My Reviewer #143143143

0.0(0)
Studied by 125 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/93

flashcard set

Earn XP

Description and Tags

PNP CHIEF OF POLICE

Last updated 6:35 PM on 5/11/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

94 Terms

1
New cards

If you find yourself rationalizing a decision with the statement “Well, our competitiors are doing something far worse”. What action should you not take?

Drop this option and implement the same policy as your competitors

2
New cards

What rights does a prisoner have regarding privacy?

The right to absolute privacy

3
New cards

What is a set of rules that establishes boundaries of generally accepted behavior called?

Ethics?

4
New cards

What concept in ethics that addresses the ethical issues and constraints that arise from the use of computers, and how they can be mitigated or prevented?

Computer Ethics

5
New cards

In what instance can a citizen’s right to privacy be invaded because public safety or order requires it?

When there is a lawful court order

6
New cards

What term describes the standards or codes of behavior expected of an individual by a group to which the individual belongs?

Ethics

7
New cards

What is/are one’s personal beliefs about what is right and wrong?

Morals

8
New cards

According to the Ethics Resource Center, which of the ff. is the most commonly observed form of employee misconduct?

Misuse of company time

9
New cards

What statement that highlights an organization’s key ethical issues and identifies the overaching values and principles that are important to the organization and its decision making?

Code of ethics

10
New cards

Which of the ff. is not a key goal of employee ethics training?

Become familiar with various philosophers and how they dealt with ethical issues.

11
New cards

Identifying the stakeholders and their positions on an issue is part of which decision making step?

Define the problem?

12
New cards

What is the mission of the Software & Information Industry Association and the Business Software Alliance?

Stop the unauthorized copying of software produced by its members

13
New cards

When can we say that the order of the court is lawful?

When the judge issues a search warrant based on personal determination of probable cause

14
New cards

What was declared void and unconstitutional under Section 12 of RA10175?

Real-Time collection of Traffic Data

15
New cards

What is the primary purpose of the Data Privacy Act?

To protect personal information

16
New cards

What constitutional provision ensures the inviolability of communication and correspondence?

Article III, Section 3 of the Constitution

17
New cards

What law protects individuals from unathorized interception of communication?

RA4200

18
New cards

Which law grants the individual the right to control their personal information collected by entities?

RA10173

19
New cards

What principle ensures the individuals are heard before being condemned?

Due process

20
New cards

What concept refers to the fradulent use of another person’s information?

Identity theft

21
New cards

What is the primary purpose of the Anti-Wiretapping Act?

To combat illegal wiretapping

22
New cards

What is the most prevalent means of obtaining personal information for identity theft?

Computer hacking and phishing

23
New cards

Professionals who breach the duty of care are liable for injuries that their negligence causes. What liability is commonly referred to?

Professional malpractice

24
New cards

What is the definition of not doing something that a reasonable person would do or not do?

Negligence

25
New cards

The crime of obtaining goods, services, or property through deception or trickery

Fraud

26
New cards
27
New cards

What buyers or lessees assure that a product meets certain standards of quality?

Warranty

28
New cards

What term refers to a clear representation or evidence of something?

Imputation

29
New cards

It refers to who violates copyright breaks laws that protects the rights of the creator of an original work.

Copyright infringement

30
New cards

What intentional or reckless alteration of computer data without right?

Data interference

31
New cards

It refers to listening to, recording, monitoring, or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.

Interception

32
New cards

It refers to who establishes maintains or controls, directly or indirectly, any operation from sexual activity or arousal with the aid of or through the use of a computer system, for favor or consideration.

Cybersex

33
New cards

What is the intentional input, alteration, or deletion of any computer data without right, resulting in inauthentic data intending to be considered or acted upon for legal purposes as if it were authentic?

Active Computer-Related Forgery

34
New cards

It is a type of website maintained by an individual with regular entries of commentary, description of events, or other material such as graphics or video.

Blog

35
New cards

It is a program whose source code is made available for use or modification, as users or other developers see fit.

Open source code

36
New cards

What is the process of taking something apart to understand it, build a copy of it, and improve it?

Reverse Engineering

37
New cards

The act of stealing someone’s ideas or words and passing them off as one’s own.

Plagiarism

38
New cards

 Which software meets the needs of users?

