ELECTRONIC COMMUNITY CITIZENSHIP EXAM (ECCE)

This is the pool of questions from which each student's ten questions on the ECCE are drawn.

  1. Just as I might lend my car to my roommate, it is OK to share my computer account with a friend.
    1. This statement is true. It's my account.
    2. This statement is false. I may not share my account with anyone.
    3. This statement is true if my friend and I are taking the same class.
    4. This statement is false, but it is OK to share my account with my younger brother because he is also a student here.
  2. The best place to keep your password is:
    1. written on the back of your ID card.
    2. on a piece of paper you carry in your wallet.
    3. on the bulletin board in your room or office.
    4. in your head. You should never write your password down.
    5. in a computer file on your UNIX account.
  3. John X. Smythe was born on July 27, 1976. He is ready to select a password for his computer account. Which of the following choices make the best passwords?
    1. john
    2. 072776
    3. box*7car
    4.  j7x27s
    5. boxcar
    6. Something like either like either C. or D. above, but I shouldn't use either of these examples because they have been printed publicly and are now guessable.
  4. You receive e-mail from someone you have never met. Upon reading the message, you discover that it is a "chain letter" -- e-mail to 30 people asking each of them to forward the message to 30 more people. What should you do about this message?
    1. Send the message to everyone in your class.
    2. Send the message to thirty people you have never met.
    3. If the chain letter tells you that you will have bad luck if you do not forward it, you should make sure you forward it to at least thirty people.
    4. Ignore the message. Do not pass it on to others.
  5. Which of the following is acceptable behavior at the De La Salle University?
    1. Browsing through other students' computer files to see who has interesting information you can read.
    2. Walking up a hallway in a residence hall trying every doorknob to see which rooms are unlocked. 
    3. Browsing in the stacks of the Library looking for an interesting book to read.
    4. Cruising through a parking lot trying car doors to see which cars are unlocked.
  6. It's OK to share my computer password with
    1. my parents.
    2. my teacher.
    3. no one. I should keep it secret at all times.
    4. anyone I choose to.
  7. Use of computing at the University is:
    1. a privilege granted me by the University so I can do my schoolwork and communicate with faculty and students
    2. a right guaranteed under the Constitution of the Philippines
    3. this really neat thing I can use as much as I like without any obligations.
  8. It is OK to give a copy of software to someone else under the following circumstances:
    1. When he or she can't afford to buy it.
    2. When he or she is my roommate.
    3. Only if the license agreement that comes with the software explicitly allows me to do so.
  9. If I am found guilty of violating the University's Policy for Responsible Computing,
    1. I may lose my computing privileges.
    2. I may be subject to other sanctions from the Discipline Office.
    3. I may be suspended or expelled from the University.
    4. I may receive counseling on proper computing behavior.
    5. I might be liable to prosecution under federal, state, and local ordinances.
    6. If found guilty, I may be subject to any or all of the sanctions listed in items A. - E. above.
  10. If you do not have any use for your computer account, the proper thing to do is:
    1. to continue to be very careful with the account, keeping its password secure.
    2. to sell the account to a student who has used up his or her computing resources.
    3. to let your dad use it since he does not have Internet access at work.
  11. Which of the following are acceptable computing behavior at the De La Salle University?
    1. Making a copy of a neighbor's copy of WordPerfect to use on your own computer.
    2. Sending e-mail to everyone on campus inviting them to your next social event.
    3. Posting a note to a campus bulletin board in which you insult someone.
    4. "Borrowing" a friend's computer program, making a few changes to it, then turning it in to your professor as your own work.
    5. None of the above.
  12. Which of the following are considered Misuse of Property and, therefore, a violation of the University Social Norms as described in the Student Handbook?
