RFBT.3810: E-COMMERCE ACT MC QUESTIONS (RA 8792)

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

The E-commerce Law aims to facilitate domestic and international dealings, transactions, arrangements, agreements, contracts and exchanges and storage of information through the utilization of electronic, optical and similar medium, mode, instrumentality and technology to recognize the authenticity and _______ of electronic data messages or electronic documents related to such activities and to promote the universal use of electronic transaction in the government and by the general public.

a. Confidentiality

b. Accessibility

c. Validity

d. Reliability

d. Reliability

2
New cards

It refers to a person by whom, or on whose behalf, the electronic document purports to have been created, generated and/or sent. The term does not include a person acting as an intermediary with respect to that electronic document.

a. Data subject

b. Originator

c. Addressee

d. Intermediary

b. Originator

3
New cards

The E-Commerce law expressly provides that for evidentiary purposes, an electronic document shall be the ______________ under existing laws.

a. equivalent of the public document

b. equivalent of a registered document

c. exact duplicate of a notarized document

d. functional equivalent of a document in writing

d. functional equivalent of a document in writing

4
New cards

Authorities and parties with the legal right can only gain access to electronic documents, electronic data messages, and electronic data messages, and electronic signatures. For confidentiality purposes, it shall not share or convey to any other person.

a. Obligation of Reliability

b. Obligation of Confidentiality

c. Obligation of Authenticity

d. Obligation of Security

b. Obligation of Confidentiality

5
New cards

Hacking or ________ refers to the unauthorized access into or interference in a computer system / server or information and communication system; or any access in order to corrupt, alter, seal, or destroy using a computer or other similar information and communication devices, without the knowledge and consent of the owner of the computer or information and communications system, including the introduction of computer viruses and the like, resulting in the corruption, destruction, alteration, theft or loss of electronic data messages or electronic document.

a. Blocking

b. Erasure

c. Cracking

d. Piracy

e. Interference

c. Cracking

6
New cards

The following are essential features of the E- Commerce Law, except:

a. Legal recognition of electronic documents

b. Use in transactions involving carriage of goods

c. Admissibility as evidence

d. Permanent insurance fund

e. Electronic transactions in government

d. Permanent insurance fund

7
New cards

This refers to information generated, sent, received or stored by electronic, optical or similar means.

a. Electronic document

b. Electronic signature

c. Electronic data message

d. Electronic contract

c. Electronic data message

8
New cards

Electronic transactions made through networking among banks is deemed consummated upon:

a. receipt of the email confirmation about the transaction.

b. sending the confirmation code to the bank.

c. the actual dispensing of cash or the debit of one account and the corresponding credit to another.

d. placing of electronic signature in the electronic document.

c. the actual dispensing of cash or the debit of one account and the corresponding credit to another.

9
New cards

I. Another term for hacking is cracking.

II. The introduction of computer viruses is also categorized as hacking.

a. Both statements are correct.

b. Both statements are incorrect.

c. Statement I is correct while statement II is incorrect.

d. Statement I is incorrect while statement II is correct.

a. Both statements are correct.

10
New cards

It is the unauthorized copying, reproduction, alteration and importation of protected material.

a. Photocopying

b. Cracking

c. Piracy

d. Hacking

c. Piracy

11
New cards

The following are the illegal activities under E Commerce Act except:

a. Hacking

b. Photocopying

c. Piracy

d. Violation of the Consumer Act

b. Photocopying

12
New cards

The unauthorized copying, reproduction, dissemination, distribution of protected material, electronic signature or copyrighted works including legally protected sound recordings or phonograms or information material on protected works, through the use of telecommunication networks.

a. Hacking

b. Infringement

c. Piracy

d. Forgery

c. Piracy

13
New cards

I. Another term for hacking is cracking.

II. The introduction of computer viruses is also categorized as hacking.

a. Both statements are correct.

b. Both statements are incorrect.

c. Statement I is correct while statement II is incorrect.

d. Statement I is incorrect while statement II is correct.

a. Both statements are correct.

14
New cards

I. Another term for hacking is cracking.

II. The introduction of computer viruses is considered as hacking.

a. Both statements are correct.

b. Both statements are incorrect.

c. Only statement 1 is correct.

d. Only statement 2 is correct.

a. Both statements are correct.

15
New cards

It refers to information generated, sent, received or stored by electronic, optical or similar means.

a. Electronic Message

b. Electronic Key

c. Electronic Data Message

d. Electronic Generator

c. Electronic Data Message

16
New cards

I. The electronic signature shall not be presumed to be the signature of the person to whom it correlates.

II. The electronic signature is presumed to be affixed by that person with the intention of signing or approving the electronic document unless the person relying on the electronically signed electronic document knows or has noticed of defects in or unreliability of the signature or reliance on the electronic signature is not reasonable under the circumstances.

a. Both statements are correct.

b. Both statements are incorrect.

c. Only statement 1 is correct.

d. Only statement 2 is correct.

d. Only statement 2 is correct.

17
New cards

The following are agencies that are empowered to enforce the provisions of E-Commerce law, except:

a. DTI

b. BSP

c. COA

d. None of the above

c. COA

18
New cards

It refers to a person who in behalf of another person and with respect to a particular electronic document sends, receives and/or stores provides other services in respect of that electronic data message or electronic document.

a. Intermediary

b. Middleman

c. Agent

d. Authorized representative

a. Intermediary

19
New cards

Which of the following statements is not correct?

a. Where the law requires a document to be in writing, that requirement is met by an electronic document whether or not it can be authenticated.

b. Information shall not be denied legal effect, validity or enforceability solely on the grounds that it is in the data message.

c. Electronic documents shall have the legal effect, validity or enforceability as any other document or legal writing.

d. The electronic document can be denied if it appears to be incomplete and altered.

a. Where the law requires a document to be in writing, that requirement is met by an electronic document whether or not it can be authenticated.

20
New cards

Which of the following presumptions relating to electronic signatures is not correct?

a. The electronic signature is the signature of the person to whom it correlates.

b. The person who has knowledge of the defects in or unreliability of the signature may rely on the electronically signed electronic document.

c. The person who affixed the electronic signature has approved the electronic document.

d. The electronic signature was affixed by that said person.

b. The person who has knowledge of the defects in or unreliability of the signature may rely on the electronically signed electronic document.