ログイン

IT- Digital Law and Ethics in Business

IT- Digital Law and Ethics in Business
53問 • 2年前
  • Anndrea S. Galupo
  • 通報

    問題一覧

  • 1

    It can be defined as the legal rights and restrictions governing technology use or an electronic responsibility for actions and deeds. In other words, it refers to what you are and are not allowed to do while using the Internet.

    DIGITAL LAW

  • 2

    It encompasses all activities on the Internet that abide by the laws of society.

    ETHICAL USE

  • 3

    It encompasses all activities on the Internet that do not abide by the laws of society.

    UNETHICAL USE

  • 4

    People should be able to access the Internet regardless of their income, their geographical location or their disabilities. The UN Human Rights Council recognizes in a report that the right of access is essential to freedom of opinion and cities such as Mexico City already have programs to establish a free internet network.

    UNIVERSAL AND EQUAL ACCESS

  • 5

    These basic human rights are threatened on the Internet when governments block websites or social networks, which is a violation of the right to communication and free association, or censor content, which is contrary to freedom of expression and information.

    FREEDOM OF EXPRESSION, INFORMATION AND COMMUNICATION

  • 6

    Citizens must have control over who stores their personal data and be able to delete them at any time. The right to privacy is threatened on the Internet by the theft of credentials, the appropriation of personal data and their use for financial gain, etc.

    PRIVACY AND DATA PROTECTION

  • 7

    This right and encryption of communications is particularly threatened in those countries that prohibit the sending of encrypted messages and communications, which is necessary for reliable and secure transactions on the Internet.

    RIGHT TO ANONYMITY

  • 8

    This is the right to have a person's private information removed from Internet searches, databases and directories. It is currently recognized by the EU in the GDPR as a 'right to delete' and it has already been invoked in other countries such as Argentina, the US, South Korea and India.

    RIGHT TO BE FORGOTTEN

  • 9

    Governments must not only ensure the protection of children on the Internet, as in the case of child pornography, but also ensure that companies provide the means to guarantee safe access without infringing the rights of children.

    PROTECTION OF MINORS

  • 10

    Authors must be guaranteed recognition of their artistic or literary work and the right to be remunerated for its use, while guaranteeing free access to works that are already in the public domain.

    INTELLECTUAL PROPERTY

  • 11

    What are the types of digital rights?

    UNIVERSAL AND EQUAL ACCESS, FREEDOM OF EXPRESSION, INFORMATION AND COMMUNICATION, PRIVACY AND DATA PROTECTION, RIGHT TO ANONYMITY, RIGHT TO BE FORGOTTEN, PROTECTION OF MINORS, INTELLECTUAL PROPERTY

  • 12

    It is a basic set of rules you should follow to make the Internet a better place for yourself and for others.

    DIGITAL ETIQUETTE

  • 13

    They are the moral codes that guide technology- enabled decisions, and the associated behavior and responses, within the organization.

    DIGITAL ETHICS

  • 14

    It is the act of committing a crime using a computer, the internet, mobile device that is connected to the internet, and specialized software such as exploit kits and ransomware.

    CYBERCRIME

  • 15

    What are the 3 categories of cybercrime?

    INDIVIDUAL, PROPERTY AND GOVERNMENT

  • 16

    These kinds of computer crime are committed against a single individual, what type of cybercrime is this?

    INDIVIDUAL

  • 17

    These types of computer crimes are committed against a person's property, including their computer, mobile device, and other connected devices. What type of cybercrime is this?

    PROPERTY

  • 18

    These types of internet crimes are committed against a government, including the federal government, state governments, and local governments. What type of cybercrime is this?

    GOVERNMENT

  • 19

    These are a form of cybercrime that utilizes artificial intelligence to attack a person. These attacks can be used to steal a person's personal data or even cause disruptive cyberattacks.

    AI-POWERED ATTACKS

  • 20

    It is the act of damaging a person's computer through malicious software. This can include disabling systems, causing files to become corrupted, stealing confidential information, and even causing a system to crash.

    COMPUTER VANDALISM

  • 21

    It is stealing or sharing copyrighted materials without the owner's permission. The biggest example of it is the act of sharing copyrighted music, videos, and other content through file- sharing sites.

    COPYRIGHT INFRINGEMENT

  • 22

    It is one of the types of internet crime in which a hacker injects malicious code into a website. This code is designed to steal a website visitor's data, such as their usernames and passwords.

    CROSS-SITE SCRIPTING

  • 23

    This occurs when a person uses technology to cause someone else stress, often using offensive language or images. This can be done through text or email by sending unwanted messages such as harassing sexual or violent messages.

    CYBER HARASSMENT

  • 24

    It is using a website or domain name similar to a person's or company name to dupe people into thinking it is them. This often occurs with the intent to steal a person's name or company name, which can be used to steal sensitive information, such as usernames and passwords.

    CYBER/ TYPOSQUATTING

  • 25

    It is often used to describe the act of stalking a person online, such as by repeatedly sending them unwanted messages or using the internet to track their location.

    CYBERSTALKING

  • 26

    It is the act of using the internet to cause harm and damage, often in a way that causes mass panic or fear

    CYBERTERRORISM

  • 27

    These are designed to make a website or other online service unavailable or unusable to other users. This is often accomplished by flooding a website with requests, causing it to slow down or crash.

    DENIAL OF SERVICE (DOS)

  • 28

    Cyberattacks involving these are illegal methods of using the internet to exploit people for sexual exploitation or labor.

    DISTRIBUTION OF CHILD PORNOGRAPHY/ HUMAN TRAFFICKING

  • 29

    A form of cybercrime in which someone hacks into a website or computer system and then uses that access to launch a series of coordinated cyberattacks against another person or entity without the victim’s knowledge.

