1.
______ is a combination fo communications provacy and data privacy.
Correct Answer
A. Information privacy
Explanation
Information privacy is the correct answer because it refers to the protection of personal information and data from unauthorized access, use, or disclosure. It encompasses both communication privacy, which involves the privacy of electronic communications, and data privacy, which focuses on the privacy of personal data collected and stored by organizations. Therefore, information privacy combines both aspects to ensure the confidentiality and security of sensitive information.
2.
According to the Childrens Online Privacy Act, a website that caters to children must:
Correct Answer
D. All of the above
Explanation
According to the Children's Online Privacy Act, a website that caters to children must offer a comprehensive privacy policy, notify parents or guardians about its data-collection practices, and receive parental consent before collecting any personal information from preteens. This means that all of the given options are correct and must be followed by a website that targets children in order to comply with the law.
3.
If some refuses to give an institution the right to collect and share personal data about oneself, he or she is said to be ________.
Correct Answer
C. Opt-out
Explanation
If someone refuses to give an institution the right to collect and share personal data about oneself, they are said to be "opt-out". This term refers to the act of choosing not to participate or be included in a particular activity or system. In this context, it means that the person is actively opting out of allowing their personal data to be collected and shared by the institution.
4.
The Electronic Communications Privacy Act deals with __________.
Correct Answer
C. The prohibition of devices to record dialing, routing, addressing and signaling information without a search warrant
Explanation
The correct answer is "the prohibition of devices to record dialing, routing, addressing and signaling information without a search warrant." The Electronic Communications Privacy Act (ECPA) is a United States federal law that was enacted to extend government restrictions on wire taps from telephone calls to include transmissions of electronic data by computer. It prohibits the interception or recording of certain electronic communications, such as dialing, routing, addressing, and signaling information, without a search warrant. This law aims to protect the privacy of electronic communications and prevent unauthorized access to personal information.
5.
What does the the USA Patriotic Act do?
Correct Answer
A. It gives powers to domestic and international intelligence to search telepHone, emails, or other records
Explanation
The correct answer is "It gives powers to domestic and international intelligence to search telephone, emails, or other records." The USA Patriotic Act grants the government the authority to collect intelligence information, including the ability to search and monitor communications such as telephone calls and emails. This act was passed in response to the 9/11 terrorist attacks and aimed to enhance national security by providing law enforcement agencies with expanded surveillance powers.
6.
What right does "The Freedom of information Act of 1996" give to citizens?
Correct Answer
C. The right to access certain information upon request
Explanation
The correct answer is the right to access certain information upon request. The Freedom of Information Act of 1996 grants citizens the ability to request and obtain specific information from government agencies. This law promotes transparency and accountability by allowing individuals to access public records, ensuring that citizens have the right to know about the workings of their government.
7.
______ occurs when someone steals key pieces of personal information.
Correct Answer
C. Identity theft
Explanation
Identity theft occurs when someone steals key pieces of personal information. This can include stealing someone's social security number, credit card information, or other personal identifiers. The thief then uses this stolen information to commit various fraudulent activities, such as making unauthorized purchases, opening new accounts, or even filing false tax returns. Identity theft can have severe consequences for the victim, including financial loss, damage to credit history, and potential legal issues. It is important for individuals to take steps to protect their personal information and monitor their accounts regularly to detect and prevent identity theft.
8.
What is the purpose of Identity Theft?
Correct Answer
B. To impersonate a person
Explanation
The purpose of identity theft is to impersonate a person. Identity thieves aim to assume someone else's identity by using their personal information, such as their name, Social Security number, or financial details, for fraudulent purposes. This can include accessing the victim's financial accounts, making unauthorized transactions, or committing various types of fraud under the victim's name. By impersonating the person, the identity thief can exploit their identity for personal gain, such as obtaining credit, making purchases, or engaging in illegal activities, while leaving the victim to deal with the consequences.
9.
What is data breach?
Correct Answer
C. Unauthorized access into large database of information
Explanation
The correct answer is unauthorized access into a large database of information. A data breach refers to a situation where an individual or entity gains unauthorized access to a database or system containing sensitive or confidential information. This breach can result in the theft, exposure, or compromise of data, potentially leading to various consequences such as identity theft, financial loss, or reputational damage.
10.
What is clicked-stream data?
Correct Answer
C. Information gathered by monitoring online activity
Explanation
Clicked-stream data refers to information that is collected by monitoring online activity. This data includes the actions taken by users while browsing the internet, such as the web pages visited, links clicked, and interactions with online content. It helps in analyzing user behavior, identifying patterns, and making data-driven decisions for improving user experience, marketing strategies, and website optimization. This data is typically collected using tracking technologies like cookies or through analytics tools integrated into websites and applications.
