Top 250+ Solved Business Ethics and Corporate Social Responsibility (BECSR) MCQ Questions Answer
Q. The consumers have an implied_____________ with the corporations
a. Quasi Contract
b. Social Contract
c. Legal Contract
d. None of the above
Q. The right to ________ is the right to be protected against products, production processes and service hazardous to life
a. Redress
b. Choose
c. Be informed
d. Safety
Q. The principle of “let the buyer be aware “is based on the _____________theory
a. Capitalist
b. Consumer
c. Free-market
d. None of the above
Q. _______________ doctrine places the responsibility of product safety on corporations
a. Buyer beware
b. Seller beware
c. Seller take care
d. Buyer and seller take care
Q. The ___________ has a code of ethics that helps organizations monitor their ads
a. AAA
b. FTC
c. FDA
d. All of the above
Q. The basic principles of advertising law to be followed while doing online advertising are:
a. Advertising must be truthful and not misleading
b. Advertisements cannot be unfair
c. Advertisements must be substantiated
d. All of the above
Q. The phenomenon of KGOY (Kids getting older younger) refers to
a. Teens (between childhood and teenage years)
b. Only the teenagers
c. Kids below 13 years of age
d. Kids below 18 yrs of age
Q. __________________ standards seek to encourage voluntary commitment to social responsibility.
a. ISO 26000
b. AA1000
c. CSR
d. OECD
Q. Object of the central council is
a. The right to be protected against the marketing of goods which are hazardous to life and property
b. The right to informed about the quality, quantity, potency, purity, standard and price of goods so as to protect the consumer against unfair trade practices
c. The right to be assured, wherever possible access to a variety of goods at competitive prices
d. All the above
Q. Illegal intrusion of a computer system without authorization of the owner or user is__________
a. Hacking
b. Spam
c. Phishing
d. Spoofing
Q. A kind of impersonation in order to get access to other computers is__________
a. Hacking
b. Spam
c. Phishing
d. Spoofing
Q. The flooding of the victim’s computer with _________ affects the bandwidth of the system and the user is unable to access and work on the computer.
a. Hacking
b. Spam
c. Phishing
d. Spoofing
Q. Prevention of disclosure of information to unauthorized persons is __________
a. Confidentiality
b. Integrity
c. Availability
d. None of the above
Q. _________- is a prefix to everything that transports us instantly into the virtual world.
a. Cyber
b. Internet
c. Tech
d. None of the above