    DRIVE-BY ATTACKS

  • 30

    These are the act of secretly monitoring another person's online activities. These cyberattacks often occur through the use of a trojan or spyware, which is used to intercept a person's online communications, such as through the use of keyloggers and other spyware.

    EAVESDROPPING ATTACKS

  • 31

    These are a form of cybercrime in which employees use their access to a company's computer system and other resources to damage or steal from the company.

    INSIDER THREATS

  • 32

    It is short for “malicious software,” which is a term used to describe programs designed to cause harm.

    MALWARE

  • 33

    It is the act of posting false information about another person online with the intent of causing emotional distress or harm. It is often used to describe the posting of false information about a person in a public forum, such as a social media page, with the intent of causing emotional distress to the person.

    ONLINE LIBEL/ SLANDER

  • 34

    It is a form of cybercrime in which someone uses the internet to try and trick someone else into giving them their login information, often using a fake website or email.

    PHISHING

  • 35

    It is a form of malware that encrypts a computer or files and then demands payment in exchange for the computer or files to be decrypted. It is often used to hold a computer or files hostage until the victim pays a ransom.

    RANSOMWARE

  • 36

    What are the 3 different types of cyber criminals?

    LONE CYBERCRIMINALS, ORGANIZED CRIME AND STATE-SPONSORED CYBERCRIME

  • 37

    These are internet criminals who operate without the help of others

    LONE CYBERCRIMINALS

  • 38

    It is committed by groups of cybercriminals

    ORGANIZED CRIME

  • 39

    It is committed by a government or some other type of institutional organization

    STATE-SPONSORED CYBERCRIME

  • 40

    Which country has the highest rate of cybercrime?

    UNITED STATES

  • 41

    Which is the second country who has the highest rate of cyber crime?

    UNITED KINGDOM

  • 42

    Which is the third country who has the highest rate of cyber crime?

    INDIA

  • 43

    The law aims to address legal issues concerning online interactions and the Internet in the Philippines. It defines cybercrime as any illegal act committed through the use of a computer system or any other similar means which may be punishable by law.

    REPUBLIC ACT 10175 OR CYBERCRIME PREVENTION ACT OF 2012

  • 44

    When does the Cybercrime Prevention Act of 2012 was approved?

    SEPTEMBER 12, 2012

  • 45

    When does the Ten Commandments of Computer ethics were created?

    1992

  • 46

    Where does the Ten Commandments of Computer ethics were created?

    WASHINGTON, D.C

  • 47

    The commandments were introduced in the paper "In Pursuit of a 'Ten Commandments' for Computer Ethics" by whom?

    RAMON C. BARQUIN

  • 48

    It is a legal framework that governs the rights of creators and owners of intellectual property. It is a system of legal rules that empowers individuals and organizations to control the use and dissemination of ideas or information.

    INTELLECTUAL PROPERTY LAW

  • 49

    The Intellectual Property Code of the Philippines, also known as _____________, prescribes the Intellectual Property Code and establishes the Intellectual Property Office, providing for its powers and functions, and for other purposes.

    REPUBLIC ACT NO. 8293

  • 50

    It consist of copyright and related rights, trademarks and service marks, geographic indications, industrial designs, patents, layout-designs (topographies) of integrated circuits, and protection of undisclosed information.

    INTELLECTUAL PROPERTY RIGHT

  • 51

    It is responsible for the implementation of the law and the registration of applications for trademark, patent, utility model, industrial design, and patent cooperation treaty applications.

    INTELLECTUAL PROPERTY OFFICE (IPO)

  • 52

    It refers to using internet-based social media sites to stay connected with friends, family, colleagues, or customers.

    SOCIAL NETWORKING

  • 53

    It remains the largest and most popular social network, with 2 billion people using the platform daily, as of Feb 1, 2023

