Computer Mcqs


Q.  Why is it unethical to share copyrighted files with your friends?

a. It is not unethical, because it is legal.
b. It is unethical because the files are being given for free.
c. Sharing copyrighted files without permission breaks copyright laws.
d. It is not unethical because the files are being given for free.


ANSWER: See Answer
 
No explanation is available for this question!
MCQs:  The typical computer criminal is a(n)____________?
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  The common name for the crime of stealing passwords is____________?
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  Collecting personal information and effectively posing as another individual is known as the crime of_____________?
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  Malicious software is known as____________?
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  A program that performs a useful task while simultaneously allowing destructive acts is a___________?
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  An intentionally disruptive program that spreads from program to program or from disk to disk is known as a_____________?
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  In 1999, the Melissa virus was a widely publicised:____________?
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  What type of virus uses computer hosts to reproduce itself?
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  The thing that eventually terminates a worm virus is a lack of:
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  When a logic bomb is activated by a time-related event, it is known as a____________?
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  What is the name of an application program that gathers user information and sends it to someone through the Internet?
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  ____________is the measurement of things such as fingerprints and retinal scans used for security access?
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  What is the most common tool used to restrict access to a computer system?
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________?
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  The scrambling of code is known as___________?
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  To prevent the loss of data during power failures, use a(n)_____________?
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  __________is defined as any crime completed through the use of computer technology?
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  ___________refers to electronic trespassing or criminal hacking?
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  The first electronic computer was developed by____________?
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  _____________computers operates essentially by counting?
Category: Computer Science MCQs,   Published by: teswesm