SPI Finals Reviewer

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/118

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:14 PM on 4/21/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

119 Terms

1
New cards

Ethics

A set of beliefs about right and wrong behavior. It acts as a gauge of personal integrity and the basis of trust and cooperation.

2
New cards

Morality

Social conventions about right and wrong that are widely shared.

3
New cards

Virtues

Habits that incline people to do what is acceptable.

4
New cards

Vices

Habits of unacceptable behavior.

5
New cards

Value System

A scheme of moral values.

6
New cards

Integrity

A cornerstone of ethical behavior; acting in accordance with a personal code of principles.

7
New cards

Computer Ethics

A concept in ethics that addresses the ethical issues and constraints that arise from the use of computers, and how they can be mitigated or prevented.

8
New cards

Corporate Ethics Officer

A senior-level manager who provides vision and direction in the area of business conduct.

9
New cards

Code of Ethics

A statement that highlights an organization's key ethical issues and identifies overarching values and principles important to the organization.

10
New cards

Social Audit

A process that identifies ethical lapses committed in the past and sets directives for avoiding similar missteps in the future.

11
New cards

Profession

A calling that requires specialized knowledge and long, intensive academic preparation.

12
New cards

Software Piracy

The act of illegally making copies of software or enabling others to access software to which they are not entitled.

13
New cards

Trade Secret

Information used in a business that is generally unknown to the public, which the company takes strong measures to keep confidential.

14
New cards

Whistle-Blowing

Attracting attention to a negligent, illegal, unethical, abusive, or dangerous act that threatens the public interest.

15
New cards

Fraud

The crime of obtaining goods, services, or property through deception or trickery.

16
New cards

Breach of Contract

When one party fails to meet the terms of an agreed-upon contract.

17
New cards

Bribery

Providing money, property, or favors to someone in business or government to obtain a business advantage.

18
New cards

IT User

A person for whom a hardware or software product is designed.

19
New cards

Negligence

Not doing something that a reasonable person would do, or doing something that a reasonable person would not do.

20
New cards

Duty of Care

The obligation to protect people against any unreasonable harm or risk.

21
New cards

Right of Privacy

The right to be left alone; the right of individuals to control the collection and use of information about themselves.

22
New cards

Identity Theft

A type of consumer fraud that occurs when a person knowingly uses another person's information in a fraudulent manner to obtain goods, services, or credit.

23
New cards

Due Process

A law which hears before it condemns, proceeds upon inquiry, and renders judgment only after trial.

24
New cards

Blog

A type of website maintained by an individual with regular entries of commentary, description of events, or other material.

25
New cards

Libel

A published defamation. Cyber libel refers to acts of libel committed through a computer system or similar means.

26
New cards

Cybercrime

Any illegal or criminal activity done using computers and the Internet (e.g., hacking, child pornography, phishing).

27
New cards

Hack (verb)

To write program code or to modify a program, often in an unauthorized manner, by changing the code itself.

28
New cards

Hacker

Someone who seeks and exploits weaknesses in a computer or computer network.

29
New cards

White Hat Hacker

An ethical hacker who breaks security for non-malicious reasons to test systems.

30
New cards

Black Hat Hacker

A hacker who violates computer security for maliciousness or personal gain.

31
New cards

Email Spoofing

Forging an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.

32
New cards

Cyber Stalking

Repeated acts of harassment or threatening behavior of a cybercriminal towards a victim using Internet services.

33
New cards

Denial of Service (DoS) Attack

An act that floods the bandwidth of a victim's network or email, bringing the network to its knees and depriving them of standard services.

34
New cards

Email Spamming

Emails sent in bulk (mass mailing) to unsolicited recipients where the sender's identity is concealed.

35
New cards

Email Bombing

Sending a massive amount of e-mail to a specific person or system to crash the server.

36
New cards

Program

A set of instructions expressed in words, codes, or schemes capable of performing a particular task when read by a computer.