    FACEBOOK

  • VITMOLOGY-PPT2

    VITMOLOGY-PPT2

    Anndrea S. Galupo · 22問 · 1年前

    VITMOLOGY-PPT2

    VITMOLOGY-PPT2

    22問 • 1年前
    Anndrea S. Galupo

    INTRODUCTION TO CRIMINALISTICS

    INTRODUCTION TO CRIMINALISTICS

    Anndrea S. Galupo · 100問 · 1年前

    INTRODUCTION TO CRIMINALISTICS

    INTRODUCTION TO CRIMINALISTICS

    100問 • 1年前
    Anndrea S. Galupo

    INTRODUCTION TO CRIMINALISTIC- PART 2

    INTRODUCTION TO CRIMINALISTIC- PART 2

    Anndrea S. Galupo · 39問 · 1年前

    INTRODUCTION TO CRIMINALISTIC- PART 2

    INTRODUCTION TO CRIMINALISTIC- PART 2

    39問 • 1年前
    Anndrea S. Galupo

    HRM- CHAPTER 5

    HRM- CHAPTER 5

    Anndrea S. Galupo · 64問 · 1年前

    HRM- CHAPTER 5

    HRM- CHAPTER 5

    64問 • 1年前
    Anndrea S. Galupo

    HRM- CHAPTER 6

    HRM- CHAPTER 6

    Anndrea S. Galupo · 14問 · 1年前

    HRM- CHAPTER 6

    HRM- CHAPTER 6

    14問 • 1年前
    Anndrea S. Galupo

    HRM- CHAPTER 7

    HRM- CHAPTER 7

    Anndrea S. Galupo · 52問 · 1年前

    HRM- CHAPTER 7

    HRM- CHAPTER 7

    52問 • 1年前
    Anndrea S. Galupo

    HRM- CHAPTER 8

    HRM- CHAPTER 8

    Anndrea S. Galupo · 38問 · 1年前

    HRM- CHAPTER 8

    HRM- CHAPTER 8

    38問 • 1年前
    Anndrea S. Galupo

    SBA CHAPTER 5

    SBA CHAPTER 5

    Anndrea S. Galupo · 35問 · 1年前

    SBA CHAPTER 5

    SBA CHAPTER 5

    35問 • 1年前
    Anndrea S. Galupo

    SBA CHAPTER 6

    SBA CHAPTER 6

    Anndrea S. Galupo · 23問 · 1年前

    SBA CHAPTER 6

    SBA CHAPTER 6

    23問 • 1年前
    Anndrea S. Galupo

    SBA CHAPTER 7

    SBA CHAPTER 7

    Anndrea S. Galupo · 11問 · 1年前

    SBA CHAPTER 7

    SBA CHAPTER 7

    11問 • 1年前
    Anndrea S. Galupo

    SBA- CHAPTER 8

    SBA- CHAPTER 8

    Anndrea S. Galupo · 17問 · 1年前

    SBA- CHAPTER 8

    SBA- CHAPTER 8

    17問 • 1年前
    Anndrea S. Galupo

    SBA- CHAPTER 9

    SBA- CHAPTER 9

    Anndrea S. Galupo · 7問 · 1年前

    SBA- CHAPTER 9

    SBA- CHAPTER 9

    7問 • 1年前
    Anndrea S. Galupo

    HRM- CHAPTER 1

    HRM- CHAPTER 1

    Anndrea S. Galupo · 31問 · 1年前

    HRM- CHAPTER 1

    HRM- CHAPTER 1

    31問 • 1年前
    Anndrea S. Galupo

    HRM- CHAPTER 2

    HRM- CHAPTER 2

    Anndrea S. Galupo · 61問 · 1年前

    HRM- CHAPTER 2

    HRM- CHAPTER 2

    61問 • 1年前
    Anndrea S. Galupo

    HRM- CHAPTER 3

    HRM- CHAPTER 3

    Anndrea S. Galupo · 13問 · 1年前

    HRM- CHAPTER 3

    HRM- CHAPTER 3

    13問 • 1年前
    Anndrea S. Galupo

    HRM- CHAPTER 4

    HRM- CHAPTER 4

    Anndrea S. Galupo · 37問 · 1年前

    HRM- CHAPTER 4

    HRM- CHAPTER 4

    37問 • 1年前
    Anndrea S. Galupo

    Taxation- Part 1

    Taxation- Part 1

    Anndrea S. Galupo · 66問 · 1年前

    Taxation- Part 1

    Taxation- Part 1

    66問 • 1年前
    Anndrea S. Galupo

    Taxation- Part 2

    Taxation- Part 2

    Anndrea S. Galupo · 45問 · 1年前

    Taxation- Part 2

    Taxation- Part 2

    45問 • 1年前
    Anndrea S. Galupo

    SBA- CHAPTER 1

    SBA- CHAPTER 1

    Anndrea S. Galupo · 30問 · 1年前

    SBA- CHAPTER 1

    SBA- CHAPTER 1

    30問 • 1年前
    Anndrea S. Galupo

    SBA- CHAPTER 2

    SBA- CHAPTER 2

    Anndrea S. Galupo · 24問 · 1年前

    SBA- CHAPTER 2

    SBA- CHAPTER 2

    24問 • 1年前
    Anndrea S. Galupo

    SBA- CHAPTER 3

    SBA- CHAPTER 3

    Anndrea S. Galupo · 35問 · 1年前

    SBA- CHAPTER 3

    SBA- CHAPTER 3

    35問 • 1年前
    Anndrea S. Galupo

    SBA- CHAPTER 4

    SBA- CHAPTER 4

    Anndrea S. Galupo · 13問 · 1年前

    SBA- CHAPTER 4

    SBA- CHAPTER 4

    13問 • 1年前
    Anndrea S. Galupo

    STS 301

    STS 301

    Anndrea S. Galupo · 42問 · 1年前

    STS 301

    STS 301

    42問 • 1年前
    Anndrea S. Galupo

    ASEAN-MODULE 1

    ASEAN-MODULE 1

    Anndrea S. Galupo · 73問 · 1年前

    ASEAN-MODULE 1

    ASEAN-MODULE 1

    73問 • 1年前
    Anndrea S. Galupo

    ASEAN - MODULE 2

    ASEAN - MODULE 2

    Anndrea S. Galupo · 46問 · 1年前

    ASEAN - MODULE 2

    ASEAN - MODULE 2

    46問 • 1年前
    Anndrea S. Galupo

    AIS

    AIS

    Anndrea S. Galupo · 30問 · 1年前

    AIS

    AIS

    30問 • 1年前
    Anndrea S. Galupo

    PURPOSIVE- CHAPTER 6

    PURPOSIVE- CHAPTER 6

    Anndrea S. Galupo · 47問 · 1年前

    PURPOSIVE- CHAPTER 6

    PURPOSIVE- CHAPTER 6

    47問 • 1年前
    Anndrea S. Galupo

    PURPOSIVE- CHAPTER 5.2

    PURPOSIVE- CHAPTER 5.2

    Anndrea S. Galupo · 28問 · 1年前

    PURPOSIVE- CHAPTER 5.2

    PURPOSIVE- CHAPTER 5.2

    28問 • 1年前
    Anndrea S. Galupo

    PUPOSIVE CHAPTERr 5.1

    PUPOSIVE CHAPTERr 5.1

    Anndrea S. Galupo · 22問 · 1年前

    PUPOSIVE CHAPTERr 5.1

    PUPOSIVE CHAPTERr 5.1

    22問 • 1年前
    Anndrea S. Galupo

    RIZAL- POEMS (10)

    RIZAL- POEMS (10)

    Anndrea S. Galupo · 14問 · 1年前

    RIZAL- POEMS (10)

    RIZAL- POEMS (10)

