1/93
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
If you find yourself rationalizing a decision with the statement “Well, our competitiors are doing something far worse”. What action should you not take?
Drop this option and implement the same policy as your competitors
What rights does a prisoner have regarding privacy?
The right to absolute privacy
What is a set of rules that establishes boundaries of generally accepted behavior called?
Ethics?
What concept in ethics that addresses the ethical issues and constraints that arise from the use of computers, and how they can be mitigated or prevented?
Computer Ethics
In what instance can a citizen’s right to privacy be invaded because public safety or order requires it?
When there is a lawful court order
What term describes the standards or codes of behavior expected of an individual by a group to which the individual belongs?
Ethics
What is/are one’s personal beliefs about what is right and wrong?
Morals
According to the Ethics Resource Center, which of the ff. is the most commonly observed form of employee misconduct?
Misuse of company time
What statement that highlights an organization’s key ethical issues and identifies the overaching values and principles that are important to the organization and its decision making?
Code of ethics
Which of the ff. is not a key goal of employee ethics training?
Become familiar with various philosophers and how they dealt with ethical issues.
Identifying the stakeholders and their positions on an issue is part of which decision making step?
Define the problem?
What is the mission of the Software & Information Industry Association and the Business Software Alliance?
Stop the unauthorized copying of software produced by its members
When can we say that the order of the court is lawful?
When the judge issues a search warrant based on personal determination of probable cause
What was declared void and unconstitutional under Section 12 of RA10175?
Real-Time collection of Traffic Data
What is the primary purpose of the Data Privacy Act?
To protect personal information
What constitutional provision ensures the inviolability of communication and correspondence?
Article III, Section 3 of the Constitution
What law protects individuals from unathorized interception of communication?
RA4200
Which law grants the individual the right to control their personal information collected by entities?
RA10173
What principle ensures the individuals are heard before being condemned?
Due process
What concept refers to the fradulent use of another person’s information?
Identity theft
What is the primary purpose of the Anti-Wiretapping Act?
To combat illegal wiretapping
What is the most prevalent means of obtaining personal information for identity theft?
Computer hacking and phishing
Professionals who breach the duty of care are liable for injuries that their negligence causes. What liability is commonly referred to?
Professional malpractice
What is the definition of not doing something that a reasonable person would do or not do?
Negligence
The crime of obtaining goods, services, or property through deception or trickery
Fraud
What buyers or lessees assure that a product meets certain standards of quality?
Warranty
What term refers to a clear representation or evidence of something?
Imputation
It refers to who violates copyright breaks laws that protects the rights of the creator of an original work.
Copyright infringement
What intentional or reckless alteration of computer data without right?
Data interference
It refers to listening to, recording, monitoring, or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.
Interception
It refers to who establishes maintains or controls, directly or indirectly, any operation from sexual activity or arousal with the aid of or through the use of a computer system, for favor or consideration.
Cybersex
What is the intentional input, alteration, or deletion of any computer data without right, resulting in inauthentic data intending to be considered or acted upon for legal purposes as if it were authentic?
Active Computer-Related Forgery
It is a type of website maintained by an individual with regular entries of commentary, description of events, or other material such as graphics or video.
Blog
It is a program whose source code is made available for use or modification, as users or other developers see fit.
Open source code
What is the process of taking something apart to understand it, build a copy of it, and improve it?
Reverse Engineering
The act of stealing someone’s ideas or words and passing them off as one’s own.
Plagiarism
Which software meets the needs of users?
Software quality
What terms refer to the ability of an individual or group of individuals to express their beliefs, thoughts, ideas, and emotions about different issues free from government censorship?
Freedom of expression
In a strategy to engineer quality software. What defines, measures, and refines the quality of the development process and products?
Quality management
It refers to the reproduction of the code and translation of the forms of a computer program to achieve the inter-operability of an independently created computer program with other programs may also constitute fair use.
Decompilation
It refers to any device or a group of interconnected or related devices, one or more of which is pursuant to a program, and performs automatic processing of data (have input, output, and storage).
Computer system
Which of the following types of work CANNOT be copyrighted?
Slogan
What term refers to intended or intending to do harm?
Malicious
How should a member ensure that the products of their work are used?
With the proper expertise available
What does the Ten Commandments of Computer Ethics emphasize regarding the use of proprietary software?
Copying software without permission
Why is a confidentiality clause important in a software contract?