11.
The right to freedom of expression has been broadened by the Supreme Court tin include nonverbal, visual and symbolic forms of expression.
Correct Answer
A. True
Explanation
The Supreme Court has expanded the scope of freedom of expression to include nonverbal, visual, and symbolic forms of expression. This means that individuals have the right to express themselves not only through spoken or written words but also through actions, images, and symbols. This broader interpretation of freedom of expression recognizes that communication can take various forms and that individuals should be able to express their ideas and opinions in different ways.
12.
A written statement that is false and that harms another person is called ______.
Correct Answer
C. Libel
Explanation
Libel refers to a written statement that is false and harms another person's reputation. Unlike slander, which is spoken, libel specifically pertains to written or printed defamatory statements. Defamation is a broader term that encompasses both libel and slander. Therefore, in this context, libel is the most appropriate answer as it specifically addresses false written statements that harm someone's reputation.
13.
The best internet filters rely on the use of _________.
Correct Answer
C. Dynamic content filtering
Explanation
Dynamic content filtering is the best option for internet filters because it allows for real-time analysis and filtering of web content based on various factors such as keywords, URLs, and other dynamic elements. This type of filtering is more effective in blocking inappropriate or harmful content as it adapts to changes in web content and can identify and block new threats. URL filtering and keyword filtering are also important components of internet filters, but dynamic content filtering encompasses both of these methods and offers a more comprehensive approach to content filtering.
14.
Anonymous expression, or the expression of opinions by people who do not reveal their identities has been found as illegal.
Correct Answer
B. False
Explanation
The given statement is false. Anonymous expression or the expression of opinions by people who do not reveal their identities is not inherently illegal. While there may be certain situations or contexts where anonymous expression can be restricted or regulated by law, it is not universally illegal. In many jurisdictions, anonymous expression is protected as a form of free speech, allowing individuals to express their opinions without fear of retaliation or persecution.
15.
A lawsuit in which the true identity of the defendant is temporarily unknown is called John Lawsuit.
Correct Answer
B. False
Explanation
The statement is false because a lawsuit in which the true identity of the defendant is temporarily unknown is actually called a John Doe lawsuit, not a John Lawsuit. The term "John Doe" is commonly used as a placeholder name for an unidentified or unknown person in legal proceedings.
16.
In the Philippines setting, which of the following statements about internet pornography is true?
Correct Answer
D. All of the above
Explanation
In the Philippines setting, all of the statements about internet pornography are true. The country does not have established laws specifically addressing internet pornography, making it difficult to regulate. Additionally, minors can easily be exposed to pornography online due to the lack of strict regulations. Furthermore, the internet provides an easy and widespread platform for the distribution of pornography, further exacerbating the issue.
17.
Is defamation, slander and libel a freedom of expression?
Correct Answer
A. True
Explanation
Defamation, slander, and libel are not considered to be protected forms of freedom of expression. While freedom of expression is a fundamental right, it is not absolute and can be limited in certain cases. Defamation, slander, and libel involve making false statements about someone that harm their reputation, and these actions are generally not protected under freedom of expression as they can cause harm to individuals or their livelihoods. Therefore, the correct answer is False.
18.
What is the difference between defamation and slander?
Correct Answer(s)
A. Defamation is verbal lie that harms another person
B. Libel is a written lie that harms another people
Explanation
The explanation for the given correct answer is that defamation refers to any false statement made about someone that harms their reputation, and it can be either verbal or written. On the other hand, libel specifically refers to a false statement that is written or published, such as in a newspaper or online, which also harms someone's reputation. Therefore, defamation can encompass both verbal and written lies, while libel specifically refers to written lies.
19.
The Child Online Protection Act prohibited dissemination of harmful material to minors and was ruled unconstitutional.
Correct Answer
B. False
Explanation
The Child Online Protection Act (COPA) was indeed passed by the US Congress in 1998 to restrict the dissemination of harmful material to minors over the internet. However, it was not ruled unconstitutional. The Supreme Court upheld the constitutionality of COPA in 2002, but the case was then sent back to lower courts for further review. In 2009, COPA was finally struck down as unconstitutional by the Third Circuit Court of Appeals. Therefore, the correct answer is false.
20.
The most basic legal guarantee to the right of freedom of expression in the Philippines is ________.
Correct Answer
B. Democracy
Explanation
The most basic legal guarantee to the right of freedom of expression in the Philippines is democracy. Democracy is a political system that upholds the principles of individual rights and freedoms, including freedom of expression. In a democratic society, citizens have the right to express their opinions, ideas, and beliefs without fear of censorship or persecution. This fundamental aspect of democracy ensures that the people of the Philippines are able to voice their thoughts and participate in public discourse, contributing to a free and open society.
