Unit 1 - Practice Quiz

CSE332 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 What is the primary definition of Ethics in a general context?

A. The study of legal statutes and regulations
B. A set of beliefs about the physical universe
C. A code of moral principles and values that govern the behaviors of a person or group
D. The psychological study of human intelligence

2 The term 'Ethics' is derived from the Greek word Ethos, which means:

A. Character or Custom
B. Knowledge
C. Power
D. Law

3 Which of the following best describes the concept of Integrity?

A. Maximizing profit regardless of the means
B. Adhering to principles only when witnessed by others
C. The ability to hide mistakes effectively
D. Acting in accordance with a personal code of principles consistently

4 In the business world, if a company's profit is denoted by and ethical standards by , which approach ensures long-term sustainability?

A. Maximize , ignore
B. Maximize , ignore
C. Minimize to ensure
D. Balance while strictly adhering to

5 What is the primary goal of Corporate Social Responsibility (CSR)?

A. To manage a business in a way that produces an overall positive impact on society
B. To bypass environmental regulations
C. To increase the shareholder dividends immediately
D. To reduce the number of employees

6 Which of the following is a key step in improving corporate ethics?

A. Discouraging whistleblowing
B. Removing the code of conduct
C. Concealing financial records
D. Appointing a Corporate Ethics Officer

7 What is the function of a Code of Conduct in an organization?

A. To calculate the annual taxes
B. To track employee attendance
C. To list the technical specifications of products
D. To provide a guide for appropriate decision-making and behavior

8 The phrase 'Tone at the Top' refers to:

A. The frequency of communication from the IT department
B. The ethical atmosphere created by the leadership of an organization
C. The volume of music played in the office
D. The marketing strategy for high-end clients

9 Which of the following creates an ethical work environment?

A. Ignoring employee grievances
B. Unrealistic performance goals
C. Promoting employees based on favoritism
D. Transparent communication and fair reward systems

10 In Ethical Decision Making, what is usually the first step?

A. Consult a lawyer after the fact
B. Get the facts
C. Ignore the consequences
D. Make a decision immediately

11 The utilitarian approach to ethics suggests that:

A. The ethical action is the one that produces the greatest good for the greatest number
B. Actions are right if they serve the individual's self-interest
C. Ethics are determined by cultural customs only
D. Moral duties are absolute regardless of consequences

12 In the context of IT, what does the term 'Digital Divide' refer to?

A. The gap between those who have access to information technology and those who do not
B. The difference in speed between two processors
C. The partition on a hard drive
D. The separation between hardware and software

13 Which organization is known for its Code of Ethics and Professional Conduct for IT professionals?

A. FDA
B. WHO
C. FIFA
D. ACM (Association for Computing Machinery)

14 A situation where an IT professional has a competing professional or personal interest that makes it difficult to act impartially is called:

A. System Administration
B. Conflict of Interest
C. Whistleblowing
D. Data Mining

15 If an IT professional discovers a software bug that could cause financial loss (), what is their ethical obligation?

A. Quit the job without mentioning it
B. Hide the bug to save the project timeline
C. Blame a colleague for the error
D. Disclose the issue to the client or management immediately

16 Whistleblowing is best defined as:

A. Selling trade secrets to a competitor
B. Complaining about low wages
C. An employee reporting an employer's misconduct to authority figures or the public
D. Leaking personal data of colleagues for fun

17 Which of the following is a common ethical issue for IT users?

A. Updating the operating system
B. Software Piracy
C. Writing efficient code
D. Attending meetings

18 What is an Acceptable Use Policy (AUP)?

A. A government law regarding internet speed
B. A manual on how to repair a computer
C. A price list for IT services
D. A document stipulating constraints and practices that a user must agree to for access to a corporate network

19 Plagiarism in the context of IT and academia is:

A. Using open-source software with attribution
B. Stealing someone else's work or ideas and passing them off as one's own
C. Collaborating on a project with permission
D. Backing up data to the cloud

20 How can organizations support the ethical practices of IT users?

A. By encouraging the use of unlicensed software
B. By removing all security firewalls
C. By providing clear guidelines and training on data privacy and security
D. By monitoring all private conversations without consent

21 The concept of Women Empowerment in the workplace includes:

A. Assigning only administrative tasks to women
B. Creating an environment where women can access opportunities and participate in decision-making equally
C. Reducing the salaries of male employees
D. Promoting women solely based on gender regardless of skill

22 The invisible barrier that prevents women and minorities from rising to the highest ranks in a corporation is known as the:

A. Firewall
B. Iron Curtain
C. Safety Net
D. Glass Ceiling

23 Which of the following helps in preventing Sexual Harassment at the workplace?

A. Establishing a zero-tolerance policy and a clear grievance redressal mechanism
B. Discouraging social interactions
C. Asking the victim to resign
D. ignoring minor complaints

24 In Engineering Ethics, the paramount obligation of an engineer is to:

A. The profession
B. The employer
C. The public safety, health, and welfare
D. The client

25 If a manufacturing process releases a toxin where the safe limit is ppm, and the current process releases ppm, what should the engineer do?

