dtt 105 quiz 1

2
DTT105 COMPUTER ETHICS QUIZ 1 1. Which of the following is an example of a negative right or liberty? (a) freedom of speech (b) freedom of religion (c) the right to use your labor, skills or mind to create goods and services (d) all of the above 2. Claim rights or positive rights (a) are rights to act without interference (b) are rights to be free (c) impose an obligation on some people to provide certain things for others (d) all of the above 3. When a person visits a Web site, his or her IP address and the links he or she clicked on are automatically recorded. This is an example of (a) secondary use (b) invisible information gathering (c) data spillage (d) data mining 4. A cookie is (a) a feature of a Web site designed to attract children (b) an illegal use of information about a customer (c) a file that a Web site stores on a visitor's computer (d) a small reward that can be redeemed on a Web site 5. If a business follows an "opt-in" policy for handling personal data, information about a customer (a) may not be released under any conditions (b) may not be released unless the customer gives permission (c) may be released unless the customer requests that the information be kept private (d) may be released for any legitimate business purpose 6. In the term "Free Software," “free” implies all of the following except one. Which one? (a) Free of cost (b) Free to copy (c) Freedom (d) Free to modify 7) Do privacy policies guarantee that your information will be kept private? (a) Yes (b) No 8) Which of these are not recommended to share while using a public WiFi connection? (a) Your credit card (b) Your bank account information (c) Your social security number (d) All of the above

Upload: jaya-malathy

Post on 19-Jan-2016

78 views

Category:

Documents


1 download

DESCRIPTION

sharing

TRANSCRIPT

Page 1: DTT 105 Quiz 1

DTT105 COMPUTER ETHICS

QUIZ 1

1. Which of the following is an example of a negative right or liberty?

(a) freedom of speech (b) freedom of religion (c) the right to use your labor, skills or mind to create goods and services (d) all of the above

2. Claim rights or positive rights

(a) are rights to act without interference (b) are rights to be free (c) impose an obligation on some people to provide certain things for others (d) all of the above

3. When a person visits a Web site, his or her IP address and the links he or she clicked on are

automatically recorded. This is an example of (a) secondary use (b) invisible information gathering (c) data spillage (d) data mining

4. A cookie is

(a) a feature of a Web site designed to attract children (b) an illegal use of information about a customer (c) a file that a Web site stores on a visitor's computer (d) a small reward that can be redeemed on a Web site

5. If a business follows an "opt-in" policy for handling personal data, information about a customer

(a) may not be released under any conditions (b) may not be released unless the customer gives permission (c) may be released unless the customer requests that the information be kept private (d) may be released for any legitimate business purpose

6. In the term "Free Software," “free” implies all of the following except one. Which one?

(a) Free of cost (b) Free to copy (c) Freedom (d) Free to modify

7) Do privacy policies guarantee that your information will be kept private?

(a) Yes (b) No

8) Which of these are not recommended to share while using a public WiFi connection?

(a) Your credit card (b) Your bank account information (c) Your social security number (d) All of the above

Page 2: DTT 105 Quiz 1

9) You really need to purchase a late birthday gift for your friend online but you are away on vacation. You have paid for a hotel public WiFi connection so your personal information will be secure. It’s ok to purchase a gift for your friend while using the hotel public WiFi.

(a) True (b) False

10) What is the best way to use social networking sites?

(a) Set the privacy and security settings to your personal comfort level for information sharing. (b) Avoid sharing compromising photos and information. (c) You rely on default security settings every time (d) Option A and B

11) Once I set my privacy settings on a product or service, I don’t need to set them again.

(a) True (b) Falsef

12) Which one of these passwords is the strongest?

(a) eNcrYP0123tion$ (b) encryptioniscoo (c) C.Encryption123

Essay Questions 13. What is DEONTOLOGICAL THEORY ? Give a case scenario example to support your definition. 14. What is UTILITIARIANISM THEORY ? Give a case scenario example to support your definition.