WAEC 2025 - ICT
Topic 9: Computer Ethics and Human Issues
Printable Question Bank
Section A: Objective Questions (10 Marks)
Instructions: Answer all questions. Each carries 1 mark.
1. Which of these is a computer security threat?
a) Firewall
b) Antivirus
c) Trojan horse
d) Password manager
Answer: c) Trojan horse
2. Copyright law protects:
a) Computer hardware
b) Original software
c) Internet speed
d) Electricity supply
Answer: b) Original software
3. A hacker who breaks into systems for malicious purposes is called:
a) White-hat hacker
b) Black-hat hacker
c) Programmer
d) Network engineer
Answer: b) Black-hat hacker
4. Which is NOT a preventive measure against viruses?
a) Regular backups
b) Opening email attachments from strangers
c) Using antivirus software
d) Installing firewall
Answer: b) Opening email attachments from strangers
5. Encrypting data means:
a) Deleting it permanently
b) Converting it to unreadable code
c) Printing it on paper
d) Sharing it publicly
Answer: b) Converting it to unreadable code
6. An example of cybercrime is:
a) Online banking
b) Internet fraud
c) Video conferencing
d) Word processing
Answer: b) Internet fraud
7. Which law prohibits unauthorized access to computer systems?
a) Copyright Act
b) Cybercrime Act
c) Company Law
d) Tax Law
Answer: b) Cybercrime Act
8. Proper computer ethics include:
a) Sharing passwords
b) Respecting privacy
c) Pirating software
d) Hacking for fun
Answer: b) Respecting privacy
9. A virus that replicates itself is called:
a) Worm
b) Trojan
c) Spyware
d) Adware
Answer: a) Worm
10. Backing up files helps prevent loss due to:
a) Power surge
b) Hardware failure
c) Software updates
d) Monitor brightness
Answer: b) Hardware failure
Section B: Theory Questions (20 Marks)
Question 1 (10 Marks)
a) Define computer virus and list three types. (4 marks)
b) Explain three ways to protect against malware. (6 marks)
Marking Scheme:
Part Expected Answer Marks
Definition: Malicious software that infects systems. Types: Worm, 1 (def) + 1 per
a)
Trojan, Spyware. type
Ways to protect: 1. Install antivirus 2. Avoid suspicious links 3. Regular
b) 2 marks per point
updates
Question 2 (10 Marks)
a) Differentiate copyright and patent. (4 marks)
b) Describe two ethical uses of social media. (6 marks)
Marking Scheme:
Part Expected Answer Marks
2 marks per
a) Copyright: Protects creative works. Patent: Protects inventions.
difference
Ethical uses: 1. Respecting others' privacy 2. Verifying information
b) 3 marks per point
before sharing
Exam Mastery Tips
Key Terms:
Virus vs Worm (requires host vs self-replicating)
Copyright (creative works) vs Patent (inventions)
Ethical Scenarios:
Always credit sources
Report security breaches
Common Mistakes:
Confusing encryption (security) with compression (storage)
Misidentifying malware types