Software quality

39
New cards

What terms refer to the ability of an individual or group of individuals to express their beliefs, thoughts, ideas, and emotions about different issues free from government censorship?

Freedom of expression

40
New cards

In a strategy to engineer quality software. What defines, measures, and refines the quality of the development process and products?

Quality management

41
New cards

It refers to the reproduction of the code and translation of the forms of a computer program to achieve the inter-operability of an independently created computer program with other programs may also constitute fair use.

Decompilation

42
New cards

It refers to any device or a group of interconnected or related devices, one or more of which is pursuant to a program, and performs automatic processing of data (have input, output, and storage).

Computer system

43
New cards

Which of the following types of work CANNOT be copyrighted?

Slogan

44
New cards

What term refers to intended or intending to do harm?

Malicious

45
New cards

How should a member ensure that the products of their work are used?

With the proper expertise available

46
New cards

What does the Ten Commandments of Computer Ethics emphasize regarding the use of proprietary software?

Copying software without permission

47
New cards

Why is a confidentiality clause important in a software contract?

Protects intellectual property

48
New cards

In relation to fellow members and the profession, what should a member not do?

Take credit for others' work without acknowledgment

49
New cards

What type of attack involves an attacker intercepting messages to gather information without altering them?

Passive attack

50
New cards

Which technology is placed in many devices to precisely locate users?

Global Positioning System (GPS) chips

51
New cards

What action should be taken by a member in regard to any illegal or unethical practices they come across?

Take appropriate action

52
New cards

What are the penalties for unauthorized processing of personal information according to the Data Privacy Act?

Ranging from P100,000 to P5,000,000 (approximately US$2,000 to US$100,000)

53
New cards

Which of the following statements about disclosure of confidential information is TRUE according to the preamble?

Disclosure of confidential information requires the consent of the involved parties, unless mandated by law

54
New cards

Which ability does ISOC emphasize that is crucial for the utility of the Internet as a platform for innovation, creativity, and economic opportunity?

Ability to connect

55
New cards

What does the Institute of Electrical and Electronics Engineering (IEEE) commit themselves to in their code of ethics?

Maintaining and improving technical competence

56
New cards

What should the contract specify regarding ownership of rights?

Legal rights passed to the client

57
New cards

Why might items not be eligible for patent protection

They are abstract ideas

58
New cards

What is the key tool for ensuring the confidentiality, integrity, and authenticity of electronic messages and online business transactions?

Data encryption

59
New cards

Which of the following is NOT mentioned as a basic security service?

Traffic Regulation

60
New cards

What is the difference between ethics, morals, and laws?

Morals are personal beliefs, ethics describe group behavior expectations, laws dictate rules of societyMorals are personal beliefs, ethics describe group behavior expectations, laws dictate rules of society

61
New cards

What is a characteristic of a successful ethics program according to the ERC?

Employees feel positive about the company's ethics program

62
New cards

What is a risk of not prioritizing good business ethics?

Facing legal consequences and unfavorable publicity

63
New cards

Which of the following relationships must IT professionals manage?

Suppliers, Employers, Other professionals

64
New cards

What is one ethical issue discussed regarding relationships between IT professionals and other professionals?

Resume inflation

65
New cards

Which organization represents the world’s largest software and hardware manufacturers?

Business Software Alliance (BSA)

66
New cards

What is the duty of care in IT professional malpractice cases?

Obligation to protect against unreasonable harm or risk

67
New cards

Who has the right to control personal information collected from individuals?

The person to whom the information belongs

68
New cards

What are the laws which prescribe the invasion of an individual’s privacy?

Anti-Money Laundering Law

69
New cards

When can we say that the order of the court is lawful?

The search warrant is issued by the judge after determining probable cause

70
New cards

What is the penalty for Cybersex offenses?

Fine of at least 200,000 to 1M.

71
New cards

What is included in types of software piracy?

Unauthorized copying of software.

72
New cards

What does virus dissemination refer to?

Attaching malicious software to other software.

73
New cards

Which type of hacker violates computer security for malicious reasons?

Black hat hacker

74
New cards

What is the consequence of email bombing?

Filling the allotted space on an e-mail server.

75
New cards

Which of the following is an example of an intellectual creation?

Painting made by a renowned artist

76
New cards

What is a vital role of an effective intellectual and industrial property system?

