0% found this document useful (0 votes)
66 views3 pages

WAEC Computer Studies Topic 9

The document is a question bank for WAEC 2025 ICT, focusing on computer ethics and human issues. It includes objective questions on computer security threats, copyright laws, and ethical practices, as well as theory questions regarding computer viruses and social media ethics. The document also provides marking schemes and exam mastery tips to aid students in their preparation.

Uploaded by

Toni
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views3 pages

WAEC Computer Studies Topic 9

The document is a question bank for WAEC 2025 ICT, focusing on computer ethics and human issues. It includes objective questions on computer security threats, copyright laws, and ethical practices, as well as theory questions regarding computer viruses and social media ethics. The document also provides marking schemes and exam mastery tips to aid students in their preparation.

Uploaded by

Toni
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

WAEC 2025 - ICT

Topic 9: Computer Ethics and Human Issues


Printable Question Bank

Section A: Objective Questions (10 Marks)

Instructions: Answer all questions. Each carries 1 mark.

1. Which of these is a computer security threat?


a) Firewall
b) Antivirus
c) Trojan horse
d) Password manager
Answer: c) Trojan horse
2. Copyright law protects:
a) Computer hardware
b) Original software
c) Internet speed
d) Electricity supply
Answer: b) Original software
3. A hacker who breaks into systems for malicious purposes is called:
a) White-hat hacker
b) Black-hat hacker
c) Programmer
d) Network engineer
Answer: b) Black-hat hacker
4. Which is NOT a preventive measure against viruses?
a) Regular backups
b) Opening email attachments from strangers
c) Using antivirus software
d) Installing firewall
Answer: b) Opening email attachments from strangers
5. Encrypting data means:
a) Deleting it permanently
b) Converting it to unreadable code
c) Printing it on paper
d) Sharing it publicly
Answer: b) Converting it to unreadable code
6. An example of cybercrime is:
a) Online banking
b) Internet fraud
c) Video conferencing
d) Word processing
Answer: b) Internet fraud
7. Which law prohibits unauthorized access to computer systems?
a) Copyright Act
b) Cybercrime Act
c) Company Law
d) Tax Law
Answer: b) Cybercrime Act
8. Proper computer ethics include:
a) Sharing passwords
b) Respecting privacy
c) Pirating software
d) Hacking for fun
Answer: b) Respecting privacy
9. A virus that replicates itself is called:
a) Worm
b) Trojan
c) Spyware
d) Adware
Answer: a) Worm
10. Backing up files helps prevent loss due to:
a) Power surge
b) Hardware failure
c) Software updates
d) Monitor brightness
Answer: b) Hardware failure

Section B: Theory Questions (20 Marks)

Question 1 (10 Marks)


a) Define computer virus and list three types. (4 marks)
b) Explain three ways to protect against malware. (6 marks)

Marking Scheme:

Part Expected Answer Marks


Definition: Malicious software that infects systems. Types: Worm, 1 (def) + 1 per
a)
Trojan, Spyware. type
Ways to protect: 1. Install antivirus 2. Avoid suspicious links 3. Regular
b) 2 marks per point
updates
Question 2 (10 Marks)
a) Differentiate copyright and patent. (4 marks)
b) Describe two ethical uses of social media. (6 marks)

Marking Scheme:

Part Expected Answer Marks


2 marks per
a) Copyright: Protects creative works. Patent: Protects inventions.
difference
Ethical uses: 1. Respecting others' privacy 2. Verifying information
b) 3 marks per point
before sharing

Exam Mastery Tips

Key Terms:

 Virus vs Worm (requires host vs self-replicating)


 Copyright (creative works) vs Patent (inventions)

Ethical Scenarios:

 Always credit sources


 Report security breaches

Common Mistakes:

 Confusing encryption (security) with compression (storage)


 Misidentifying malware types

You might also like