暗記メーカー
ログイン
LITE - (Chapter 4 - Information, Control, and Privacy) MIDTERM
  • REMSON RELUCIO

  • 問題数 82 • 11/4/2023

    記憶度

    完璧

    12

    覚えた

    30

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    Information is considered as _____ and _______.

    valuable and life cycle

  • 2

    Wide scope of technology that speeds up and makes everything easy. Examples: Subtitles that takes days before to be delivered but is now accesible right away

    Scale

  • 3

    Information should be relatively economical to produce.

    Economical

  • 4

    By the use of digital platforms and internet, information can travel.

    Transportable

  • 5

    It is when all the features of something come all together to create a a product.

    Convergence

  • 6

    Gamin apps offers this goods like character equipment, gears, and level-up boost in exchange for e-money.

    Virtual Goods

  • 7

    Is a set of strategies and processes you can use to secure the privacy, availability, and integrity of your data.

    Data Protection

  • 8

    Is a discipline intended to keep data safe against improper accees, theft or loss.

    Data Privacy

  • 9

    Important to decision-maker, information has connection to what you're looking for.

    Relevant

  • 10

    Is a subset of a security breach that actually leads to accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or processed.

    Personal data breach

  • 11

    Away from unauthorized users.

    Secure

  • 12

    They are tangible and can be easily identified.

    Physical Resources

  • 13

    Is an event or occurence that affects or tends to affect the data protection, or may compromise availability, integrity, or confidentiality.

    Security Incident

  • 14

    Is the delivery of electronic commerce capabilities directly into the consumer's hand, anywhere, via wireless technology.

    Mobile Commerce (m-commerce)

  • 15

    The quality or state of being genuine or original.

    Authenticity

  • 16

    Is the government agency in charge of the implementation of law protecting intellectual property rights in the Philippines.

    Intellectual Property Office of the Philippines

  • 17

    is used to describe the processes by which the author or publisher of a work exerts his rights to control what the purchaser of his work is entitled to do.

    Digital Rights Management

  • 18

    Terms of Protection: 10 years from the date filling of the application.

    Trademark

  • 19

    Additional information is possible and can be included.

    Expandable

  • 20

    Information can be depended on.

    Reliable

  • 21

    Is a term used for any method, formula, devie, process or any information that gives a business a unique competitive advantage over its competitors.

    Trade Secret

  • 22

    The quality or state of having value for some purpose or end.

    Utility

  • 23

    theft of personal information in order to commit fraud.

    Identify Theft

  • 24

    Increasin media contents

    Volume

  • 25

    The information can be shortened in details enough to be understood like one-liner headlines, abstract of research, etc.

    Compressible

  • 26

    Is a number of distinct types of intangible assets of which a sst of exclusive rights are recognized.

    Intellectual property

  • 27

    Is considered as trusted website.

    YAHOO

  • 28

    information leakage

    Disclosure

  • 29

    Is a deliberate act (failure to act) with the intention of obtaining an unauthorized benefit, either for oneself or organization.

    Fraud

  • 30

    Is used to identify the owner's name, author, and date of purchase, among other pertinient pieces of information.

    Metadata

  • 31

    Is a set of exclusive rights granted by a state to the creator of an "original work" for a limited period in exchange for public disclosure of the work, and includes the rights to copy, distribute, and adapt the work.

    Copyright

  • 32

    Product keys used for product activation; helps maintain software authenticity by making sure no one else has used the same product key.

    Online activation

  • 33

    The capability of SMS and emails to be exactly forwarded to others without the idea of the sender. An example is the share button in Facebook or socmed.

    Non-exclusive

  • 34

    It can be transferred to another if one want others to know it or not like the KFC secret recipe.

    Sharable

  • 35

    It can spread quickly regardless if true or not like gossips or rumors.

    Diffusive

  • 36

    are emails typically arriving in chain letter fashion often describe impossible events, highly damaging malwareor urban legends. The intent is to frighten and mislead recepients and get them to forward to friends.

    Hoaxes

  • 37

    When was the Data Privacy Act of 2012 RA NO. 10173 was signed and approved?

    August 15, 2012

  • 38

    A small file that is sorted in the computer's directory that contains addresses of websites visited, login credentials, and credit card account numbers.