    1. Throwing a can of soda through my residence hall room window and screen.
    2. Pouring a soda on a printer in one of the computing sites.
    3. Attempting to crash a University computer -- on purpose.
    4. Using the University's network to attempt to break in to a computer off-campus.
    5. All of the above.
  13. I can make extra copies of my computer software for my friends.
    1. This statement is always true.
    2. This statement is usually always false. I must check the license agreement for the software to see under what circumstance I am permitted to do this.
  14. I can use my computer account for authorized computing activities. Such activities include:
    1. Sending e-mail to and receiving e-mail from my instructors and friends.
    2. Reading bulletin boards, within the limits of my computer resource allocation.
    3. Playing multi-user dungeon (MUD) games over the Internet.
    4. Using Internet tools (e.g., gopher, bulletin boards, Netscape/Mosaic) to find research material over the Internet for my next research paper.
    5. Seeing if I can write programs to crash a computer.
    6. A., B., and D. above.
  15. Who is responsible for the smooth running of the Internet and all computer networks connected to it?
    1. The computing center staff at the University.
    2. InterPol, the international police agency.
    3. Everyone who uses the network, including students, faculty, and staff at the University.
    4. No one.
  16. Forging electronic mail is a fun and easy way to play a practical joke on a friend.
    1. True. It is a harmless prank.
    2. False. It may seem like a harmless prank, but it is forgery and an abuse of the University's resources.
  17. My right to use a computer at the De La Salle University is guaranteed by state and federal law.
    1. This statement is always true.
    2. This statement is incorrect. Use of computing at the University is a privilege granted to me by the University. It is not a guaranteed right.
  18. If I'm not sure whether or not something I'm doing on the computers is considered appropriate behavior,
    1. I should go ahead and do it. Someone will stop me and let me know if I do something I shouldn't.
    2. I should ask my roommate his or her opinion.
    3. I should ask one of my professors or I should call the Help Desk at 526-42-42 (direct line) or 50-46-11 Local 316.
  19. Which of the following may be grounds for a charge of minor/ major offense under the Student Handbook?
    1. Hitting or threatening to hit another student.
    2. Running a computer program that loudly plays holiday songs in a computer lab during final exam week.
    3. Sending e-mail to someone in which you threaten an act of violence.
    4. All of the above.
  20. Which of the following make the best choice as a password?
    1. string of letters, punctuation, and numbers that I can remember without writing down.
    2. My first or last name.
    3. My best friend's nickname.
    4. My birth date.
    5. Some word that is not a proper name or nickname.
    6. My username, user number, or access code.
  21. The University thinks that responsible computing is very important because:
    1. it is important that students learn to obey rules.
    2. the open nature of the Internet requires us all to be careful in our computing activities as our activities can affect other users.
    3. being a good, ethical citizen is a part of being a member of any community --the University and the electronic community included.
    4. B and C. above.
  22. Where can I find a copy of the Policy for Responsible Computing?
    1. in the Responsible Computing Brochure.
    2. in the Official Student Handbook.
    3. on the computer.
    4. all of the above.
  23. If I come into a computing site and notice that someone has forgotten to log out properly I should:
    1. notify the site assistant or consultant on duty.
    2. feel free to use the system since we all share computing resources anyway.
  24. Which of the following are malicious misuse of the computer?
    1. Stealing passwords.
    2. Crashing a computer.
    3. Forging e-mail messages.
    4. Sending e-mail messages that threaten people.
    5. All of the above.
  25. At the University, which parts of the computing resources do you own?
    1. All of the computing resources.
    2. The University's computing network.
    3. The e-mail messages you receive and the information stored in the computer files you create.
    4. The software on the central computers.
  26. At the University, my computer messages and files are considered private and confidential.
    1. This is always true.
    2. This is true except in unusual circumstances when a system administrator may have to look at my files in order to solve a system problem. In these cases, the system administrator is required to treat information he or she might see as confidential when it is not related to the problem.
  27. If your friends are talking about copying licensed software and distributing those copies, you should
    1. ask them to make you a copy, too.
