1/12
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
The E-commerce Law aims to facilitate domestic and international dealings, transactions, arrangements, agreements, contracts and exchanges and storage of information through the utilization of electronic, optical and similar medium, mode, instrumentality and technology to recognize the authenticity and _______ of electronic data messages or electronic documents related to such activities and to promote the universal use of electronic transaction in the government and by the general public.
a. Confidentiality
b. Accessibility
c. Validity
d. Reliability
d. Reliability
It refers to a person by whom, or on whose behalf, the electronic document purports to have been created, generated and/or sent. The term does not include a person acting as an intermediary with respect to that electronic document.
a. Data subject
b. Originator
c. Addressee
d. Intermediary
b. Originator
The E-Commerce law expressly provides that for evidentiary purposes, an electronic document shall be the _______________________ under existing laws.
a. equivalent of the public document
b. equivalent of a registered document
c. exact duplicate of a notarized document
d. functional equivalent of a document in writing
d. functional equivalent of a document in writing
Authorities and parties with the legal right can only gain access to electronic documents, electronic data messages, and electronic data messages, and electronic signatures. For confidentiality purposes, it shall not share or convey to any other person.
a. Obligation of Reliability
b. Obligation of Confidentiality
c. Obligation of Authenticity
d. Obligation of Security
b. Obligation of Confidentiality
Hacking or ________ refers to the unauthorized access into or interference in a computer system / server or information and communication system; or any access in order to corrupt, alter, seal, or destroy using a computer or other similar information and communication devices, without the knowledge and consent of the owner of the computer or information and communications system, including the introduction of computer viruses and the like, resulting in the corruption, destruction, alteration, theft or loss of electronic data messages or electronic document.
a. Blocking
b. Erasure
c. Cracking
d. Piracy
e. Interference
c. Cracking
he following are essential features of the E- Commerce Law, except:
a. Legal recognition of electronic documents
b. Use in transactions involving carriage of goods
c. Admissibility as evidence
d. Permanent insurance fund
e. Electronic transactions in government
d. Permanent insurance fund
This refers to information generated, sent, received or stored by electronic, optical or similar means.
a. Electronic document
b. Electronic signature
c. Electronic data message
d. Electronic contract
c. Electronic data message
Electronic transactions made through networking among banks is deemed consummated upon:
a. receipt of the email confirmation about the transaction.
b. sending the confirmation code to the bank.
c. the actual dispensing of cash or the debit of one account and the corresponding credit to another.
d. placing of electronic signature in the electronic document.
c. the actual dispensing of cash or the debit of one account and the corresponding credit to another.
I. Another term for hacking is cracking.
II. The introduction of computer viruses is also categorized as hacking.
a. Both statements are correct.
b. Both statements are incorrect.
c. Statement I is correct while statement II is incorrect.
d. Statement I is incorrect while statement II is correct.
a. Both statements are correct.
It is the unauthorized copying, reproduction, alteration and importation of protected material.
a. Photocopying
b. Cracking
c. Piracy
d. Hacking
c. Piracy
The following are the illegal activities under ECommerce Act except:
a. Hacking
b. Photocopying
c. Piracy
d. Violation of the Consumer Act
b. Photocopying
The unauthorized copying, reproduction, dissemination, distribution of protected material, electronic signature or copyrighted works including legally protected sound recordings or phonograms or information material on protected works, through the use of telecommunication networks.
a. Hacking
b. Infringement
c. Piracy
d. Forgery
c. Piracy
I. Another term for hacking is cracking.
II. The introduction of computer viruses is also categorized as hacking.
a. Both statements are correct.
b. Both statements are incorrect.
c. Statement I is correct while statement II is incorrect.
d. Statement I is incorrect while statement II is correct.
a. Both statements are correct.