    Cookie

  • 39

    Information is similar in terms of the follwing: check the box that applies.

    its cost is controllable by accounting techniques, can be substituted , available in a standard type, grade, price with monetary equivalent. , has life cyle, valuable

  • 40

    According to the Intellectual Property Code of the Philippines (R. A. No. 8293 s. 1998), IPR consists of the following:

    Copyright , Trademark, Geographical Indications, Industrial Design, Patents, Layout Designs, Protection of undisclosed information

  • 41

    Are rights given to a person over his creation. It usually give the creator an exclusive right over the use of his creation for a certain period of time.

    Intellectual Property Rights

  • 42

    The consumer must experience it to value it.

    Experience Good

  • 43

    It refere to processed data.

    Information

  • 44

    Is done to hide sensitive information from unauthorized users.

    Data Scrambling

  • 45

    The cost of producing the first may be substantial but the additional copies is negligible.

    Zero Marginal Cost

  • 46

    Terms of Protection: Throughout the life of author + 50 years after death.

    Copyright

  • 47

    The acquisition of information security is the state of having ownership control to object.

    Possession

  • 48

    companis usually requires employees to sign contracts with _______________.

    non-disclosure agreemennts (NDAs)

  • 49

    Is an distinctive sign used by an individual, business, organization, or legal entity to identify products or services.

    Trademark

  • 50

    Who signed and approved the Data Privacy Act of 2012?

    Pres. Benigno Aquino III

  • 51

    This law is protecting the privacy of Filipino citizens, defines sensitive personal information, and all processing of personal information is prohibited unless certain circumstances.

    Data Privacy Act of 2012

  • 52

    What is the RA No. of Data Privacy Act of 2012?

    10173

  • 53

    It refers to useful information

    Knowledge

  • 54

    Pertain to the permission of individuals to legitimately perform actions involving the use of a computer, any electronic device, or a communication network.

    Digital Rights

  • 55

    Delivered when it is needed.

    Timely

  • 56

    not overly complex, sophistication, and detailed information are unnecessary

    Simple

  • 57

    Is available for everyone to use.

    Accessible

  • 58

    Series of alphanumeric characters acting as key to denote that product software is original.

    Series Key (Product or Software Key)

  • 59

    Is a set of exclusive rights granted by a state to an inventor for a limited period of time in exchange for public disclosure of an "invention". *right to prevent others from making, selling, or distributing the invetion without permission

    Patent

  • 60

    Defined as the compromise of computer systems and software to access the target computer and steal or misuse their sensitive information.

    System Hacking

  • 61

    Are non-tangible and considered valuable for what they present. Example is money which represents monetary value.

    Conceptual Resources

  • 62

    What is the RA No. of IP Code of the Philippines?

    8293

  • 63

    Information can be used for different purposes.

    Flexible

  • 64

    Are the total means available to a company for increasing production or profit, including land, labor, capital, and raw materials.

    Resources

  • 65

    What is the revised RA No. of IP Cose of the Philippines?

    10372

  • 66

    Information needs to be accurate enough for the use to which it is going to be put.

    Accuracy

  • 67

    Is accomplished by the addition of components to the original signal or changing some important components of original signal in order to make extraction of the original signal difficult.

    Scrambling

  • 68

    Is a set of practices intended to keep data secure from unauthorized access or alterations, both when it's being transmitted from one machine or physical location to another.

    Information Security (Infosec)

  • 69

    "the scale of modern digital speech and content dissemination greatly complicates government efforts to control information flows."

    Thierer 2011

  • 70

    It occurs when someone access the information without permission.

    Privacy Breach

  • 71

    A policy regarding the computer's IP address and cookie information. Example: Google Mail, Facebook, etc.

    Oath's Privacy Policy (YAHOO)

  • 72

    Information is error-free.

    Accurate

  • 73

    Is the process of converting data or information in such a way that only authorized parties xcan understand. It primary purpose is protect confidentiality.

    Encryption

  • 74

    Is the unauthorized copying or distribution of copyrighted software. It can be done through copying, downloading, sharing, selling or installing multiple copies of software onto personal or work computers.

    Software Piracy

  • 75

    A movie being sold in different formats and mediums like DVD, Google Play, iTunes, etc.

    Non-rivalrous

  • 76

    Information can be checked for correctness and authenticity.

    Verifiable

  • 77

    are considered relevant truths which have been validated and identified

    Facts

  • 78

    The popularity of social media gives one a power to do everything under private accounts.

    Unpreccented Individual Empowerment

  • 79

    Is allowing those who have appropriate authority access to and use information on the basis of the authority that they hold.

    Information Control

  • 80

    Ensuring data availability means matching network and computing resources to the volume of data access.

    Availability

  • 81

    It contains all important facts.

    Complete

  • 82

    Terms of Protection: 20 years

    Patent