    14問 • 1年前
    Anndrea S. Galupo

    RIZAL- WOMEN (9)

    RIZAL- WOMEN (9)

    Anndrea S. Galupo · 10問 · 1年前

    RIZAL- WOMEN (9)

    RIZAL- WOMEN (9)

    10問 • 1年前
    Anndrea S. Galupo

    RIZAL- CENTURY HENCE (7)

    RIZAL- CENTURY HENCE (7)

    Anndrea S. Galupo · 8問 · 1年前

    RIZAL- CENTURY HENCE (7)

    RIZAL- CENTURY HENCE (7)

    8問 • 1年前
    Anndrea S. Galupo

    RIZAL- EL FILI(6)

    RIZAL- EL FILI(6)

    Anndrea S. Galupo · 28問 · 1年前

    RIZAL- EL FILI(6)

    RIZAL- EL FILI(6)

    28問 • 1年前
    Anndrea S. Galupo

    RIZAL- NOLI (5)

    RIZAL- NOLI (5)

    Anndrea S. Galupo · 36問 · 1年前

    RIZAL- NOLI (5)

    RIZAL- NOLI (5)

    36問 • 1年前
    Anndrea S. Galupo

    RIZAL- ANNOTATION (4)

    RIZAL- ANNOTATION (4)

    Anndrea S. Galupo · 12問 · 1年前

    RIZAL- ANNOTATION (4)

    RIZAL- ANNOTATION (4)

    12問 • 1年前
    Anndrea S. Galupo

    STS- CHAPTER 4

    STS- CHAPTER 4

    Anndrea S. Galupo · 37問 · 1年前

    STS- CHAPTER 4

    STS- CHAPTER 4

    37問 • 1年前
    Anndrea S. Galupo

    STS- CHAPTER 5

    STS- CHAPTER 5

    Anndrea S. Galupo · 36問 · 1年前

    STS- CHAPTER 5

    STS- CHAPTER 5

    36問 • 1年前
    Anndrea S. Galupo

    STS- CHAPTER 5- THE NANO WORLD

    STS- CHAPTER 5- THE NANO WORLD

    Anndrea S. Galupo · 11問 · 1年前

    STS- CHAPTER 5- THE NANO WORLD

    STS- CHAPTER 5- THE NANO WORLD

    11問 • 1年前
    Anndrea S. Galupo

    STS-CHAPTER 5- GENE THERAPY

    STS-CHAPTER 5- GENE THERAPY

    Anndrea S. Galupo · 25問 · 1年前

    STS-CHAPTER 5- GENE THERAPY

    STS-CHAPTER 5- GENE THERAPY

    25問 • 1年前
    Anndrea S. Galupo

    STS- CHAPTER 5- BIODIVERSITY AND CLIMATE CHANGE

    STS- CHAPTER 5- BIODIVERSITY AND CLIMATE CHANGE

    Anndrea S. Galupo · 12問 · 1年前

    STS- CHAPTER 5- BIODIVERSITY AND CLIMATE CHANGE

    STS- CHAPTER 5- BIODIVERSITY AND CLIMATE CHANGE

    12問 • 1年前
    Anndrea S. Galupo

    RIZAL I- (RIZAL LAW)

    RIZAL I- (RIZAL LAW)

    Anndrea S. Galupo · 13問 · 1年前

    RIZAL I- (RIZAL LAW)

    RIZAL I- (RIZAL LAW)

    13問 • 1年前
    Anndrea S. Galupo

    RIZAL II- (PHILIPPINES/WORLD IN THE 19TH CENTURY RIZAL'S CONTEXT)

    RIZAL II- (PHILIPPINES/WORLD IN THE 19TH CENTURY RIZAL'S CONTEXT)

    Anndrea S. Galupo · 19問 · 1年前

    RIZAL II- (PHILIPPINES/WORLD IN THE 19TH CENTURY RIZAL'S CONTEXT)

    RIZAL II- (PHILIPPINES/WORLD IN THE 19TH CENTURY RIZAL'S CONTEXT)

    19問 • 1年前
    Anndrea S. Galupo

    RIZAL III- (GENEOLOGY FAMILY EARLY EDUCATION)

    RIZAL III- (GENEOLOGY FAMILY EARLY EDUCATION)

    Anndrea S. Galupo · 50問 · 1年前

    RIZAL III- (GENEOLOGY FAMILY EARLY EDUCATION)

    RIZAL III- (GENEOLOGY FAMILY EARLY EDUCATION)

    50問 • 1年前
    Anndrea S. Galupo

    RIZAL IV- (RIZAL'S LIFE ATENEO UST)

    RIZAL IV- (RIZAL'S LIFE ATENEO UST)

    Anndrea S. Galupo · 22問 · 1年前

    RIZAL IV- (RIZAL'S LIFE ATENEO UST)

    RIZAL IV- (RIZAL'S LIFE ATENEO UST)

    22問 • 1年前
    Anndrea S. Galupo

    RIZAL V- (RIZAL'S TRAVEL ABROAD)

    RIZAL V- (RIZAL'S TRAVEL ABROAD)

    Anndrea S. Galupo · 24問 · 1年前

    RIZAL V- (RIZAL'S TRAVEL ABROAD)

    RIZAL V- (RIZAL'S TRAVEL ABROAD)

    24問 • 1年前
    Anndrea S. Galupo

    RIZAL VII- (RIZAL'S EXILE AND DEATH)

    RIZAL VII- (RIZAL'S EXILE AND DEATH)

    Anndrea S. Galupo · 14問 · 1年前

    RIZAL VII- (RIZAL'S EXILE AND DEATH)

    RIZAL VII- (RIZAL'S EXILE AND DEATH)