21.
_________ is a term used to describe works of the mind that are distinct and owned or created by a single person or group.
Correct Answer
C. Intellectual property
Explanation
Intellectual property refers to the creations of the mind that are unique and owned or produced by an individual or a group. This term encompasses various forms of intangible assets, such as inventions, literary and artistic works, designs, symbols, names, and images used in commerce. It grants exclusive rights to the creators or owners, allowing them to control and protect their creations from unauthorized use or exploitation by others. Intellectual property plays a crucial role in incentivizing innovation, creativity, and economic growth by providing legal protection and recognition to the creators' efforts and investments.
22.
A ________ is a form of protection for intellectual property that does noe require any disclosures or filing of an application.
Correct Answer
C. Trade secret
Explanation
A trade secret is a form of protection for intellectual property that does not require any disclosures or filing of an application. Unlike copyright, patent, and trademark, which require some form of registration or filing, a trade secret is protected simply by keeping the information confidential. This means that the owner of a trade secret does not need to disclose or file any information with a government agency in order to receive protection.
23.
A ______ allows portions fo the copyrighted materials to be used without permission under certain circumstances.
Correct Answer
C. Fair use doctrine
Explanation
The fair use doctrine is a legal principle that allows for the limited use of copyrighted materials without seeking permission from the copyright owner. It provides a balance between the rights of the copyright holder and the public's interest in accessing and using copyrighted works for purposes such as criticism, commentary, teaching, research, or news reporting. This doctrine recognizes that certain circumstances may warrant the use of copyrighted materials without infringing on the rights of the copyright holder.
24.
A __________ is an exclusive right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work.
Correct Answer
B. Copyright
Explanation
Copyright is the correct answer because it grants the exclusive rights to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work. This means that the creator of the work has the sole authority to control how it is used and can prevent others from using or reproducing it without permission.
25.
When does infringement occur?
Correct Answer
B. When a person copied a copyrighted material without permission
Explanation
Infringement occurs when a person copies a copyrighted material without permission. This means that the person is using someone else's work without obtaining the necessary rights or licenses to do so. This unauthorized copying is a violation of the copyright owner's exclusive rights and is considered illegal.
26.
Which of the following is an example of an intellectual property?
Correct Answer
D. All of the above
Explanation
All of the options provided are examples of intellectual property. Intellectual property refers to creations of the mind, such as inventions, designs, and processes, that are protected by law. A business process for handling medical insurance claims, a computer program, and the design for a computer microprocessor are all products of intellectual creativity and innovation, making them eligible for intellectual property protection. Therefore, all of the options listed are examples of intellectual property.
27.
Plagiarism is an issue in academia.
Correct Answer
A. True
Explanation
Plagiarism is indeed a significant issue in academia. It refers to the act of using someone else's work or ideas without giving them proper credit, which is considered unethical and a breach of academic integrity. Plagiarism can take various forms, such as copying and pasting text from sources without citation, paraphrasing without acknowledgment, or even self-plagiarism by reusing one's own work without permission. Educational institutions and researchers put great emphasis on detecting and preventing plagiarism to maintain the credibility and originality of academic work.
28.
The process of taking something apart in order to understand it, build a copy of it, or improve it is called ________.
Correct Answer
B. Reverse engineering
Explanation
Reverse engineering is the correct answer because it refers to the process of dismantling or deconstructing a product or system in order to understand its components, design, and functionality. This process can be used to create a copy of the original product, improve upon it, or gain insights into its inner workings. "Reverse programming" is not a commonly used term and "cracking and hacking" are not accurate descriptions of the process of taking something apart to understand it.
29.
Which of the following is true about open source code?
Correct Answer
B. Open source code is free to distribute and free to reverse engineer.
Explanation
Open source code refers to software whose source code is made available to the public, allowing anyone to view, modify, and distribute it. The answer states that open source code is free to distribute and free to reverse engineer. This means that individuals can share the code with others and examine its inner workings without any legal restrictions. Open source code encourages collaboration, innovation, and transparency within the software development community. It promotes the idea of sharing knowledge and empowering individuals to customize and improve software according to their needs.
30.
A _________ is a logo, package, design, phrase, sound or word that enables a consumer to differentiate one company's products to another.
Correct Answer
C. Trademark
Explanation
A trademark is a logo, package, design, phrase, sound, or word that enables a consumer to differentiate one company's products from another. It serves as a unique identifier for a company's goods or services, helping consumers recognize and associate them with a specific brand. Unlike copyright, which protects original works of authorship, and signs, which are more general in nature, trademarks specifically focus on distinguishing products and creating brand recognition in the market.