Vous êtes sur la page 1sur 7

Chapter 15 Legal and Ethical Issues Question Bank

Chapter 15 Legal and Ethical Issues


Multiple Choice Questions

(U01C15L01Q001)
Which of the following are examples of intellectual properties?
(1) a dream
(2) a drawing
(3) a book
A. (1) and (2) only
B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)
Answer
C

(U01C15L01Q002)
Which of the following are types of software licenses?
(1) site license
(2) driving license
(3) single-user license
A. (1) and (2) only
B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)
Answer
B

(U01C15L01Q003)
Which of the following is NOT an example of unauthorised access to a computer
system?
A. unauthorised entry to the computer room of a school
B. unauthorised operation on a computer system
C. unauthorised access to a computer system and making damages to it
D. unauthorised access to services offered by a computer system
Answer
A

Computer & Information Technology for HKCEE 1 © Pearson Education Asia Limited 2004
(Core Module)
Chapter 15 Legal and Ethical Issues Question Bank

(U01C15L01Q004)
Which of the following is NOT a measure to protect computer systems from
unauthorised access?
A. access control
B. recovery system
C. data control
D. data encryption
Answer
C

(U01C15L01Q005)
Which of the following is NOT a way to fight spam?
A. Send a complaint to the sender of spam message.
B. Use software or services on the Internet that can filter unwanted messages.
C. Do not use web mail services.
D. Use an e-mail account that has filtering function.
Answer
C

(U01C15L01Q006)
Which of the following organisation is responsible to carry out the legal regulations
that protect intellectual property rights?
A. Intellectual Property Department
B. Office of the Privacy Commissioner for Personal Data
C. Independent Commission Against Corruption
D. Customs and Excise Department
Answer
D

Computer & Information Technology for HKCEE 2 © Pearson Education Asia Limited 2004
(Core Module)
Chapter 15 Legal and Ethical Issues Question Bank

(U01C15L01Q007)
Which of the following statements about spam is correct?
(1) Spam is one type of computer virus.
(2) Spam may cause network overload.
(3) Firewall may be used to filter spam.
A. (1) only
B. (2) only
C. (3) only
D. (2) and (3) only
Answer
B

(U01C15L01Q008)
_____________ is hidden in normal program and takes harmful actions at any time.
A. worm
B. driver
C. embedded system
D. Trojan horse
Answer
D

(U01C15L01Q009)
Which of the following is/are illegal?
(1) Apply for more than one e-mail address for oneself.
(2) Sell pirated software.
(3) Open an infected e-mail.
A. (1) only
B. (2) only
C. (1) and (2) only
D. (1), (2) and (3)
Answer
B

Computer & Information Technology for HKCEE 3 © Pearson Education Asia Limited 2004
(Core Module)
Chapter 15 Legal and Ethical Issues Question Bank

(U01C15L01Q010)
To prevent children from contacting indecent materials on the Internet, we may
A. install filtering software.
B. install antivirus software.
C. install firewall.
D. refuse Cookies through the browser.
Answer
A

Computer & Information Technology for HKCEE 4 © Pearson Education Asia Limited 2004
(Core Module)
Chapter 15 Legal and Ethical Issues Question Bank

Conventional Questions

(U01C15L02Q001)
Nancy reads e-mails using an e-mail program every day. She enters her login name
and password to access the e-mail system before reading the e-mails.
(a) Give TWO suggestions to Nancy to reduce the risk of password theft. (2 marks)
After successful login, Nancy started reading e-mails. She received an e-mail from
flowerchild@abcpqr.com. This mail was claimed to be sent from a company called
Flower Child, but Nancy did not know this company and did not receive any e-mail
from this e-mail address before. This mail was an advertisement so Nancy regarded it
as spam.
(b) (i) What is spam? (1 mark)
(ii) State THREE harms of spam. (3 marks)
(iii) Suggest to Nancy a method to reduce the chance of receiving spam.(1 mark)
(iv) Nancy has never disclosed her e-mail address to Flower Child company.
How can Flower Child company realise Nancy’s e-mail address? State
TWO reasons. (2 marks)
Nancy planned to reply an e-mail to Flower Child and asked the company to stop
sending junk mails to her e-mail account.
(c) Do you agree Nancy to do so? Explain why. (3 marks)

Computer & Information Technology for HKCEE 5 © Pearson Education Asia Limited 2004
(Core Module)
Chapter 15 Legal and Ethical Issues Question Bank

Answers
(a) Increase the length of password. /
Use meaningless words to form the password. /
Change password regularly.
(Any 2 answers, each carries 1 mark)
(b) (i) Spam is unwanted e-mail that is mostly advertisement. (1)
(ii) Increase network loading. (1)
Waste storage space. (1)
Recipient needs extra time to manage the mails. (1)
(iii) Install spam filtering software. (1)
(iv) Nancy may have disclosed her e-mail address in somewhere like discussion
board. This information may be discovered by criminals. /
Nancy’s e-mail address was stored in the address book of someone’s
computer. However, this computer was accessed by Trojan horse program,
which automatically searched address book in the computer and sent the
addresses to criminals. /
Criminals may combine common words to form e-mail addresses and send
e-mails to them. Nancy’s e-mail address matched with one of the randomly
generated e-mail address. (Any 2 × 1)
(c) No. (1)
Reply the spam will let the criminals know that Nancy’s e-mail address is valid.
(1) This may cause Nancy to receive more spam. (1)

Computer & Information Technology for HKCEE 6 © Pearson Education Asia Limited 2004
(Core Module)
Chapter 15 Legal and Ethical Issues Question Bank

(U01C15L02Q002)
Mr. Lee is a self-employed programmer. He recently designs a decoding program to
sell.
(a) (i) Does Mr. Lee need to register his ownership of the program’s copyright?
Explain briefly. (2 marks)
(ii) Mr. Lee plans to sell the program to a computer software company. Does he
have the right to do so? Explain briefly. (2 marks)
Kenny is Mr. Lee’s friend. He secretly copied Mr. Lee’s decoding program without
notice. In order to investigate the personal histories and salaries of his colleagues,
Kenny modified the decoding program so that he could access company’s database to
read the data.
(b) (i) What kinds of crime did Kenny commit in the above action? (2 marks)
(ii) How would Kenny be punished? (1 mark)
(iii) Suggest THREE protective measures to the company to prevent its network
from the occurrence of similar events. (3 marks)
(c) State TWO ways to protect personal data. (2 marks)
Answers
(a) (i) No. (1)
Copyright is assigned automatically to the author of a work. After the
making of a work, the author has the copyright automatically without any
registration process. (1)
(ii) Yes. (1) The copyright owner may authorise the software company to use
the program for specific purposes. Mr. Lee is the copyright owner and has
the right to sell the program and the software company will not infringe the
copyright. (1)
(b) (i) Use a copyrighted work without the copyright owner’s permission, (1) and
unauthorised access to computer system and the data (1)
(ii) He would be prosecuted by the Custom and Excise Department and the
Police for the charge of stolen, copyright infringement and unauthorized
access to computer network. (1)
(iii) Use firewall. (1)
Strengthen the monitoring software of the computer system. (1)
Upgrade the password and encryption technology. (1)
(c) Do not install software or program of unknown source of origin. / Handle data
like user names and password carefully. / Do not reply spam. / Delete browsing
record or history after using computers at public places.
(Any 2 × 1)

Computer & Information Technology for HKCEE 7 © Pearson Education Asia Limited 2004
(Core Module)

Vous aimerez peut-être aussi