37
New cards

Trademark

Any visible sign, logo, or phrase capable of distinguishing the goods or services of an enterprise.

38
New cards

Copyright

Rights granted to creators of original literary and artistic works to distribute, display, perform, or reproduce their work.

39
New cards

Fair Use Doctrine

Factors considered when evaluating the legal, unpermitted use of copyrighted material.

40
New cards

Copyright Infringement

Copying a substantial and material part of another’s copyrighted work without permission.

41
New cards

Patent

A grant of property rights to inventors for any technical solution that is new, involves an inventive step, and is industrially applicable.

42
New cards

Plagiarism

The theft and passing off of someone's ideas or words as one's own.

43
New cards

Reverse Engineering

The process of taking something apart (like code) in order to understand it, build a copy, or improve it.

44
New cards

Open Source Code

Program source code made available for use or modification as users or developers see fit.

45
New cards

Competitive Intelligence

Gathering legally obtainable information to help a company gain an advantage over rivals.

46
New cards

Cybersquatting

Registering domain names of famous trademarks or companies in hopes of selling them back to the original owners for a large sum of money.

47
New cards

Software Defect

An error or flaw that could cause a system to fail to meet users' needs.

48
New cards

Software Quality

The degree to which software meets the needs of users.

49
New cards

Quality Management

How to define, measure, and refine the quality of the development process and products.

50
New cards

Product Liability

The liability of manufacturers, sellers, and lessors for injuries caused by defective products.

51
New cards

Strict Liability

The defendant is held responsible for an injury regardless of negligence or intent.

52
New cards

Software Development Methodology

A work process that defines activities, responsibilities, and techniques for accomplishing various stages of development.

53
New cards

Black-Box Testing

Testing where the tester has no knowledge of the code.

54
New cards

White-Box Testing

Testing all possible logic paths through the software unit with thorough knowledge of the logic.

55
New cards

Safety-Critical System

A system whose failure may cause injury or death (e.g., antilock brakes, nuclear reactors).

56
New cards

Software Contracts

Agreements setting out the aims, deliverables, intellectual property rights, and termination conditions between a client and a software house.

57
New cards

Data Privacy Act of 2012 (DPA)

An act protecting individual personal information in information and communications systems in the government and private sector in the Philippines.

58
New cards

Cryptography

The science of encoding messages so only the sender and intended receiver can understand them.

59
New cards

Encryption

The process of converting electronic messages into a form understood only by the intended recipients.

60
New cards

Phishing

Tricking users into entering sensitive personal information on a counterfeit website.

61
New cards

Spyware

Keystroke-logging software that enables the capture of account usernames, passwords, and credit card numbers.

62
New cards

Cookies

Text files that a website puts on a user's hard drive so it can remember them later.

63
New cards

Computer Security

Tools and mechanisms used to protect data in a computer and protect the information system itself from malicious behavior.

64
New cards

Authentication

The assurance that the communicating entity is the one it claims to be.

65
New cards

Access Control

The prevention of the unauthorized use of a resource.

66
New cards

Data Confidentiality

Protection of data from unauthorized disclosure (eavesdropping).

67
New cards

Data Integrity

The assurance that data received is exactly as sent by an authorized sender (no unauthorized modification).

68
New cards

Non-Repudiation

Protection against denial by one of the parties in a communication that a message was sent or received.

69
New cards

Data-Related Failure

When a computerized system fails because the wrong data is entered into it, or because people incorrectly interpret the data they retrieve.

70
New cards

Software Error Malfunctions

Failures that occur due to an error in a system's programming, even when the correct data is fed into the system.

71
New cards

Socrates' Definition of Ethics

According to the ancient Greek philosopher Socrates, ethics is the "investigation of life". It is a practical science dealing with the morality of human actions and studying human conduct to determine what is right or wrong.

72
New cards

Virtue Ethics Approach

A philosophical theory where the ethical choice is the one that best reflects moral virtues in yourself and your community.

