暗記メーカー
ログイン
IT- Digital Law and Ethics in Business
  • Anndrea S. Galupo

  • 問題数 53 • 11/25/2023

    記憶度

    完璧

    7

    覚えた

    21

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    Where does the Ten Commandments of Computer ethics were created?

    WASHINGTON, D.C

  • 2

    It is often used to describe the act of stalking a person online, such as by repeatedly sending them unwanted messages or using the internet to track their location.

    CYBERSTALKING

  • 3

    It can be defined as the legal rights and restrictions governing technology use or an electronic responsibility for actions and deeds. In other words, it refers to what you are and are not allowed to do while using the Internet.

    DIGITAL LAW

  • 4

    It remains the largest and most popular social network, with 2 billion people using the platform daily, as of Feb 1, 2023

    FACEBOOK

  • 5

    It is the act of posting false information about another person online with the intent of causing emotional distress or harm. It is often used to describe the posting of false information about a person in a public forum, such as a social media page, with the intent of causing emotional distress to the person.

    ONLINE LIBEL/ SLANDER

  • 6

    These are designed to make a website or other online service unavailable or unusable to other users. This is often accomplished by flooding a website with requests, causing it to slow down or crash.

    DENIAL OF SERVICE (DOS)

  • 7

    Which is the third country who has the highest rate of cyber crime?

    INDIA

  • 8

    Cyberattacks involving these are illegal methods of using the internet to exploit people for sexual exploitation or labor.

    DISTRIBUTION OF CHILD PORNOGRAPHY/ HUMAN TRAFFICKING

  • 9

    It is responsible for the implementation of the law and the registration of applications for trademark, patent, utility model, industrial design, and patent cooperation treaty applications.

    INTELLECTUAL PROPERTY OFFICE (IPO)

  • 10

    These kinds of computer crime are committed against a single individual, what type of cybercrime is this?

    INDIVIDUAL

  • 11

    It is committed by a government or some other type of institutional organization

    STATE-SPONSORED CYBERCRIME

  • 12

    Which country has the highest rate of cybercrime?

    UNITED STATES

  • 13

    It is the act of using the internet to cause harm and damage, often in a way that causes mass panic or fear

    CYBERTERRORISM

  • 14

    It is short for “malicious software,” which is a term used to describe programs designed to cause harm.

    MALWARE

  • 15

    These types of internet crimes are committed against a government, including the federal government, state governments, and local governments. What type of cybercrime is this?

    GOVERNMENT

  • 16

    It is the act of damaging a person's computer through malicious software. This can include disabling systems, causing files to become corrupted, stealing confidential information, and even causing a system to crash.

    COMPUTER VANDALISM

  • 17

    They are the moral codes that guide technology- enabled decisions, and the associated behavior and responses, within the organization.

    DIGITAL ETHICS

  • 18

    People should be able to access the Internet regardless of their income, their geographical location or their disabilities. The UN Human Rights Council recognizes in a report that the right of access is essential to freedom of opinion and cities such as Mexico City already have programs to establish a free internet network.

    UNIVERSAL AND EQUAL ACCESS

  • 19

    It encompasses all activities on the Internet that abide by the laws of society.

    ETHICAL USE

  • 20

    It is using a website or domain name similar to a person's or company name to dupe people into thinking it is them. This often occurs with the intent to steal a person's name or company name, which can be used to steal sensitive information, such as usernames and passwords.

    CYBER/ TYPOSQUATTING

  • 21

    The law aims to address legal issues concerning online interactions and the Internet in the Philippines. It defines cybercrime as any illegal act committed through the use of a computer system or any other similar means which may be punishable by law.

    REPUBLIC ACT 10175 OR CYBERCRIME PREVENTION ACT OF 2012

  • 22

    These basic human rights are threatened on the Internet when governments block websites or social networks, which is a violation of the right to communication and free association, or censor content, which is contrary to freedom of expression and information.

    FREEDOM OF EXPRESSION, INFORMATION AND COMMUNICATION

  • 23

    Governments must not only ensure the protection of children on the Internet, as in the case of child pornography, but also ensure that companies provide the means to guarantee safe access without infringing the rights of children.

    PROTECTION OF MINORS

  • 24

    When does the Cybercrime Prevention Act of 2012 was approved?

    SEPTEMBER 12, 2012

  • 25

    It is a basic set of rules you should follow to make the Internet a better place for yourself and for others.

    DIGITAL ETIQUETTE

  • 26

    A form of cybercrime in which someone hacks into a website or computer system and then uses that access to launch a series of coordinated cyberattacks against another person or entity without the victim’s knowledge.

    DRIVE-BY ATTACKS

  • 27

    Which is the second country who has the highest rate of cyber crime?