    2. remind them that what they are discussing is probably illegal and a violation of the University's Policy for Responsible Computing.
    3. ignore the conversation.
  28. Which of the following is considered to be an acceptable use of your electronic mailbox and computer account?
    1. Browsing to see if you can read any other people's computer information.
    2. Sending electronic mail to a friend at the University of Maryland.
    3. Sending a message to 100 people you don't know.
    4. Using your computer account or electronic mailbox to run a business.
    5. Copying the University Staff Directory and printing it out for your parents' direct mail business as a way of helping them get more customers.
  29. When thinking of a computer password, which of the following is a good rule to help you select a password?
    1. Never select your name, a portion of your social security number, your birthdate, your user number or user name, or any other "public" information about yourself as your password.
    2. Choose something that matches your user name. For example, if your user name is "beavis", choose "butthead" as your password.
    3. Ask your friends what passwords they've chosen to get some ideas.
    4. Discuss your choice with a lot of people to see if  they think it's a good idea.
  30. If a faculty member or staff member charges me with violating the University's Policy for Responsible Computing,
    1. my case will immediately be turned over to the campus police.
    2. the matter will be referred for judicial processing to the Dean of Students in accordance with the procedures outlined in the Official Student Handbook. If I am found guilty, I will be subject to University sanctions. Depending on the seriousness of the charge, the University may also decide to prosecute the appropriate laws.
    3. the faculty or staff member and I will have to argue the matter in Regional Trial Court.
    4. I should borrow someone else's account until the matter is cleared up.
  31. Which of the following statements best describes the terms under which you may use the University's computing resources?
    1. As a student at the University, I have the right to demand unlimited access to computing resources.
    2. I am guaranteed access to the computing resources at the University by the University laws, Philippines laws, and international laws.
    3. The University grants me the privilege of using its computing resources for authorized computing activities such as course work, sending and receiving electronic mail, and reading bulletin boards. This privilege is extended to me so long as I abide by the Policy for Responsible Computing.
    4. The University restricts my computing privileges to use of the computing facilities for course work
  32. Why is it important that you abide by the Policy for Responsible Computing in your use of the University's computing resources?
    1. Because the University wants to maintain an open computing environment in which faculty and students who choose to share information can do so readily.
    2. Because the entire Internet depends on the cooperation of all its members to operate reliably.
    3. Because what you do on a computing system can affect other users of that computer or of the networks to which that computer is attached.
    4. Because the University expects it students to observe the same high standards of behavior on and off the computer.
    5. All of the above.
  33. You use a friend's computer and like one of the games he has on his system. So you make a copy of it and take it back to your room to use on your roommate's computer. Later on, you tell your friend what you did, and are surprised that he is angry with you for "pirating" a copy of the game. What should you say to him?
    1. It's not like I stole your computer. I only took a copy of one piece of software. You can still use the original.
    2. It's not like I copied your term paper so I could turn it in to my professor. I know that's plagiarism.
    3. I'm sorry. I should have checked the license first. Then I would have known not to do it. Let's go to my  room and destroy the copy I made right now.
  34. I am the owner of my own computer. The University expects that:
    1. I will be responsible for all use of my computer by me or by other people.
    2. I will be responsible for the observation of all licenses for software used on my computer.
    3. I will be responsible for all use of the network from my computer.
    4. All of the above.
  35. The University grants all its students the privilege of having an electronic mail account because:
    1. it's the latest thing.
    2. it's a lot of fun to see how many people you can meet on the network.
    3. becoming competent in the use of computers is an important part of the University's curriculum.
    4. electronic communication can improve communication between students, faculty, and staff.
    5. C. and D. above.
  36. If someone sells you a used computer, "including all the software," but refuses to give you copies of the software manuals and license agreements
    1. You should feel free to use the software on the system.
    2. You should erase the software from the computer and purchase your own licensed copies from the Computer Warehouse or another vendor.

your project members, staff or students learn about good computing practices and data management.