73
New cards

Utilitarian Approach

A philosophical theory where the ethical choice is the one that produces the greatest excess of benefits over harm.

74
New cards

Fairness Approach

A philosophical theory where the ethical choice treats everyone the same and shows no favoritism or discrimination.

75
New cards

Common Good Approach

A philosophical theory where the ethical choice is the one that advances the common good.

76
New cards

7-Step Approach

A recommended method or process to ensure ethical decision-making in business and IT.

77
New cards

RA 8293 (Intellectual Property Code of the Philippines)

The law that governs the protection of copyrights, trademarks, geographic indications, industrial designs, and patents.

78
New cards

RA 10175 (Cybercrime Prevention Act)

The law addressing crimes committed via computers. Section 4(c)(4) specifically defines and penalizes Cyber Libel.

79
New cards

RA 10173 (Data Privacy Act of 2012)

The act protecting individual personal information in information and communications systems in the government and private sector.

80
New cards

Prevention (Information Security)

Taking measures to prevent your assets from being damaged or stolen (e.g., locks, firewalls, encryption).

81
New cards

Detection (Information Security)

Taking measures so you can detect when, how, and by whom an asset has been damaged (e.g., burglar alarms, missing items, unauthorized transactions).

82
New cards

Reaction (Information Security)

Taking measures so you can recover your assets (e.g., calling the police, replacing items, disputing a credit card charge).

83
New cards

"Good Enough Security"

A concept by Martin Hellman stating that "Everything should be as secure as necessary, but not securer." If security is too clumsy or hard to use, people will bypass it.

84
New cards

Disenfranchised Voters (Florida 2000)

Thousands of voters were disqualified from the general election because incorrect records in a voter database wrongly identified them as felons.

85
New cards

False Arrests (Name Mix-up)

Innocent people like Sheila Jackson Stossier and Roberto Hernandez were arrested and forced to spend days in jail simply because they were mistaken for criminals with similar names in poorly managed databases.

86
New cards

Terry Dean Rogan

Arrested five times (three times at gunpoint) because someone stole his identity and committed crimes under his name.

87
New cards

The Clause Section (Software Contracts)

Mentions exactly what is to be produced, referring to a requirements specification document.

88
New cards

Arbitration Clause

An agreement that if a dispute cannot be resolved between the two parties, they will accept the decision of an independent, third-party arbitrator.

89
New cards

Inflation Clause

Protects the software supplier in lengthy projects by allowing charges to be increased in accordance with the rise in economic costs.

90
New cards

Applicable Law Clause

Determines which jurisdiction's legal laws the contract is interpreted under (crucial if the client and software house are in different countries).

91
New cards

High-Quality Software Systems

Systems that operate safely and dependably and have a high degree of availability, often required in critical fields like air traffic control and healthcare.

92
New cards

Warranty

An assurance to buyers or lessees that a product meets certain standards of quality.

93
New cards

Capability Maturity Model Integration (CMMI)

A process improvement approach that defines five levels of software development maturity to improve quality.

94
New cards

Reliability

The probability of a component or system performing without failure over its product life.

95
New cards

AITP Code of Ethics

An acknowledgment of an IT professional's obligations to management, fellow members, society, employer, college/university, and country.

96
New cards

Standards of Conduct

Specific statements of behavior that expand on the Code of Ethics, representing strict rules that no true professional will violate.

97
New cards

IEEE Code of Ethics

A pledge by members to commit to the highest ethical conduct, including accepting responsibility for public safety, avoiding conflicts of interest, and rejecting bribery.

98
New cards

ISOC Core Values

The core principles of the Internet Society, which include improving the quality of life, fostering informed individuals, promoting innovation, ensuring open processes, and opposing excessively restrictive controls.

99
New cards

Specification

A document setting out the detailed requirements of the client for the software being produced.

100
New cards

Intellectual Property Rights

Intangible rights (like ownership of design or code) that must be explicitly addressed in the contract to define whether they pass to the client or remain with the software house.