    14問 • 1年前
    Anndrea S. Galupo

    STS REVIEWER FOR MIDTERM- LESSON 1

    STS REVIEWER FOR MIDTERM- LESSON 1

    Anndrea S. Galupo · 25問 · 1年前

    STS REVIEWER FOR MIDTERM- LESSON 1

    STS REVIEWER FOR MIDTERM- LESSON 1

    25問 • 1年前
    Anndrea S. Galupo

    STS REVIEWER FOR MIDTERM- LESSON 2 (PART I)

    STS REVIEWER FOR MIDTERM- LESSON 2 (PART I)

    Anndrea S. Galupo · 37問 · 1年前

    STS REVIEWER FOR MIDTERM- LESSON 2 (PART I)

    STS REVIEWER FOR MIDTERM- LESSON 2 (PART I)

    37問 • 1年前
    Anndrea S. Galupo

    STS REVIEWER FOR MIDTERM- LESSON 2 (PART II)

    STS REVIEWER FOR MIDTERM- LESSON 2 (PART II)

    Anndrea S. Galupo · 42問 · 1年前

    STS REVIEWER FOR MIDTERM- LESSON 2 (PART II)

    STS REVIEWER FOR MIDTERM- LESSON 2 (PART II)

    42問 • 1年前
    Anndrea S. Galupo

    STS REVIEWER FOR MIDTERM- LESSON 3

    STS REVIEWER FOR MIDTERM- LESSON 3

    Anndrea S. Galupo · 14問 · 1年前

    STS REVIEWER FOR MIDTERM- LESSON 3

    STS REVIEWER FOR MIDTERM- LESSON 3

    14問 • 1年前
    Anndrea S. Galupo

    PE

    PE

    Anndrea S. Galupo · 62問 · 1年前

    PE

    PE

    62問 • 1年前
    Anndrea S. Galupo

    AIS- INTRODUCTION TO TRANSACTION PROCESSING

    AIS- INTRODUCTION TO TRANSACTION PROCESSING

    Anndrea S. Galupo · 21問 · 1年前

    AIS- INTRODUCTION TO TRANSACTION PROCESSING

    AIS- INTRODUCTION TO TRANSACTION PROCESSING

    21問 • 1年前
    Anndrea S. Galupo

    AIS- EXPENDITURE CYCLE

    AIS- EXPENDITURE CYCLE

    Anndrea S. Galupo · 13問 · 1年前

    AIS- EXPENDITURE CYCLE

    AIS- EXPENDITURE CYCLE

    13問 • 1年前
    Anndrea S. Galupo

    AIS- REVENUE CYCLE II

    AIS- REVENUE CYCLE II

    Anndrea S. Galupo · 7問 · 1年前

    AIS- REVENUE CYCLE II

    AIS- REVENUE CYCLE II

    7問 • 1年前
    Anndrea S. Galupo

    AIS- REVENUE CYCLE I

    AIS- REVENUE CYCLE I

    Anndrea S. Galupo · 27問 · 1年前

    AIS- REVENUE CYCLE I

    AIS- REVENUE CYCLE I

    27問 • 1年前
    Anndrea S. Galupo

    AIS- OVERVIEW OF AIS

    AIS- OVERVIEW OF AIS

    Anndrea S. Galupo · 55問 · 1年前

    AIS- OVERVIEW OF AIS

    AIS- OVERVIEW OF AIS

    55問 • 1年前
    Anndrea S. Galupo

    CHAPTER 1- INTERMEDIATE ACCOUNTING

    CHAPTER 1- INTERMEDIATE ACCOUNTING

    Anndrea S. Galupo · 72問 · 1年前

    CHAPTER 1- INTERMEDIATE ACCOUNTING

    CHAPTER 1- INTERMEDIATE ACCOUNTING

    72問 • 1年前
    Anndrea S. Galupo

    CHAPTER 2- INTERMEDIATE ACCOUNTING

    CHAPTER 2- INTERMEDIATE ACCOUNTING

    Anndrea S. Galupo · 38問 · 1年前

    CHAPTER 2- INTERMEDIATE ACCOUNTING

    CHAPTER 2- INTERMEDIATE ACCOUNTING

    38問 • 1年前
    Anndrea S. Galupo

    CHAPTER 3- INTERMEDIATE ACCOUNTING

    CHAPTER 3- INTERMEDIATE ACCOUNTING

    Anndrea S. Galupo · 19問 · 1年前

    CHAPTER 3- INTERMEDIATE ACCOUNTING

    CHAPTER 3- INTERMEDIATE ACCOUNTING

    19問 • 1年前
    Anndrea S. Galupo

    CHAPTER 4- INTERMEDIATE ACCOUNTING

    CHAPTER 4- INTERMEDIATE ACCOUNTING

    Anndrea S. Galupo · 40問 · 1年前

    CHAPTER 4- INTERMEDIATE ACCOUNTING

    CHAPTER 4- INTERMEDIATE ACCOUNTING

    40問 • 1年前
    Anndrea S. Galupo

    PURPOSIVE COMMUNICATION- LESSON 4

    PURPOSIVE COMMUNICATION- LESSON 4

    Anndrea S. Galupo · 15問 · 1年前

    PURPOSIVE COMMUNICATION- LESSON 4

    PURPOSIVE COMMUNICATION- LESSON 4

    15問 • 1年前
    Anndrea S. Galupo

    PURPOSIVE COMMUNICATION- LESSON 3

    PURPOSIVE COMMUNICATION- LESSON 3

    Anndrea S. Galupo · 28問 · 1年前

    PURPOSIVE COMMUNICATION- LESSON 3

    PURPOSIVE COMMUNICATION- LESSON 3

    28問 • 1年前
    Anndrea S. Galupo

    PURPOSIVE COMMUNICATION- LESSON 2

    PURPOSIVE COMMUNICATION- LESSON 2

    Anndrea S. Galupo · 45問 · 1年前

    PURPOSIVE COMMUNICATION- LESSON 2

    PURPOSIVE COMMUNICATION- LESSON 2

    45問 • 1年前
    Anndrea S. Galupo

    PURPOSIVE COMMUNICATION

    PURPOSIVE COMMUNICATION

    Anndrea S. Galupo · 44問 · 2年前

    PURPOSIVE COMMUNICATION

    PURPOSIVE COMMUNICATION

    44問 • 2年前
    Anndrea S. Galupo

    PURPOSIVE COMMUNICATION (PART 2)

