Unit 1 - Practice Quiz

CSE332 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 What is the primary definition of Ethics in a general context?

A. The study of legal statutes and regulations
B. A set of beliefs about the physical universe
C. A code of moral principles and values that govern the behaviors of a person or group
D. The psychological study of human intelligence

2 The term 'Ethics' is derived from the Greek word Ethos, which means:

A. Law
B. Character or Custom
C. Knowledge
D. Power

3 Which of the following best describes the concept of Integrity?

A. Adhering to principles only when witnessed by others
B. Acting in accordance with a personal code of principles consistently
C. Maximizing profit regardless of the means
D. The ability to hide mistakes effectively

4 In the business world, if a company's profit is denoted by and ethical standards by , which approach ensures long-term sustainability?

A. Maximize , ignore
B. Maximize , ignore
C. Balance while strictly adhering to
D. Minimize to ensure

5 What is the primary goal of Corporate Social Responsibility (CSR)?

A. To increase the shareholder dividends immediately
B. To manage a business in a way that produces an overall positive impact on society
C. To bypass environmental regulations
D. To reduce the number of employees

6 Which of the following is a key step in improving corporate ethics?

A. Concealing financial records
B. Appointing a Corporate Ethics Officer
C. Discouraging whistleblowing
D. Removing the code of conduct

7 What is the function of a Code of Conduct in an organization?

A. To list the technical specifications of products
B. To provide a guide for appropriate decision-making and behavior
C. To calculate the annual taxes
D. To track employee attendance

8 The phrase 'Tone at the Top' refers to:

A. The volume of music played in the office
B. The ethical atmosphere created by the leadership of an organization
C. The frequency of communication from the IT department
D. The marketing strategy for high-end clients

9 Which of the following creates an ethical work environment?

A. Unrealistic performance goals
B. Transparent communication and fair reward systems
C. Ignoring employee grievances
D. Promoting employees based on favoritism

10 In Ethical Decision Making, what is usually the first step?

A. Make a decision immediately
B. Get the facts
C. Ignore the consequences
D. Consult a lawyer after the fact

11 The utilitarian approach to ethics suggests that:

A. Actions are right if they serve the individual's self-interest
B. Moral duties are absolute regardless of consequences
C. The ethical action is the one that produces the greatest good for the greatest number
D. Ethics are determined by cultural customs only

12 In the context of IT, what does the term 'Digital Divide' refer to?

A. The separation between hardware and software
B. The gap between those who have access to information technology and those who do not
C. The partition on a hard drive
D. The difference in speed between two processors

13 Which organization is known for its Code of Ethics and Professional Conduct for IT professionals?

A. FDA
B. ACM (Association for Computing Machinery)
C. WHO
D. FIFA

14 A situation where an IT professional has a competing professional or personal interest that makes it difficult to act impartially is called:

A. Whistleblowing
B. Conflict of Interest
C. System Administration
D. Data Mining

15 If an IT professional discovers a software bug that could cause financial loss (), what is their ethical obligation?

A. Hide the bug to save the project timeline
B. Disclose the issue to the client or management immediately
C. Quit the job without mentioning it
D. Blame a colleague for the error

16 Whistleblowing is best defined as:

A. Selling trade secrets to a competitor
B. An employee reporting an employer's misconduct to authority figures or the public
C. Leaking personal data of colleagues for fun
D. Complaining about low wages

17 Which of the following is a common ethical issue for IT users?

A. Writing efficient code
B. Software Piracy
C. Attending meetings
D. Updating the operating system

18 What is an Acceptable Use Policy (AUP)?

A. A document stipulating constraints and practices that a user must agree to for access to a corporate network
B. A government law regarding internet speed
C. A manual on how to repair a computer
D. A price list for IT services

19 Plagiarism in the context of IT and academia is:

A. Using open-source software with attribution
B. Stealing someone else's work or ideas and passing them off as one's own
C. Backing up data to the cloud
D. Collaborating on a project with permission

20 How can organizations support the ethical practices of IT users?

A. By monitoring all private conversations without consent
B. By providing clear guidelines and training on data privacy and security
C. By encouraging the use of unlicensed software
D. By removing all security firewalls

21 The concept of Women Empowerment in the workplace includes:

A. Promoting women solely based on gender regardless of skill
B. Creating an environment where women can access opportunities and participate in decision-making equally
C. Reducing the salaries of male employees
D. Assigning only administrative tasks to women

22 The invisible barrier that prevents women and minorities from rising to the highest ranks in a corporation is known as the:

A. Firewall
B. Glass Ceiling
C. Iron Curtain
D. Safety Net

23 Which of the following helps in preventing Sexual Harassment at the workplace?

A. ignoring minor complaints
B. Establishing a zero-tolerance policy and a clear grievance redressal mechanism
C. Discouraging social interactions
D. Asking the victim to resign

24 In Engineering Ethics, the paramount obligation of an engineer is to:

A. The employer
B. The client
C. The public safety, health, and welfare
D. The profession

25 If a manufacturing process releases a toxin where the safe limit is ppm, and the current process releases ppm, what should the engineer do?