    UNITED KINGDOM

  • 28

    Authors must be guaranteed recognition of their artistic or literary work and the right to be remunerated for its use, while guaranteeing free access to works that are already in the public domain.

    INTELLECTUAL PROPERTY

  • 29

    What are the 3 different types of cyber criminals?

    LONE CYBERCRIMINALS, ORGANIZED CRIME AND STATE-SPONSORED CYBERCRIME

  • 30

    It encompasses all activities on the Internet that do not abide by the laws of society.

    UNETHICAL USE

  • 31

    These are the act of secretly monitoring another person's online activities. These cyberattacks often occur through the use of a trojan or spyware, which is used to intercept a person's online communications, such as through the use of keyloggers and other spyware.

    EAVESDROPPING ATTACKS

  • 32

    It is a form of cybercrime in which someone uses the internet to try and trick someone else into giving them their login information, often using a fake website or email.

    PHISHING

  • 33

    It refers to using internet-based social media sites to stay connected with friends, family, colleagues, or customers.

    SOCIAL NETWORKING

  • 34

    These are a form of cybercrime in which employees use their access to a company's computer system and other resources to damage or steal from the company.

    INSIDER THREATS

  • 35

    It consist of copyright and related rights, trademarks and service marks, geographic indications, industrial designs, patents, layout-designs (topographies) of integrated circuits, and protection of undisclosed information.

    INTELLECTUAL PROPERTY RIGHT

  • 36

    These are a form of cybercrime that utilizes artificial intelligence to attack a person. These attacks can be used to steal a person's personal data or even cause disruptive cyberattacks.

    AI-POWERED ATTACKS

  • 37

    These are internet criminals who operate without the help of others

    LONE CYBERCRIMINALS

  • 38

    It is one of the types of internet crime in which a hacker injects malicious code into a website. This code is designed to steal a website visitor's data, such as their usernames and passwords.

    CROSS-SITE SCRIPTING

  • 39

    It is committed by groups of cybercriminals

    ORGANIZED CRIME

  • 40

    What are the 3 categories of cybercrime?

    INDIVIDUAL, PROPERTY AND GOVERNMENT

  • 41

    This occurs when a person uses technology to cause someone else stress, often using offensive language or images. This can be done through text or email by sending unwanted messages such as harassing sexual or violent messages.

    CYBER HARASSMENT

  • 42

    Citizens must have control over who stores their personal data and be able to delete them at any time. The right to privacy is threatened on the Internet by the theft of credentials, the appropriation of personal data and their use for financial gain, etc.

    PRIVACY AND DATA PROTECTION

  • 43

    What are the types of digital rights?

    UNIVERSAL AND EQUAL ACCESS, FREEDOM OF EXPRESSION, INFORMATION AND COMMUNICATION, PRIVACY AND DATA PROTECTION, RIGHT TO ANONYMITY, RIGHT TO BE FORGOTTEN, PROTECTION OF MINORS, INTELLECTUAL PROPERTY

  • 44

    This is the right to have a person's private information removed from Internet searches, databases and directories. It is currently recognized by the EU in the GDPR as a 'right to delete' and it has already been invoked in other countries such as Argentina, the US, South Korea and India.

    RIGHT TO BE FORGOTTEN

  • 45

    The Intellectual Property Code of the Philippines, also known as _____________, prescribes the Intellectual Property Code and establishes the Intellectual Property Office, providing for its powers and functions, and for other purposes.

    REPUBLIC ACT NO. 8293

  • 46

    This right and encryption of communications is particularly threatened in those countries that prohibit the sending of encrypted messages and communications, which is necessary for reliable and secure transactions on the Internet.

    RIGHT TO ANONYMITY

  • 47

    It is a form of malware that encrypts a computer or files and then demands payment in exchange for the computer or files to be decrypted. It is often used to hold a computer or files hostage until the victim pays a ransom.

    RANSOMWARE

  • 48

    When does the Ten Commandments of Computer ethics were created?

    1992

  • 49

    It is a legal framework that governs the rights of creators and owners of intellectual property. It is a system of legal rules that empowers individuals and organizations to control the use and dissemination of ideas or information.

    INTELLECTUAL PROPERTY LAW

  • 50

    It is the act of committing a crime using a computer, the internet, mobile device that is connected to the internet, and specialized software such as exploit kits and ransomware.

    CYBERCRIME

  • 51

    These types of computer crimes are committed against a person's property, including their computer, mobile device, and other connected devices. What type of cybercrime is this?

    PROPERTY

  • 52

    The commandments were introduced in the paper "In Pursuit of a 'Ten Commandments' for Computer Ethics" by whom?

    RAMON C. BARQUIN

  • 53

    It is stealing or sharing copyrighted materials without the owner's permission. The biggest example of it is the act of sharing copyrighted music, videos, and other content through file- sharing sites.

    COPYRIGHT INFRINGEMENT