    PURPOSIVE COMMUNICATION (PART 2)

    Anndrea S. Galupo · 33問 · 2年前

    PURPOSIVE COMMUNICATION (PART 2)

    PURPOSIVE COMMUNICATION (PART 2)

    33問 • 2年前
    Anndrea S. Galupo

    QUIZ- (SCM)

    QUIZ- (SCM)

    Anndrea S. Galupo · 38問 · 2年前

    QUIZ- (SCM)

    QUIZ- (SCM)

    38問 • 2年前
    Anndrea S. Galupo

    REVIEWER

    REVIEWER

    Anndrea S. Galupo · 31問 · 2年前

    REVIEWER

    REVIEWER

    31問 • 2年前
    Anndrea S. Galupo

    MGT 209- CHAPTER 4

    MGT 209- CHAPTER 4

    Anndrea S. Galupo · 49問 · 2年前

    MGT 209- CHAPTER 4

    MGT 209- CHAPTER 4

    49問 • 2年前
    Anndrea S. Galupo

    MGT 209- CHAPTER 5

    MGT 209- CHAPTER 5

    Anndrea S. Galupo · 23問 · 2年前

    MGT 209- CHAPTER 5

    MGT 209- CHAPTER 5

    23問 • 2年前
    Anndrea S. Galupo

    MGT 209- CHAPTER 6

    MGT 209- CHAPTER 6

    Anndrea S. Galupo · 36問 · 2年前

    MGT 209- CHAPTER 6

    MGT 209- CHAPTER 6

    36問 • 2年前
    Anndrea S. Galupo

    MGT 209- CHAPTER 7

    MGT 209- CHAPTER 7

    Anndrea S. Galupo · 19問 · 2年前

    MGT 209- CHAPTER 7

    MGT 209- CHAPTER 7

    19問 • 2年前
    Anndrea S. Galupo

    ART APPRECIATION- LESSON 1

    ART APPRECIATION- LESSON 1

    Anndrea S. Galupo · 48問 · 2年前

    ART APPRECIATION- LESSON 1

    ART APPRECIATION- LESSON 1

    48問 • 2年前
    Anndrea S. Galupo

    ART APPRECIATION- LESSON 2

    ART APPRECIATION- LESSON 2

    Anndrea S. Galupo · 37問 · 2年前

    ART APPRECIATION- LESSON 2

    ART APPRECIATION- LESSON 2

    37問 • 2年前
    Anndrea S. Galupo

    ART APPRECIATION- LESSON 3

    ART APPRECIATION- LESSON 3

    Anndrea S. Galupo · 26問 · 2年前

    ART APPRECIATION- LESSON 3

    ART APPRECIATION- LESSON 3

    26問 • 2年前
    Anndrea S. Galupo

    ART APPRECIATION- LESSON 4

    ART APPRECIATION- LESSON 4

    Anndrea S. Galupo · 7問 · 2年前

    ART APPRECIATION- LESSON 4

    ART APPRECIATION- LESSON 4

    7問 • 2年前
    Anndrea S. Galupo

    ART APPRECIATION- UNIT 6- LESSON 2

    ART APPRECIATION- UNIT 6- LESSON 2

    Anndrea S. Galupo · 10問 · 2年前

    ART APPRECIATION- UNIT 6- LESSON 2

    ART APPRECIATION- UNIT 6- LESSON 2

    10問 • 2年前
    Anndrea S. Galupo

    ART APPRECIATION- UNIT 6- LESSON 3

    ART APPRECIATION- UNIT 6- LESSON 3

    Anndrea S. Galupo · 11問 · 2年前

    ART APPRECIATION- UNIT 6- LESSON 3

    ART APPRECIATION- UNIT 6- LESSON 3

    11問 • 2年前
    Anndrea S. Galupo

    IT- MS Access

    IT- MS Access

    Anndrea S. Galupo · 19問 · 2年前

    IT- MS Access

    IT- MS Access

    19問 • 2年前
    Anndrea S. Galupo

    IT- ICT Security

    IT- ICT Security

    Anndrea S. Galupo · 48問 · 2年前

    IT- ICT Security

    IT- ICT Security

    48問 • 2年前
    Anndrea S. Galupo

    CFAS-PAS 19

    CFAS-PAS 19

    Anndrea S. Galupo · 18問 · 2年前

    CFAS-PAS 19

    CFAS-PAS 19

    18問 • 2年前
    Anndrea S. Galupo

    CFAS- PAS 20

    CFAS- PAS 20

    Anndrea S. Galupo · 10問 · 2年前

    CFAS- PAS 20

    CFAS- PAS 20

    10問 • 2年前
    Anndrea S. Galupo

    CFAS PAS 21

    CFAS PAS 21

    Anndrea S. Galupo · 14問 · 2年前

    CFAS PAS 21

    CFAS PAS 21

    14問 • 2年前
    Anndrea S. Galupo

    ART APPRECIATION- UNIT 3 continuation

    ART APPRECIATION- UNIT 3 continuation

    Anndrea S. Galupo · 13問 · 2年前

    ART APPRECIATION- UNIT 3 continuation

    ART APPRECIATION- UNIT 3 continuation

    13問 • 2年前
    Anndrea S. Galupo

    ACCOUNTING PAS 1

    ACCOUNTING PAS 1

    Anndrea S. Galupo · 23問 · 2年前

    ACCOUNTING PAS 1

    ACCOUNTING PAS 1

    23問 • 2年前
    Anndrea S. Galupo

    ACCOUNTING- PAS 2

    ACCOUNTING- PAS 2

    Anndrea S. Galupo · 21問 · 2年前

    ACCOUNTING- PAS 2

    ACCOUNTING- PAS 2

    21問 • 2年前
    Anndrea S. Galupo

    ACCOUNTING- PAS 7

    ACCOUNTING- PAS 7

    Anndrea S. Galupo · 11問 · 2年前

    ACCOUNTING- PAS 7

    ACCOUNTING- PAS 7

    11問 • 2年前
    Anndrea S. Galupo

    ACCOUNTING- PAS 8

    ACCOUNTING- PAS 8

    Anndrea S. Galupo · 16問 · 2年前

    ACCOUNTING- PAS 8

    ACCOUNTING- PAS 8

    16問 • 2年前
    Anndrea S. Galupo

    ACCOUNTING- PAS 10

    ACCOUNTING- PAS 10

    Anndrea S. Galupo · 13問 · 2年前

    ACCOUNTING- PAS 10

    ACCOUNTING- PAS 10

    13問 • 2年前
    Anndrea S. Galupo

    ACCOUNTING- PAS 16

    ACCOUNTING- PAS 16

    Anndrea S. Galupo · 19問 · 2年前

    ACCOUNTING- PAS 16

    ACCOUNTING- PAS 16

    19問 • 2年前
    Anndrea S. Galupo

    ACCOUNTING- PAS 12

    ACCOUNTING- PAS 12

    Anndrea S. Galupo · 8問 · 2年前

    ACCOUNTING- PAS 12