A. Wait for the government to notice
B. Ignore it if it saves money
C. Report the violation and work to reduce the emission
D. Adjust the sensor to read 4 ppm

26 What is Sustainable Development in the context of engineering ethics?

A. Maximizing the use of non-renewable resources
B. Building structures that last forever without maintenance
C. Developing technology only for developed nations
D. Development that meets the needs of the present without compromising the ability of future generations to meet their own needs

27 Which of the following is a breach of IT Professional Ethics?

A. Snooping on employee emails without authorization or valid cause
B. Encrypting sensitive data
C. Documenting code changes
D. Testing software before release

28 The 'Deontological' ethical theory focuses on:

A. The happiness of the individual
B. Duties, rules, and obligations
C. The consequences of the action
D. The character of the moral agent

29 Regarding Intellectual Property (IP), what does a Patent protect?

A. Inventions and discoveries
B. Customer lists
C. Artistic works like books and music
D. Brand names and logos

30 What is the role of an Ombudsman in corporate ethics?

A. To prosecute criminals
B. To set the salary of the CEO
C. To audit the financial statements
D. To investigate complaints and attempt to resolve them, usually through recommendations or mediation

31 In the context of Women Empowerment, what does 'Gender Mainstreaming' mean?

A. Hiring only women
B. Ignoring gender differences completely
C. Segregating men and women in the workplace
D. Integrating a gender perspective into the preparation, design, implementation, and evaluation of policies

32 When an engineer signs and seals a design plan, they are:

A. Indicating the work is expensive
B. Taking legal and ethical responsibility for the work
C. Creating a decorative element
D. Simply following protocol without meaning

33 Which of the following is considered Cyberbullying?

A. Disagreeing with an opinion in a forum
B. Unfriending someone on social media
C. Sending threatening or harassing messages via digital platforms
D. Blocking a user who spams

34 Why is diversity (including gender diversity) important in engineering and IT teams?

A. It is just a legal requirement
B. It leads to more innovative solutions by bringing different perspectives
C. It makes the office look more colorful
D. It reduces the cost of labor

35 What is 'Shadow IT'?

A. The dark web
B. Working on computers at night
C. Hardware that is painted black
D. IT systems used within an organization without explicit approval from the IT department

36 An employee uses company computing power to mine cryptocurrency for personal gain. This is an example of:

A. Cloud computing
B. Distributed processing
C. Theft of resources / Misuse of assets
D. Entrepreneurship

37 In ethical decision making, the 'Newspaper Test' asks:

A. Did I read the news today?
B. Is this news current?
C. How would I feel if this action was published on the front page of a newspaper?
D. Does this action cost more than a newspaper?

38 Trade Secrets are best protected by:

A. Registering with the government
B. Publishing them in a journal
C. Sharing them with competitors
D. Keeping the information confidential and restricting access

39 What is Bioethics largely concerned with?

A. The biology of ethics
B. Environmental recycling
C. Ethical implications of biological research and applications (e.g., genetic engineering)
D. The ethics of computer chips

40 If is an action that is legal but unethical, should a professional do ?

A. Yes, if it is legal, it is fine
B. Yes, if it saves money
C. No, professionals should adhere to higher ethical standards than just the law
D. It depends on the weather

41 Which body typically handles sexual harassment complaints in a large organization?

A. The Receptionist
B. The IT Helpdesk
C. Internal Complaints Committee (ICC)
D. The Sales Team

42 What is 'Green Computing'?

A. Using computers in the garden
B. Environmentally sustainable computing via energy efficiency and responsible disposal
C. Computing for money
D. Using green colored screens

43 Which of the following creates a Conflict of Interest for a hiring manager?

A. Checking references
B. Reviewing resumes
C. Interviewing a close relative for a position
D. Interviewing a candidate with the required skills

44 The IEEE Code of Ethics obligates engineers to avoid injuring others, their property, reputation, or employment by:

A. High pricing
B. Innovative design
C. False or malicious action
D. Excessive competition

45 Social Engineering in IT security refers to:

A. Organizing office parties
B. Manipulating people into performing actions or divulging confidential information
C. Building social networks
D. Engineering society for the better

46 Which action supports Women Empowerment regarding maternity?

A. Asking women not to have children
B. Firing women who get pregnant
C. Reducing their rank upon return
D. Providing paid maternity leave and job security upon return

47 The principle of 'Informed Consent' is crucial in:

A. Compiling code
B. Testing products/software on human subjects or gathering user data
C. Installing software updates automatically
D. Designing a microchip

48 An IT professional finds data evidence of illegal activity by a user on a company server. The ethical action is to:

A. Delete it to protect the user
B. Blackmail the user
C. Post it on social media
D. Follow company policy regarding incident reporting (usually to Legal/HR/Authorities)

49 What is the primary risk of Algorithmic Bias in AI systems?

A. The AI reinforces existing social prejudices and discrimination
B. The AI uses too much electricity
C. The AI refuses to answer questions
D. The AI becomes too slow

50 A Fiduciary Duty is:

A. A tax obligation
B. A duty to vote
C. A legal/ethical relationship of confidence and trust (e.g., acting in the best financial interest of a client)
D. A duty to clean the office