option
Questions
ayuda
daypo
search.php

ethics questions

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
ethics questions

Description:
ethics exam

Creation Date: 2025/06/12

Category: Others

Number of questions: 57

Rating:(0)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

…………requires respond to client inquiries and instructions appropriately, promptly, completely, and truthfully.”. A. Code Principle 5. B. Code Principle 3. C. Code Principle 4. D. none of them.

The term ……. means one must respond to clients in a timely manner, which will depend upon the circumstances of the request. A. promptly. B. Truthfully. C. completely. D. none of them.

………. requires Institute professionals to “maintain a high level of ethical conduct.”. A. Code Principle 9. B. Code Principle 3. C. Code Principle 4. D. none of them.

………. requires the Institute professional “to maintain confidentiality of client information. A. Code Principle 9. B. Code Principle 6. C. Code Principle 4. D. none of them.

………… requires Institute professionals to “provide competent services by truthful representation of competency. A. Code Principle 9. B. Code Principle 7. C. Code Principle 4. D. none of them.

The nature and format of the information needed for informed decision-making depends upon ….. factors. A. Two. B. three. c. four. d. none of them.

Client information,” means any non-public information concerning, pertaining to, or relating to the client. A. True. B. False.

Which of the following involves impersonating a legitimate company to steal sensitive information?. a. Spamming. b. Phishing. c. Pharming. d. Denial of Service.

Software that appears legitimate but performs malicious actions in the background is known as: a. Virus. b. Worm. c. Trojan Horse. d. Spyware.

Sending unsolicited bulk emails is referred to as: a. Phishing. b. Spamming. c. Spoofing. d. Malware distribution.

13. There are ….. main parts of the BCS code of conduct. a) five. b) six. c) ten. d) none of them.

The hacker’s activities may be limited to eavesdropping. a) true. b) false.

The authorized access of a computer system is unlawful. a) true. b) false.

Connecting a new smart device without checking any settings is not recommended. a) true. b) false.

Malware attack does not solely involve overwhelming a system with excessive traffic. a) true. b) false.

A computer virus is a self-replicating computer program. a) true. b) false.

It is a crime per se to write a computer virus or malicious software. a) true. b) false.

The authorized access of a computer system is unlawful. a) true. b) false.

Malicious hackers are generally motivated by personal gain. a) true. b) false.

Encrypted data is readable to the attacker. a) true. b) false.

A professional code of ethics expresses ideals of human behavior. a) true. b) false.

There are … types of codes of ethics. a) five. b) six. c) ten. d) none of them.

The whistle blower should only speak out in ….. situations. a) five. b) six. c) ten. d) none of them.

The IEEE Code of Ethics requires its members to be conscious of the public health and environment. a) true. b) false.

Statements about how people should behave fit together to form the _____by which a society lives. a. moral code. b. user. c. law. d. None of the above.

. ………………… is a set of beliefs about right and wrong behavior within a society. a. Certificate. b. Ethics. c. Law. d. None of the above.

.…………………. are one’s personal beliefs about right and wrong, while the term ethics describes standards or codes of behavior expected of an individual by a group (nation, organization, profession) to which an individual belongs. a. Morals. b. Users. c. Laws. d. None of the above.

………….. is a system of rules that tells us what we can and cannot do. a. Moral. b. User. c. Law. d. None of the above.

A(n) ________ is a moral habit that inclines people to do what is considered acceptable. a. Virtue. b. User. c. Law. d. None of the above.

A professional is someone who: a. requires advanced training and experience. b. must exercise discretion and judgment in the course of his or her work. c. does work that cannot be standardized. d. all of the above.

The mission of the Business Software Alliance is to _________________. a. stop the unauthorized copying of software produced by its members. b. stop the authorized copying of software produced by its members. c. both (a) and (b). d. None of the above.

Reporting a trade secret is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company that threatens the public interest. a. True. b. False.

________ is the crime of obtaining goods, services, or property through deception or trickery. a. Fraud. b. Law. c. Ethics. d. All of the above.

Résumé inflation is a usual and customary practice tolerated by employers. a. True. b. False.

Society expects professionals to act in a way that: a. causes no harm to society. b. provides significant benefits. c. establishes and maintains professional standards that protect the public. d. all of the above.

________ involves providing money, property, or favors to someone in business or government to obtain a business advantage. a. Bribery. b. Fraud. c. Law. d. All of the above.

_____________ is a process that one undertakes voluntarily to prove competency in a set of skills. a. Licensing. b. Certification. c. Registering. d. All of the above.

There are many industry associations and vendor certificate programs for IT workers. a. True. b. False.

___________ has been defined as not doing something that a reasonable person would do, or doing something that a reasonable person would not do. a. Negligence. b. Bribery. c. Fraud. d. None of the above.

A ______________ states the principles and core values that are essential to the work of a particular occupational group. a. Bribery. b. Fraud. c. code of ethics. d. None of the above.

The …..... is a trade group that represents the world’s largest software and hardware manufacturers. a. Bribery. b. Fraud. c. Business Software Alliance. d. None of the above.

. …………. deal with many different hardware, software, and service providers. a. Users. b IT workers. c. Laws. d. None of the above.

…… is the person who uses a hardware or software product from the IT workers who develop, install, service, and support the product. a. IT user. b IT worker. c. Supplier. d. None of the above.

A …………….. states the principles and core values that are essential to the work of a particular occupational group. a. Business Software Alliance. b. professional code of ethics. c. professional organization. d. None of the above.

....... refer to email that appears to have been originated from one source when it was actually sent from anoher sourse. a) Email bombing. b) Email spoofing. c) Email spamming. d)none of these.

Act of attempting to acquire information sush as usernames , passwords, and credit card details by masquerading as a trustworthy entity is called ..... a) email bombing. b) spamming. c) cyber stalking. d) phishing.

..... occurs when someone tries to access a system , server, program, and service by using an illegal method. a) unauthorized access. b) typosquatting. c) spamming. d) wiretapping.

........ is any error that , if not removed , could case a software system to fail to meet its users’ needs . a) software defect. b) software management. c) software failure. d) software disable.

whish of the following is not a major cause of poor software quality. a. Many developers do not know how to design software or do not take the time to do it. b. Programmers make mistakes in turning design specifications into code. c. Software developers are under extreme pressure to reduce the time to market of their products. d. Software developers must take the time to market their product.

Special measures must be taken in the development of safety-critical systems. True or False?. a. True. b. false.

The impact of a software defect can be quite subtle or very serious. a. True. b. false.

A form of software testing that involves viewing a software unit as a device that has expected input and output behaviors but whose internal workings are unknown is known as: a. Dynamic testing. b. White-box testing. c. Integration testing. d. Black-box testing.

An approach that defines the essential elements of an effective process and outlines a system for continuously improving software development is: a. ISO 9000. b. FMEA. c. CMMI. d. DO-178B.

The provision of multiple interchangeable components to perform a single function to cope with failures and errors is called .... a. Risk. b. Redundancy. c. Reliability. d. Availability.

system used to control many industrial processes in an effort to reduce costs, eliminate human error, improve quality, and shorten the time it takes to make products is called ...... A. process control system. b. process management system. c. process fairer system. d. process output system.

......After successful integration testing, the various subsystems are combined to test the entire system as a complete entity. a. Static testing. b. Integration testing. c. System testing. d. User acceptance testing.

......Special software programs called static analyzers are run against the new code. Rather than reviewing input and output, the static analyzer looks for suspicious patterns in programs that might indicate a defect. a. Static testing. b. Integration testing. c. System testing. d. User acceptance testing.

Report abuse