    ACCOUNTING- PAS 12

    8問 • 2年前
    Anndrea S. Galupo

    FILI 101- YUNIT 2

    FILI 101- YUNIT 2

    Anndrea S. Galupo · 28問 · 2年前

    FILI 101- YUNIT 2

    FILI 101- YUNIT 2

    28問 • 2年前
    Anndrea S. Galupo

    問題一覧

  • 1

    It can be defined as the legal rights and restrictions governing technology use or an electronic responsibility for actions and deeds. In other words, it refers to what you are and are not allowed to do while using the Internet.

    DIGITAL LAW

  • 2

    It encompasses all activities on the Internet that abide by the laws of society.

    ETHICAL USE

  • 3

    It encompasses all activities on the Internet that do not abide by the laws of society.

    UNETHICAL USE

  • 4

    People should be able to access the Internet regardless of their income, their geographical location or their disabilities. The UN Human Rights Council recognizes in a report that the right of access is essential to freedom of opinion and cities such as Mexico City already have programs to establish a free internet network.

    UNIVERSAL AND EQUAL ACCESS

  • 5

    These basic human rights are threatened on the Internet when governments block websites or social networks, which is a violation of the right to communication and free association, or censor content, which is contrary to freedom of expression and information.

    FREEDOM OF EXPRESSION, INFORMATION AND COMMUNICATION

  • 6

    Citizens must have control over who stores their personal data and be able to delete them at any time. The right to privacy is threatened on the Internet by the theft of credentials, the appropriation of personal data and their use for financial gain, etc.

    PRIVACY AND DATA PROTECTION

  • 7

    This right and encryption of communications is particularly threatened in those countries that prohibit the sending of encrypted messages and communications, which is necessary for reliable and secure transactions on the Internet.

    RIGHT TO ANONYMITY

  • 8

    This is the right to have a person's private information removed from Internet searches, databases and directories. It is currently recognized by the EU in the GDPR as a 'right to delete' and it has already been invoked in other countries such as Argentina, the US, South Korea and India.

    RIGHT TO BE FORGOTTEN

  • 9

    Governments must not only ensure the protection of children on the Internet, as in the case of child pornography, but also ensure that companies provide the means to guarantee safe access without infringing the rights of children.

    PROTECTION OF MINORS

  • 10

    Authors must be guaranteed recognition of their artistic or literary work and the right to be remunerated for its use, while guaranteeing free access to works that are already in the public domain.

    INTELLECTUAL PROPERTY

  • 11

    What are the types of digital rights?

    UNIVERSAL AND EQUAL ACCESS, FREEDOM OF EXPRESSION, INFORMATION AND COMMUNICATION, PRIVACY AND DATA PROTECTION, RIGHT TO ANONYMITY, RIGHT TO BE FORGOTTEN, PROTECTION OF MINORS, INTELLECTUAL PROPERTY

  • 12

    It is a basic set of rules you should follow to make the Internet a better place for yourself and for others.

    DIGITAL ETIQUETTE

  • 13

    They are the moral codes that guide technology- enabled decisions, and the associated behavior and responses, within the organization.

    DIGITAL ETHICS

  • 14

    It is the act of committing a crime using a computer, the internet, mobile device that is connected to the internet, and specialized software such as exploit kits and ransomware.

    CYBERCRIME

  • 15

    What are the 3 categories of cybercrime?

    INDIVIDUAL, PROPERTY AND GOVERNMENT

  • 16

    These kinds of computer crime are committed against a single individual, what type of cybercrime is this?

    INDIVIDUAL

  • 17

    These types of computer crimes are committed against a person's property, including their computer, mobile device, and other connected devices. What type of cybercrime is this?

    PROPERTY

  • 18

    These types of internet crimes are committed against a government, including the federal government, state governments, and local governments. What type of cybercrime is this?

    GOVERNMENT

  • 19

    These are a form of cybercrime that utilizes artificial intelligence to attack a person. These attacks can be used to steal a person's personal data or even cause disruptive cyberattacks.

