暗記メーカー
ログイン
LITE - (Chapter 4 - Information, Control, and Privacy) MIDTERM
  • REMSON RELUCIO

  • 問題数 82 • 11/4/2023

    記憶度

    完璧

    12

    覚えた

    30

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    Are non-tangible and considered valuable for what they present. Example is money which represents monetary value.

    Conceptual Resources

  • 2

    They are tangible and can be easily identified.

    Physical Resources

  • 3

    Are the total means available to a company for increasing production or profit, including land, labor, capital, and raw materials.

    Resources

  • 4

    Is a set of exclusive rights granted by a state to the creator of an "original work" for a limited period in exchange for public disclosure of the work, and includes the rights to copy, distribute, and adapt the work.

    Copyright

  • 5

    Is done to hide sensitive information from unauthorized users.

    Data Scrambling

  • 6

    Pertain to the permission of individuals to legitimately perform actions involving the use of a computer, any electronic device, or a communication network.

    Digital Rights

  • 7

    is used to describe the processes by which the author or publisher of a work exerts his rights to control what the purchaser of his work is entitled to do.

    Digital Rights Management

  • 8

    are considered relevant truths which have been validated and identified

    Facts

  • 9

    It refere to processed data.

    Information

  • 10

    Is allowing those who have appropriate authority access to and use information on the basis of the authority that they hold.

    Information Control

  • 11

    Is a number of distinct types of intangible assets of which a sst of exclusive rights are recognized.

    Intellectual property

  • 12

    It refers to useful information

    Knowledge

  • 13

    Is used to identify the owner's name, author, and date of purchase, among other pertinient pieces of information.

    Metadata

  • 14

    Is the delivery of electronic commerce capabilities directly into the consumer's hand, anywhere, via wireless technology.

    Mobile Commerce (m-commerce)

  • 15

    Is a set of exclusive rights granted by a state to an inventor for a limited period of time in exchange for public disclosure of an "invention". *right to prevent others from making, selling, or distributing the invetion without permission

    Patent

  • 16

    Is a subset of a security breach that actually leads to accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or processed.

    Personal data breach

  • 17

    Is accomplished by the addition of components to the original signal or changing some important components of original signal in order to make extraction of the original signal difficult.

    Scrambling

  • 18

    Is an event or occurence that affects or tends to affect the data protection, or may compromise availability, integrity, or confidentiality.

    Security Incident

  • 19

    Is the unauthorized copying or distribution of copyrighted software. It can be done through copying, downloading, sharing, selling or installing multiple copies of software onto personal or work computers.

    Software Piracy

  • 20

    Is a term used for any method, formula, devie, process or any information that gives a business a unique competitive advantage over its competitors.

    Trade Secret

  • 21

    Is an distinctive sign used by an individual, business, organization, or legal entity to identify products or services.

    Trademark

  • 22

    Is a set of practices intended to keep data secure from unauthorized access or alterations, both when it's being transmitted from one machine or physical location to another.

    Information Security (Infosec)

  • 23

    Is a set of strategies and processes you can use to secure the privacy, availability, and integrity of your data.

    Data Protection

  • 24

    Is a discipline intended to keep data safe against improper accees, theft or loss.

    Data Privacy

  • 25

    Ensuring data availability means matching network and computing resources to the volume of data access.

    Availability

  • 26

    Information needs to be accurate enough for the use to which it is going to be put.

    Accuracy

  • 27

    The quality or state of being genuine or original.

    Authenticity

  • 28

    The quality or state of having value for some purpose or end.

    Utility

  • 29

    The acquisition of information security is the state of having ownership control to object.

    Possession

  • 30

    Is a deliberate act (failure to act) with the intention of obtaining an unauthorized benefit, either for oneself or organization.

    Fraud

  • 31

    are emails typically arriving in chain letter fashion often describe impossible events, highly damaging malwareor urban legends. The intent is to frighten and mislead recepients and get them to forward to friends.

    Hoaxes

  • 32

    theft of personal information in order to commit fraud.

    Identify Theft

  • 33

    Defined as the compromise of computer systems and software to access the target computer and steal or misuse their sensitive information.

    System Hacking

  • 34

    information leakage

    Disclosure

  • 35

    It occurs when someone access the information without permission.

    Privacy Breach

  • 36

    Are rights given to a person over his creation. It usually give the creator an exclusive right over the use of his creation for a certain period of time.

