記憶度
12問
30問
0問
0問
0問
アカウント登録して、解答結果を保存しよう
問題一覧
1
Are non-tangible and considered valuable for what they present. Example is money which represents monetary value.
Conceptual Resources
2
They are tangible and can be easily identified.
Physical Resources
3
Are the total means available to a company for increasing production or profit, including land, labor, capital, and raw materials.
Resources
4
Is a set of exclusive rights granted by a state to the creator of an "original work" for a limited period in exchange for public disclosure of the work, and includes the rights to copy, distribute, and adapt the work.
Copyright
5
Is done to hide sensitive information from unauthorized users.
Data Scrambling
6
Pertain to the permission of individuals to legitimately perform actions involving the use of a computer, any electronic device, or a communication network.
Digital Rights
7
is used to describe the processes by which the author or publisher of a work exerts his rights to control what the purchaser of his work is entitled to do.
Digital Rights Management
8
are considered relevant truths which have been validated and identified
Facts
9
It refere to processed data.
Information
10
Is allowing those who have appropriate authority access to and use information on the basis of the authority that they hold.
Information Control
11
Is a number of distinct types of intangible assets of which a sst of exclusive rights are recognized.
Intellectual property
12
It refers to useful information
Knowledge
13
Is used to identify the owner's name, author, and date of purchase, among other pertinient pieces of information.
Metadata
14
Is the delivery of electronic commerce capabilities directly into the consumer's hand, anywhere, via wireless technology.
Mobile Commerce (m-commerce)
15
Is a set of exclusive rights granted by a state to an inventor for a limited period of time in exchange for public disclosure of an "invention". *right to prevent others from making, selling, or distributing the invetion without permission
Patent
16
Is a subset of a security breach that actually leads to accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or processed.
Personal data breach
17
Is accomplished by the addition of components to the original signal or changing some important components of original signal in order to make extraction of the original signal difficult.
Scrambling
18
Is an event or occurence that affects or tends to affect the data protection, or may compromise availability, integrity, or confidentiality.
Security Incident
19
Is the unauthorized copying or distribution of copyrighted software. It can be done through copying, downloading, sharing, selling or installing multiple copies of software onto personal or work computers.
Software Piracy
20
Is a term used for any method, formula, devie, process or any information that gives a business a unique competitive advantage over its competitors.
Trade Secret
21
Is an distinctive sign used by an individual, business, organization, or legal entity to identify products or services.
Trademark
22
Is a set of practices intended to keep data secure from unauthorized access or alterations, both when it's being transmitted from one machine or physical location to another.
Information Security (Infosec)
23
Is a set of strategies and processes you can use to secure the privacy, availability, and integrity of your data.
Data Protection
24
Is a discipline intended to keep data safe against improper accees, theft or loss.
Data Privacy
25
Ensuring data availability means matching network and computing resources to the volume of data access.
Availability
26
Information needs to be accurate enough for the use to which it is going to be put.
Accuracy
27
The quality or state of being genuine or original.
Authenticity
28
The quality or state of having value for some purpose or end.
Utility
29
The acquisition of information security is the state of having ownership control to object.
Possession
30
Is a deliberate act (failure to act) with the intention of obtaining an unauthorized benefit, either for oneself or organization.
Fraud
31
are emails typically arriving in chain letter fashion often describe impossible events, highly damaging malwareor urban legends. The intent is to frighten and mislead recepients and get them to forward to friends.
Hoaxes
32
theft of personal information in order to commit fraud.
Identify Theft
33
Defined as the compromise of computer systems and software to access the target computer and steal or misuse their sensitive information.
System Hacking
34
information leakage
Disclosure
35
It occurs when someone access the information without permission.
Privacy Breach
36
Are rights given to a person over his creation. It usually give the creator an exclusive right over the use of his creation for a certain period of time.
