Cyberbullying
  • Identity theft
  • Ethical hacking
  • Online activism

74. What does digital citizenship refer to?

  • Obtaining digital licenses
  • Being a responsible and ethical user of digital technology
  • Owning a lot of digital devices
  • Using digital technology for financial gain

75. What is the term for the act of intentionally spreading false information online to deceive others?

  • Online collaboration
  • Digital literacy
  • Disinformation
  • Data encryption

76. Which ethical principle emphasizes the importance of respecting other people's privacy and personal data online?

  • Honesty
  • Transparency
  • Privacy
  • Accountability

77. What is the term for the practice of monitoring and recording someone's online activities without their consent?

  • Ethical hacking
  • Cyberbullying
  • Online tracking
  • Digital literacy

78. Which of the following is NOT a common ethical dilemma in technology?

  • Balancing privacy and security concerns
  • Choosing the fastest internet service
  • Deciding whether to disclose software vulnerabilities
  • Handling online harassment

79. What is the term for the practice of using technology to harass, intimidate, or threaten others online?

  • Cyberbullying
  • Online tracking
  • Digital literacy
  • Data encryption

80. Which ethical principle suggests that individuals should take responsibility for their online actions and decisions?

  • Accountability
  • Transparency
  • Privacy
  • Honesty
  • Ideas and concepts
  • Physical objects only
  • Original creative works
  • Internet domain names

82. What is the term for the act of using someone else's work without permission or proper attribution?

  • Plagiarism
  • Copyright infringement
  • Fair use
  • Public domain

83. What does fair use allow for in terms of copyrighted material?

  • Complete freedom to use any copyrighted material
  • Use of copyrighted material without any restrictions
  • Limited use of copyrighted material for purposes such as criticism, commentary, and education
  • Commercial use of copyrighted material without permission
  • Copyright infringement
  • Public domain
  • Creative Commons license
  • Fair use doctrine

85. What should you consider when using copyrighted material in your own work?

  • Always use it without giving credit to the original creator
  • Avoid using it altogether
  • Use it sparingly and provide proper attribution
  • Claim the material as your own

86. Which of the following is NOT considered a form of intellectual property?

  • Patents
  • Copyrights
  • Trademarks
  • Email addresses

87. What is the term for a unique symbol, word, or phrase used to identify and distinguish a product or brand?

  • Copyright
  • Patent
  • Trademark
  • Fair use

88. What is the primary purpose of a patent?

  • To protect literary works
  • To prevent others from using an invention for a limited time
  • To mark products as original
  • To encourage fair use of creative works

89. Which of the following is an example of a public domain work?

  • A newly published novel
  • A government document
  • A copyrighted song
  • A confidential email

90. What is the term for the act of falsely claiming someone else's work as your own?

  • Copyright infringement
  • Plagiarism
  • Fair use
  • Attribution

91. What is the term for the unauthorized access, use, or disclosure of personal information?

  • Privacy breach
  • Identity theft
  • Fair use
  • Digital literacy

92. What is encryption primarily used for in the context of privacy and data protection?

  • Hiding the existence of data
  • Deleting data permanently
  • Protecting data from unauthorized access by converting it into a secure format
  • Speeding up data transfer

93. What is the term for the practice of collecting and using personal data without the individual's knowledge or consent?

  • Data encryption
  • Online tracking
  • Informed consent
  • Privacy invasion

94. Which of the following actions can help protect your online privacy?

  • Sharing personal information on social media without restrictions
  • Using the same password for all online accounts
  • Enabling two-factor authentication (2FA)
  • Avoiding antivirus software

95. What does GDPR stand for in the context of data protection and privacy?

  • Global Data Privacy Regulation
  • General Data Protection Regulation
  • General Digital Privacy Rights
  • Government Data Privacy Requirement

96. What is the term for the act of sharing confidential information about a person without their consent, often with malicious intent?

  • Digital literacy
  • Defamation
  • Encryption
  • Public domain

97. What ethical principle emphasizes being truthful and honest in all online interactions and communications?

  • Accountability
  • Honesty
  • Transparency
  • Privacy

98. What is the term for the practice of creating and spreading fake news or false information online to manipulate public opinion?

  • Online tracking
  • Disinformation
  • Privacy invasion
  • Fair use

99. Which of the following is an example of ethical behavior in technology use?

  • Cyberbullying
  • Protecting personal data and respecting others' privacy
  • Hacking into computer systems
  • Spreading false rumors online

100. What is the term for the practice of creating and using technology in ways that benefit society and promote the common good?

  • Digital citizenship
  • Cybersecurity
  • Digital literacy
  • Online tracking

Share with : Share on Linkedin Share on Twitter Share on WhatsApp Share on Facebook