Facilitates Transfer of Technology

77
New cards

Which of the following is NOT one of the bases of the guarantee of the right of freedom of expression?

Preserving honor at all costs

78
New cards

Which article of the Revised Penal Code provides a definition of libel?

Article 353

79
New cards

Which of the following is an example of fair use of copyright material?

Using short excerpts for educational purposes

80
New cards

What are the elements required for an invention to be patentable?

Technical solution, novelty, inventive steps, and industrial applicability

81
New cards

What is the term used to describe works of the mind that are distinct and “owned” or created by a person or group?

Intellectual Property

82
New cards

What is the process of taking something apart to understand, build a copy, or improve it?

Reverse Engineering

83
New cards

Which of the following is NOT a type of trademark?

Inventor

84
New cards

What is the main goal of Failure mode and effects analysis (FMEA)?

To identify potential design and process failures early in a project

85
New cards

What is the purpose of the Capability Maturity Model Integration for Software?

To assess and improve software development practices

86
New cards

Why is software quality assurance (QA) important in the development cycle?

To guarantee the software's reliable operation

87
New cards

In relation to fellow members and the profession, what should a member not do?

Take credit for others' work without acknowledgment

88
New cards

What is the purpose of the Fair Use Doctrine?

To balance the rights of copyright holders with public interest

89
New cards

How are fines and imprisonment related to copyright infringement?

Both fines and imprisonment can be imposed

90
New cards

What does decompilation of a computer program involve?

Extracting and understanding the program's code for compatibility

91
New cards

What does email spoofing involve?

Altering the email header.

92
New cards

What is the most common form of intellectual property for distinguishing goods or services?

Trademark

93
New cards

Who owns the copyright for a work created during employment?

The employee, if it's not part of regular duties

94
New cards

Are computer programs generally considered trade secrets?

It depends on the program's complexity

Explore top notes

note
Chapter 22: Chemical Bonds
Updated 1029d ago
0.0(0)
note
12-01: Polynomial Functions
Updated 557d ago
0.0(0)
note
Invisible Man Chapter 25
Updated 1152d ago
0.0(0)
note
Electricity in the Home
Updated 1251d ago
0.0(0)
note
Prehistory
Updated 1395d ago
0.0(0)
note
Chapter 4 - English Colonization
Updated 1272d ago
0.0(0)
note
The Civil War DEUS
Updated 418d ago
0.0(0)
note
Breathing and Exchange of Gases
Updated 889d ago
0.0(0)
note
Chapter 22: Chemical Bonds
Updated 1029d ago
0.0(0)
note
12-01: Polynomial Functions
Updated 557d ago
0.0(0)
note
Invisible Man Chapter 25
Updated 1152d ago
0.0(0)
note
Electricity in the Home
Updated 1251d ago
0.0(0)
note
Prehistory
Updated 1395d ago
0.0(0)
note
Chapter 4 - English Colonization
Updated 1272d ago
0.0(0)
note
The Civil War DEUS
Updated 418d ago
0.0(0)
note
Breathing and Exchange of Gases
Updated 889d ago
0.0(0)

Explore top flashcards

flashcards
Spanish 3 Ch7 Vocab
48
Updated 1111d ago
0.0(0)
flashcards
PNS Exam 1
241
Updated 214d ago
0.0(0)
flashcards
APUSH Easy Test Unit 7
29
Updated 880d ago
0.0(0)
flashcards
Unit 3 Stats Vocab
29
Updated 517d ago
0.0(0)
flashcards
Med Term Chap 5 (terms to know)
51
Updated 1236d ago
0.0(0)
flashcards
HPS Atsonomy (Unit 9)
44
Updated 1032d ago
0.0(0)
flashcards
Spanish 3 Ch7 Vocab
48
Updated 1111d ago
0.0(0)
flashcards
PNS Exam 1
241
Updated 214d ago
0.0(0)
flashcards
APUSH Easy Test Unit 7
29
Updated 880d ago
0.0(0)
flashcards
Unit 3 Stats Vocab
29
Updated 517d ago
0.0(0)
flashcards
Med Term Chap 5 (terms to know)
51
Updated 1236d ago
0.0(0)
flashcards
HPS Atsonomy (Unit 9)
44
Updated 1032d ago
0.0(0)