記憶度
7問
21問
0問
0問
0問
アカウント登録して、解答結果を保存しよう
問題一覧
1
It can be defined as the legal rights and restrictions governing technology use or an electronic responsibility for actions and deeds. In other words, it refers to what you are and are not allowed to do while using the Internet.
DIGITAL LAW
2
It encompasses all activities on the Internet that abide by the laws of society.
ETHICAL USE
3
It encompasses all activities on the Internet that do not abide by the laws of society.
UNETHICAL USE
4
People should be able to access the Internet regardless of their income, their geographical location or their disabilities. The UN Human Rights Council recognizes in a report that the right of access is essential to freedom of opinion and cities such as Mexico City already have programs to establish a free internet network.
UNIVERSAL AND EQUAL ACCESS
5
These basic human rights are threatened on the Internet when governments block websites or social networks, which is a violation of the right to communication and free association, or censor content, which is contrary to freedom of expression and information.
FREEDOM OF EXPRESSION, INFORMATION AND COMMUNICATION
6
Citizens must have control over who stores their personal data and be able to delete them at any time. The right to privacy is threatened on the Internet by the theft of credentials, the appropriation of personal data and their use for financial gain, etc.
PRIVACY AND DATA PROTECTION
7
This right and encryption of communications is particularly threatened in those countries that prohibit the sending of encrypted messages and communications, which is necessary for reliable and secure transactions on the Internet.
RIGHT TO ANONYMITY
8
This is the right to have a person's private information removed from Internet searches, databases and directories. It is currently recognized by the EU in the GDPR as a 'right to delete' and it has already been invoked in other countries such as Argentina, the US, South Korea and India.
RIGHT TO BE FORGOTTEN
9
Governments must not only ensure the protection of children on the Internet, as in the case of child pornography, but also ensure that companies provide the means to guarantee safe access without infringing the rights of children.
PROTECTION OF MINORS
10
Authors must be guaranteed recognition of their artistic or literary work and the right to be remunerated for its use, while guaranteeing free access to works that are already in the public domain.
INTELLECTUAL PROPERTY
11
What are the types of digital rights?
UNIVERSAL AND EQUAL ACCESS, FREEDOM OF EXPRESSION, INFORMATION AND COMMUNICATION, PRIVACY AND DATA PROTECTION, RIGHT TO ANONYMITY, RIGHT TO BE FORGOTTEN, PROTECTION OF MINORS, INTELLECTUAL PROPERTY
12
It is a basic set of rules you should follow to make the Internet a better place for yourself and for others.
DIGITAL ETIQUETTE
13
They are the moral codes that guide technology- enabled decisions, and the associated behavior and responses, within the organization.
DIGITAL ETHICS
14
It is the act of committing a crime using a computer, the internet, mobile device that is connected to the internet, and specialized software such as exploit kits and ransomware.
CYBERCRIME
15
What are the 3 categories of cybercrime?
INDIVIDUAL, PROPERTY AND GOVERNMENT
16
These kinds of computer crime are committed against a single individual, what type of cybercrime is this?
INDIVIDUAL
17
These types of computer crimes are committed against a person's property, including their computer, mobile device, and other connected devices. What type of cybercrime is this?
PROPERTY
18
These types of internet crimes are committed against a government, including the federal government, state governments, and local governments. What type of cybercrime is this?
GOVERNMENT
19
These are a form of cybercrime that utilizes artificial intelligence to attack a person. These attacks can be used to steal a person's personal data or even cause disruptive cyberattacks.
AI-POWERED ATTACKS
20
It is the act of damaging a person's computer through malicious software. This can include disabling systems, causing files to become corrupted, stealing confidential information, and even causing a system to crash.
COMPUTER VANDALISM
21
It is stealing or sharing copyrighted materials without the owner's permission. The biggest example of it is the act of sharing copyrighted music, videos, and other content through file- sharing sites.
COPYRIGHT INFRINGEMENT
22
It is one of the types of internet crime in which a hacker injects malicious code into a website. This code is designed to steal a website visitor's data, such as their usernames and passwords.
CROSS-SITE SCRIPTING
23
This occurs when a person uses technology to cause someone else stress, often using offensive language or images. This can be done through text or email by sending unwanted messages such as harassing sexual or violent messages.
CYBER HARASSMENT
24
It is using a website or domain name similar to a person's or company name to dupe people into thinking it is them. This often occurs with the intent to steal a person's name or company name, which can be used to steal sensitive information, such as usernames and passwords.