Intellectual Property Rights
37
According to the Intellectual Property Code of the Philippines (R. A. No. 8293 s. 1998), IPR consists of the following:
Copyright , Trademark, Geographical Indications, Industrial Design, Patents, Layout Designs, Protection of undisclosed information
38
Is the government agency in charge of the implementation of law protecting intellectual property rights in the Philippines.
Intellectual Property Office of the Philippines
39
What is the RA No. of IP Code of the Philippines?
8293
40
What is the revised RA No. of IP Cose of the Philippines?
10372
41
Is the process of converting data or information in such a way that only authorized parties xcan understand. It primary purpose is protect confidentiality.
Encryption
42
Series of alphanumeric characters acting as key to denote that product software is original.
Series Key (Product or Software Key)
43
Product keys used for product activation; helps maintain software authenticity by making sure no one else has used the same product key.
Online activation
44
companis usually requires employees to sign contracts with _______________.
non-disclosure agreemennts (NDAs)
45
Terms of Protection: Throughout the life of author + 50 years after death.
Copyright
46
Terms of Protection: 20 years
Patent
47
Terms of Protection: 10 years from the date filling of the application.
Trademark
48
A small file that is sorted in the computer's directory that contains addresses of websites visited, login credentials, and credit card account numbers.
Cookie
49
A policy regarding the computer's IP address and cookie information. Example: Google Mail, Facebook, etc.
Oath's Privacy Policy (YAHOO)
50
Is considered as trusted website.
YAHOO
51
This law is protecting the privacy of Filipino citizens, defines sensitive personal information, and all processing of personal information is prohibited unless certain circumstances.
Data Privacy Act of 2012
52
What is the RA No. of Data Privacy Act of 2012?
10173
53
Who signed and approved the Data Privacy Act of 2012?
Pres. Benigno Aquino III
54
When was the Data Privacy Act of 2012 RA NO. 10173 was signed and approved?
August 15, 2012
55
A movie being sold in different formats and mediums like DVD, Google Play, iTunes, etc.
Non-rivalrous
56
The cost of producing the first may be substantial but the additional copies is negligible.
Zero Marginal Cost
57
The capability of SMS and emails to be exactly forwarded to others without the idea of the sender. An example is the share button in Facebook or socmed.
Non-exclusive
58
The consumer must experience it to value it.
Experience Good
59
Gamin apps offers this goods like character equipment, gears, and level-up boost in exchange for e-money.
Virtual Goods
60
It is when all the features of something come all together to create a a product.
Convergence
61
"the scale of modern digital speech and content dissemination greatly complicates government efforts to control information flows."
Thierer 2011
62
Wide scope of technology that speeds up and makes everything easy. Examples: Subtitles that takes days before to be delivered but is now accesible right away
Scale
63
Increasin media contents
Volume
64
The popularity of social media gives one a power to do everything under private accounts.
Unpreccented Individual Empowerment
65
Additional information is possible and can be included.
Expandable
66
The information can be shortened in details enough to be understood like one-liner headlines, abstract of research, etc.
Compressible
67
By the use of digital platforms and internet, information can travel.
Transportable
68
It can spread quickly regardless if true or not like gossips or rumors.
Diffusive
69
It can be transferred to another if one want others to know it or not like the KFC secret recipe.
Sharable
70
Information is considered as _____ and _______.
valuable and life cycle
71
Information is similar in terms of the follwing: check the box that applies.
its cost is controllable by accounting techniques, can be substituted , available in a standard type, grade, price with monetary equivalent. , has life cyle, valuable
72
Information is error-free.
Accurate
73
It contains all important facts.
Complete
74
Information should be relatively economical to produce.
Economical
75
Information can be depended on.
Reliable
76
Information can be used for different purposes.
Flexible
77
Important to decision-maker, information has connection to what you're looking for.
Relevant
78
not overly complex, sophistication, and detailed information are unnecessary
Simple
79
Delivered when it is needed.
Timely
80
Information can be checked for correctness and authenticity.
Verifiable
81
Is available for everyone to use.
Accessible
82
Away from unauthorized users.
Secure