    AI-POWERED ATTACKS

  • 20

    It is the act of damaging a person's computer through malicious software. This can include disabling systems, causing files to become corrupted, stealing confidential information, and even causing a system to crash.

    COMPUTER VANDALISM

  • 21

    It is stealing or sharing copyrighted materials without the owner's permission. The biggest example of it is the act of sharing copyrighted music, videos, and other content through file- sharing sites.

    COPYRIGHT INFRINGEMENT

  • 22

    It is one of the types of internet crime in which a hacker injects malicious code into a website. This code is designed to steal a website visitor's data, such as their usernames and passwords.

    CROSS-SITE SCRIPTING

  • 23

    This occurs when a person uses technology to cause someone else stress, often using offensive language or images. This can be done through text or email by sending unwanted messages such as harassing sexual or violent messages.

    CYBER HARASSMENT

  • 24

    It is using a website or domain name similar to a person's or company name to dupe people into thinking it is them. This often occurs with the intent to steal a person's name or company name, which can be used to steal sensitive information, such as usernames and passwords.

    CYBER/ TYPOSQUATTING

  • 25

    It is often used to describe the act of stalking a person online, such as by repeatedly sending them unwanted messages or using the internet to track their location.

    CYBERSTALKING

  • 26

    It is the act of using the internet to cause harm and damage, often in a way that causes mass panic or fear

    CYBERTERRORISM

  • 27

    These are designed to make a website or other online service unavailable or unusable to other users. This is often accomplished by flooding a website with requests, causing it to slow down or crash.

    DENIAL OF SERVICE (DOS)

  • 28

    Cyberattacks involving these are illegal methods of using the internet to exploit people for sexual exploitation or labor.

    DISTRIBUTION OF CHILD PORNOGRAPHY/ HUMAN TRAFFICKING

  • 29

    A form of cybercrime in which someone hacks into a website or computer system and then uses that access to launch a series of coordinated cyberattacks against another person or entity without the victim’s knowledge.

    DRIVE-BY ATTACKS

  • 30

    These are the act of secretly monitoring another person's online activities. These cyberattacks often occur through the use of a trojan or spyware, which is used to intercept a person's online communications, such as through the use of keyloggers and other spyware.

    EAVESDROPPING ATTACKS

  • 31

    These are a form of cybercrime in which employees use their access to a company's computer system and other resources to damage or steal from the company.

    INSIDER THREATS

  • 32

    It is short for “malicious software,” which is a term used to describe programs designed to cause harm.

    MALWARE

  • 33

    It is the act of posting false information about another person online with the intent of causing emotional distress or harm. It is often used to describe the posting of false information about a person in a public forum, such as a social media page, with the intent of causing emotional distress to the person.

    ONLINE LIBEL/ SLANDER

  • 34

    It is a form of cybercrime in which someone uses the internet to try and trick someone else into giving them their login information, often using a fake website or email.

    PHISHING

  • 35

    It is a form of malware that encrypts a computer or files and then demands payment in exchange for the computer or files to be decrypted. It is often used to hold a computer or files hostage until the victim pays a ransom.

    RANSOMWARE

  • 36

    What are the 3 different types of cyber criminals?

    LONE CYBERCRIMINALS, ORGANIZED CRIME AND STATE-SPONSORED CYBERCRIME

  • 37

    These are internet criminals who operate without the help of others

    LONE CYBERCRIMINALS

  • 38

    It is committed by groups of cybercriminals

    ORGANIZED CRIME

  • 39

    It is committed by a government or some other type of institutional organization

    STATE-SPONSORED CYBERCRIME

  • 40

    Which country has the highest rate of cybercrime?

    UNITED STATES

  • 41

    Which is the second country who has the highest rate of cyber crime?

    UNITED KINGDOM

  • 42

    Which is the third country who has the highest rate of cyber crime?

    INDIA

  • 43

    The law aims to address legal issues concerning online interactions and the Internet in the Philippines. It defines cybercrime as any illegal act committed through the use of a computer system or any other similar means which may be punishable by law.

    REPUBLIC ACT 10175 OR CYBERCRIME PREVENTION ACT OF 2012

  • 44

    When does the Cybercrime Prevention Act of 2012 was approved?

    SEPTEMBER 12, 2012

  • 45

    When does the Ten Commandments of Computer ethics were created?

    1992

  • 46

    Where does the Ten Commandments of Computer ethics were created?

    WASHINGTON, D.C

  • 47

    The commandments were introduced in the paper "In Pursuit of a 'Ten Commandments' for Computer Ethics" by whom?

    RAMON C. BARQUIN

  • 48

    It is a legal framework that governs the rights of creators and owners of intellectual property. It is a system of legal rules that empowers individuals and organizations to control the use and dissemination of ideas or information.

    INTELLECTUAL PROPERTY LAW

  • 49

    The Intellectual Property Code of the Philippines, also known as _____________, prescribes the Intellectual Property Code and establishes the Intellectual Property Office, providing for its powers and functions, and for other purposes.

    REPUBLIC ACT NO. 8293

  • 50

    It consist of copyright and related rights, trademarks and service marks, geographic indications, industrial designs, patents, layout-designs (topographies) of integrated circuits, and protection of undisclosed information.

    INTELLECTUAL PROPERTY RIGHT

  • 51

    It is responsible for the implementation of the law and the registration of applications for trademark, patent, utility model, industrial design, and patent cooperation treaty applications.

    INTELLECTUAL PROPERTY OFFICE (IPO)

  • 52

    It refers to using internet-based social media sites to stay connected with friends, family, colleagues, or customers.

    SOCIAL NETWORKING

  • 53

    It remains the largest and most popular social network, with 2 billion people using the platform daily, as of Feb 1, 2023

    FACEBOOK