    Intellectual Property Rights

  • 37

    According to the Intellectual Property Code of the Philippines (R. A. No. 8293 s. 1998), IPR consists of the following:

    Copyright , Trademark, Geographical Indications, Industrial Design, Patents, Layout Designs, Protection of undisclosed information

  • 38

    Is the government agency in charge of the implementation of law protecting intellectual property rights in the Philippines.

    Intellectual Property Office of the Philippines

  • 39

    What is the RA No. of IP Code of the Philippines?

    8293

  • 40

    What is the revised RA No. of IP Cose of the Philippines?

    10372

  • 41

    Is the process of converting data or information in such a way that only authorized parties xcan understand. It primary purpose is protect confidentiality.

    Encryption

  • 42

    Series of alphanumeric characters acting as key to denote that product software is original.

    Series Key (Product or Software Key)

  • 43

    Product keys used for product activation; helps maintain software authenticity by making sure no one else has used the same product key.

    Online activation

  • 44

    companis usually requires employees to sign contracts with _______________.

    non-disclosure agreemennts (NDAs)

  • 45

    Terms of Protection: Throughout the life of author + 50 years after death.

    Copyright

  • 46

    Terms of Protection: 20 years

    Patent

  • 47

    Terms of Protection: 10 years from the date filling of the application.

    Trademark

  • 48

    A small file that is sorted in the computer's directory that contains addresses of websites visited, login credentials, and credit card account numbers.

    Cookie

  • 49

    A policy regarding the computer's IP address and cookie information. Example: Google Mail, Facebook, etc.

    Oath's Privacy Policy (YAHOO)

  • 50

    Is considered as trusted website.

    YAHOO

  • 51

    This law is protecting the privacy of Filipino citizens, defines sensitive personal information, and all processing of personal information is prohibited unless certain circumstances.

    Data Privacy Act of 2012

  • 52

    What is the RA No. of Data Privacy Act of 2012?

    10173

  • 53

    Who signed and approved the Data Privacy Act of 2012?

    Pres. Benigno Aquino III

  • 54

    When was the Data Privacy Act of 2012 RA NO. 10173 was signed and approved?

    August 15, 2012

  • 55

    A movie being sold in different formats and mediums like DVD, Google Play, iTunes, etc.

    Non-rivalrous

  • 56

    The cost of producing the first may be substantial but the additional copies is negligible.

    Zero Marginal Cost

  • 57

    The capability of SMS and emails to be exactly forwarded to others without the idea of the sender. An example is the share button in Facebook or socmed.

    Non-exclusive

  • 58

    The consumer must experience it to value it.

    Experience Good

  • 59

    Gamin apps offers this goods like character equipment, gears, and level-up boost in exchange for e-money.

    Virtual Goods

  • 60

    It is when all the features of something come all together to create a a product.

    Convergence

  • 61

    "the scale of modern digital speech and content dissemination greatly complicates government efforts to control information flows."

    Thierer 2011

  • 62

    Wide scope of technology that speeds up and makes everything easy. Examples: Subtitles that takes days before to be delivered but is now accesible right away

    Scale

  • 63

    Increasin media contents

    Volume

  • 64

    The popularity of social media gives one a power to do everything under private accounts.

    Unpreccented Individual Empowerment

  • 65

    Additional information is possible and can be included.

    Expandable

  • 66

    The information can be shortened in details enough to be understood like one-liner headlines, abstract of research, etc.

    Compressible

  • 67

    By the use of digital platforms and internet, information can travel.

    Transportable

  • 68

    It can spread quickly regardless if true or not like gossips or rumors.

    Diffusive

  • 69

    It can be transferred to another if one want others to know it or not like the KFC secret recipe.

    Sharable

  • 70

    Information is considered as _____ and _______.

    valuable and life cycle

  • 71

    Information is similar in terms of the follwing: check the box that applies.

    its cost is controllable by accounting techniques, can be substituted , available in a standard type, grade, price with monetary equivalent. , has life cyle, valuable

  • 72

    Information is error-free.

    Accurate

  • 73

    It contains all important facts.

    Complete

  • 74

    Information should be relatively economical to produce.

    Economical

  • 75

    Information can be depended on.

    Reliable

  • 76

    Information can be used for different purposes.

    Flexible

  • 77

    Important to decision-maker, information has connection to what you're looking for.

    Relevant

  • 78

    not overly complex, sophistication, and detailed information are unnecessary

    Simple

  • 79

    Delivered when it is needed.

    Timely

  • 80

    Information can be checked for correctness and authenticity.

    Verifiable

  • 81

    Is available for everyone to use.

    Accessible

  • 82

    Away from unauthorized users.

    Secure