CYBER/ TYPOSQUATTING
25
It is often used to describe the act of stalking a person online, such as by repeatedly sending them unwanted messages or using the internet to track their location.
CYBERSTALKING
26
It is the act of using the internet to cause harm and damage, often in a way that causes mass panic or fear
CYBERTERRORISM
27
These are designed to make a website or other online service unavailable or unusable to other users. This is often accomplished by flooding a website with requests, causing it to slow down or crash.
DENIAL OF SERVICE (DOS)
28
Cyberattacks involving these are illegal methods of using the internet to exploit people for sexual exploitation or labor.
DISTRIBUTION OF CHILD PORNOGRAPHY/ HUMAN TRAFFICKING
29
A form of cybercrime in which someone hacks into a website or computer system and then uses that access to launch a series of coordinated cyberattacks against another person or entity without the victim’s knowledge.
DRIVE-BY ATTACKS
30
These are the act of secretly monitoring another person's online activities. These cyberattacks often occur through the use of a trojan or spyware, which is used to intercept a person's online communications, such as through the use of keyloggers and other spyware.
EAVESDROPPING ATTACKS
31
These are a form of cybercrime in which employees use their access to a company's computer system and other resources to damage or steal from the company.
INSIDER THREATS
32
It is short for “malicious software,” which is a term used to describe programs designed to cause harm.
MALWARE
33
It is the act of posting false information about another person online with the intent of causing emotional distress or harm. It is often used to describe the posting of false information about a person in a public forum, such as a social media page, with the intent of causing emotional distress to the person.
ONLINE LIBEL/ SLANDER
34
It is a form of cybercrime in which someone uses the internet to try and trick someone else into giving them their login information, often using a fake website or email.
PHISHING
35
It is a form of malware that encrypts a computer or files and then demands payment in exchange for the computer or files to be decrypted. It is often used to hold a computer or files hostage until the victim pays a ransom.
RANSOMWARE
36
What are the 3 different types of cyber criminals?
LONE CYBERCRIMINALS, ORGANIZED CRIME AND STATE-SPONSORED CYBERCRIME
37
These are internet criminals who operate without the help of others
LONE CYBERCRIMINALS
38
It is committed by groups of cybercriminals
ORGANIZED CRIME
39
It is committed by a government or some other type of institutional organization
STATE-SPONSORED CYBERCRIME
40
Which country has the highest rate of cybercrime?
UNITED STATES
41
Which is the second country who has the highest rate of cyber crime?
UNITED KINGDOM
42
Which is the third country who has the highest rate of cyber crime?
INDIA
43
The law aims to address legal issues concerning online interactions and the Internet in the Philippines. It defines cybercrime as any illegal act committed through the use of a computer system or any other similar means which may be punishable by law.
REPUBLIC ACT 10175 OR CYBERCRIME PREVENTION ACT OF 2012
44
When does the Cybercrime Prevention Act of 2012 was approved?
SEPTEMBER 12, 2012
45
When does the Ten Commandments of Computer ethics were created?
1992
46
Where does the Ten Commandments of Computer ethics were created?
WASHINGTON, D.C
47
The commandments were introduced in the paper "In Pursuit of a 'Ten Commandments' for Computer Ethics" by whom?
RAMON C. BARQUIN
48
It is a legal framework that governs the rights of creators and owners of intellectual property. It is a system of legal rules that empowers individuals and organizations to control the use and dissemination of ideas or information.
INTELLECTUAL PROPERTY LAW
49
The Intellectual Property Code of the Philippines, also known as _____________, prescribes the Intellectual Property Code and establishes the Intellectual Property Office, providing for its powers and functions, and for other purposes.
REPUBLIC ACT NO. 8293
50
It consist of copyright and related rights, trademarks and service marks, geographic indications, industrial designs, patents, layout-designs (topographies) of integrated circuits, and protection of undisclosed information.
INTELLECTUAL PROPERTY RIGHT
51
It is responsible for the implementation of the law and the registration of applications for trademark, patent, utility model, industrial design, and patent cooperation treaty applications.
INTELLECTUAL PROPERTY OFFICE (IPO)
52
It refers to using internet-based social media sites to stay connected with friends, family, colleagues, or customers.
SOCIAL NETWORKING
53
It remains the largest and most popular social network, with 2 billion people using the platform daily, as of Feb 1, 2023