Protects intellectual property
In relation to fellow members and the profession, what should a member not do?
Take credit for others' work without acknowledgment
What type of attack involves an attacker intercepting messages to gather information without altering them?
Passive attack
Which technology is placed in many devices to precisely locate users?
Global Positioning System (GPS) chips
What action should be taken by a member in regard to any illegal or unethical practices they come across?
Take appropriate action
What are the penalties for unauthorized processing of personal information according to the Data Privacy Act?
Ranging from P100,000 to P5,000,000 (approximately US$2,000 to US$100,000)
Which of the following statements about disclosure of confidential information is TRUE according to the preamble?
Disclosure of confidential information requires the consent of the involved parties, unless mandated by law
Which ability does ISOC emphasize that is crucial for the utility of the Internet as a platform for innovation, creativity, and economic opportunity?
Ability to connect
What does the Institute of Electrical and Electronics Engineering (IEEE) commit themselves to in their code of ethics?
Maintaining and improving technical competence
What should the contract specify regarding ownership of rights?
Legal rights passed to the client
Why might items not be eligible for patent protection
They are abstract ideas
What is the key tool for ensuring the confidentiality, integrity, and authenticity of electronic messages and online business transactions?
Data encryption
Which of the following is NOT mentioned as a basic security service?
Traffic Regulation
What is the difference between ethics, morals, and laws?
Morals are personal beliefs, ethics describe group behavior expectations, laws dictate rules of societyMorals are personal beliefs, ethics describe group behavior expectations, laws dictate rules of society
What is a characteristic of a successful ethics program according to the ERC?
Employees feel positive about the company's ethics program
What is a risk of not prioritizing good business ethics?
Facing legal consequences and unfavorable publicity
Which of the following relationships must IT professionals manage?
Suppliers, Employers, Other professionals
What is one ethical issue discussed regarding relationships between IT professionals and other professionals?
Resume inflation
Which organization represents the world’s largest software and hardware manufacturers?
Business Software Alliance (BSA)
What is the duty of care in IT professional malpractice cases?
Obligation to protect against unreasonable harm or risk
Who has the right to control personal information collected from individuals?
The person to whom the information belongs
What are the laws which prescribe the invasion of an individual’s privacy?
Anti-Money Laundering Law
When can we say that the order of the court is lawful?
The search warrant is issued by the judge after determining probable cause
What is the penalty for Cybersex offenses?
Fine of at least 200,000 to 1M.
What is included in types of software piracy?
Unauthorized copying of software.
What does virus dissemination refer to?
Attaching malicious software to other software.
Which type of hacker violates computer security for malicious reasons?
Black hat hacker
What is the consequence of email bombing?
Filling the allotted space on an e-mail server.
Which of the following is an example of an intellectual creation?
Painting made by a renowned artist
What is a vital role of an effective intellectual and industrial property system?
Facilitates Transfer of Technology
Which of the following is NOT one of the bases of the guarantee of the right of freedom of expression?
Preserving honor at all costs
Which article of the Revised Penal Code provides a definition of libel?
Article 353
Which of the following is an example of fair use of copyright material?
Using short excerpts for educational purposes
What are the elements required for an invention to be patentable?
Technical solution, novelty, inventive steps, and industrial applicability
What is the term used to describe works of the mind that are distinct and “owned” or created by a person or group?
Intellectual Property
What is the process of taking something apart to understand, build a copy, or improve it?
Reverse Engineering
Which of the following is NOT a type of trademark?
Inventor
What is the main goal of Failure mode and effects analysis (FMEA)?
To identify potential design and process failures early in a project
What is the purpose of the Capability Maturity Model Integration for Software?
To assess and improve software development practices
Why is software quality assurance (QA) important in the development cycle?
To guarantee the software's reliable operation
In relation to fellow members and the profession, what should a member not do?
Take credit for others' work without acknowledgment
What is the purpose of the Fair Use Doctrine?
To balance the rights of copyright holders with public interest
How are fines and imprisonment related to copyright infringement?
Both fines and imprisonment can be imposed
What does decompilation of a computer program involve?
Extracting and understanding the program's code for compatibility
What does email spoofing involve?
Altering the email header.
What is the most common form of intellectual property for distinguishing goods or services?
Trademark
Who owns the copyright for a work created during employment?
The employee, if it's not part of regular duties
Are computer programs generally considered trade secrets?
It depends on the program's complexity