A. Adjust the sensor to read 4 ppm
B. Report the violation and work to reduce the emission
C. Ignore it if it saves money
D. Wait for the government to notice

26 What is Sustainable Development in the context of engineering ethics?

A. Building structures that last forever without maintenance
B. Development that meets the needs of the present without compromising the ability of future generations to meet their own needs
C. Maximizing the use of non-renewable resources
D. Developing technology only for developed nations

27 Which of the following is a breach of IT Professional Ethics?

A. Encrypting sensitive data
B. Snooping on employee emails without authorization or valid cause
C. Testing software before release
D. Documenting code changes

28 The 'Deontological' ethical theory focuses on:

A. The consequences of the action
B. The character of the moral agent
C. Duties, rules, and obligations
D. The happiness of the individual

29 Regarding Intellectual Property (IP), what does a Patent protect?

A. Artistic works like books and music
B. Inventions and discoveries
C. Brand names and logos
D. Customer lists

30 What is the role of an Ombudsman in corporate ethics?

A. To prosecute criminals
B. To investigate complaints and attempt to resolve them, usually through recommendations or mediation
C. To set the salary of the CEO
D. To audit the financial statements

31 In the context of Women Empowerment, what does 'Gender Mainstreaming' mean?

A. Segregating men and women in the workplace
B. Integrating a gender perspective into the preparation, design, implementation, and evaluation of policies
C. Hiring only women
D. Ignoring gender differences completely

32 When an engineer signs and seals a design plan, they are:

A. Creating a decorative element
B. Taking legal and ethical responsibility for the work
C. Simply following protocol without meaning
D. Indicating the work is expensive

33 Which of the following is considered Cyberbullying?

A. Unfriending someone on social media
B. Sending threatening or harassing messages via digital platforms
C. Disagreeing with an opinion in a forum
D. Blocking a user who spams

34 Why is diversity (including gender diversity) important in engineering and IT teams?

A. It is just a legal requirement
B. It leads to more innovative solutions by bringing different perspectives
C. It makes the office look more colorful
D. It reduces the cost of labor

35 What is 'Shadow IT'?

A. IT systems used within an organization without explicit approval from the IT department
B. The dark web
C. Working on computers at night
D. Hardware that is painted black

36 An employee uses company computing power to mine cryptocurrency for personal gain. This is an example of:

A. Entrepreneurship
B. Theft of resources / Misuse of assets
C. Cloud computing
D. Distributed processing

37 In ethical decision making, the 'Newspaper Test' asks:

A. Is this news current?
B. How would I feel if this action was published on the front page of a newspaper?
C. Does this action cost more than a newspaper?
D. Did I read the news today?

38 Trade Secrets are best protected by:

A. Registering with the government
B. Keeping the information confidential and restricting access
C. Publishing them in a journal
D. Sharing them with competitors

39 What is Bioethics largely concerned with?

A. The ethics of computer chips
B. Ethical implications of biological research and applications (e.g., genetic engineering)
C. The biology of ethics
D. Environmental recycling

40 If is an action that is legal but unethical, should a professional do ?

A. Yes, if it is legal, it is fine
B. No, professionals should adhere to higher ethical standards than just the law
C. Yes, if it saves money
D. It depends on the weather

41 Which body typically handles sexual harassment complaints in a large organization?

A. The IT Helpdesk
B. Internal Complaints Committee (ICC)
C. The Sales Team
D. The Receptionist

42 What is 'Green Computing'?

A. Using green colored screens
B. Environmentally sustainable computing via energy efficiency and responsible disposal
C. Computing for money
D. Using computers in the garden

43 Which of the following creates a Conflict of Interest for a hiring manager?

A. Interviewing a candidate with the required skills
B. Interviewing a close relative for a position
C. Checking references
D. Reviewing resumes

44 The IEEE Code of Ethics obligates engineers to avoid injuring others, their property, reputation, or employment by:

A. False or malicious action
B. Excessive competition
C. High pricing
D. Innovative design

45 Social Engineering in IT security refers to:

A. Building social networks
B. Manipulating people into performing actions or divulging confidential information
C. Engineering society for the better
D. Organizing office parties

46 Which action supports Women Empowerment regarding maternity?

A. Firing women who get pregnant
B. Providing paid maternity leave and job security upon return
C. Asking women not to have children
D. Reducing their rank upon return

47 The principle of 'Informed Consent' is crucial in:

A. Installing software updates automatically
B. Testing products/software on human subjects or gathering user data
C. Designing a microchip
D. Compiling code

48 An IT professional finds data evidence of illegal activity by a user on a company server. The ethical action is to:

A. Blackmail the user
B. Post it on social media
C. Follow company policy regarding incident reporting (usually to Legal/HR/Authorities)
D. Delete it to protect the user

49 What is the primary risk of Algorithmic Bias in AI systems?

A. The AI becomes too slow
B. The AI reinforces existing social prejudices and discrimination
C. The AI uses too much electricity
D. The AI refuses to answer questions

50 A Fiduciary Duty is:

A. A duty to clean the office
B. A legal/ethical relationship of confidence and trust (e.g., acting in the best financial interest of a client)
C. A duty to vote
D. A tax obligation