Midterm Exam - It104

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Anthzila
A
Anthzila
Community Contributor
Quizzes Created: 35 | Total Attempts: 44,051
Questions: 30 | Attempts: 78

SettingsSettingsSettings
Midterm Exam - It104 - Quiz


Midterm exam for IT104.


Questions and Answers
  • 1. 

    ______ is a combination fo communications provacy and data privacy.

    • A.

      Information privacy

    • B.

      Privacy

    • C.

      Intellectual rights

    Correct Answer
    A. Information privacy
    Explanation
    Information privacy is the correct answer because it refers to the protection of personal information and data from unauthorized access, use, or disclosure. It encompasses both communication privacy, which involves the privacy of electronic communications, and data privacy, which focuses on the privacy of personal data collected and stored by organizations. Therefore, information privacy combines both aspects to ensure the confidentiality and security of sensitive information.

    Rate this question:

  • 2. 

    According to the Childrens Online Privacy Act, a website that caters to children must:

    • A.

      Offer comprehensive privacy policy

    • B.

      Notify parents or guardians about its data-collection practices

    • C.

      Receive parental consent before collecting any personal information from preteens

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    According to the Children's Online Privacy Act, a website that caters to children must offer a comprehensive privacy policy, notify parents or guardians about its data-collection practices, and receive parental consent before collecting any personal information from preteens. This means that all of the given options are correct and must be followed by a website that targets children in order to comply with the law.

    Rate this question:

  • 3. 

    If some refuses to give an institution the right to collect and share personal data about oneself, he or she is said to be ________.

    • A.

      Private

    • B.

      Aloft

    • C.

      Opt-out

    Correct Answer
    C. Opt-out
    Explanation
    If someone refuses to give an institution the right to collect and share personal data about oneself, they are said to be "opt-out". This term refers to the act of choosing not to participate or be included in a particular activity or system. In this context, it means that the person is actively opting out of allowing their personal data to be collected and shared by the institution.

    Rate this question:

  • 4. 

    The Electronic Communications Privacy Act deals with __________.

    • A.

      The protection of communications in transit from sender to receiver

    • B.

      The protection of communications held in electronic storage

    • C.

      The prohibition of devices to record dialing, routing, addressing and signaling information without a search warrant

    • D.

      All of the above

    Correct Answer
    C. The prohibition of devices to record dialing, routing, addressing and signaling information without a search warrant
    Explanation
    The correct answer is "the prohibition of devices to record dialing, routing, addressing and signaling information without a search warrant." The Electronic Communications Privacy Act (ECPA) is a United States federal law that was enacted to extend government restrictions on wire taps from telephone calls to include transmissions of electronic data by computer. It prohibits the interception or recording of certain electronic communications, such as dialing, routing, addressing, and signaling information, without a search warrant. This law aims to protect the privacy of electronic communications and prevent unauthorized access to personal information.

    Rate this question:

  • 5. 

    What does the the USA Patriotic Act do?

    • A.

      It gives powers to domestic and international intelligence to search telephone, emails, or other records

    • B.

      It gives permission for FBI agents to search data without warrant

    • C.

      It tracks down terrorists

    • D.

      All of the above

    Correct Answer
    A. It gives powers to domestic and international intelligence to search telepHone, emails, or other records
    Explanation
    The correct answer is "It gives powers to domestic and international intelligence to search telephone, emails, or other records." The USA Patriotic Act grants the government the authority to collect intelligence information, including the ability to search and monitor communications such as telephone calls and emails. This act was passed in response to the 9/11 terrorist attacks and aimed to enhance national security by providing law enforcement agencies with expanded surveillance powers.

    Rate this question:

  • 6. 

    What right does "The Freedom of information Act of 1996" give to citizens?

    • A.

      The freedom to access private information

    • B.

      The freedom for access to public documents

    • C.

      The right to access certain information upon request

    Correct Answer
    C. The right to access certain information upon request
    Explanation
    The correct answer is the right to access certain information upon request. The Freedom of Information Act of 1996 grants citizens the ability to request and obtain specific information from government agencies. This law promotes transparency and accountability by allowing individuals to access public records, ensuring that citizens have the right to know about the workings of their government.

    Rate this question:

  • 7. 

    ______ occurs when someone steals key pieces of personal information.

    • A.

      Theft

    • B.

      Robbery

    • C.

      Identity theft

    Correct Answer
    C. Identity theft
    Explanation
    Identity theft occurs when someone steals key pieces of personal information. This can include stealing someone's social security number, credit card information, or other personal identifiers. The thief then uses this stolen information to commit various fraudulent activities, such as making unauthorized purchases, opening new accounts, or even filing false tax returns. Identity theft can have severe consequences for the victim, including financial loss, damage to credit history, and potential legal issues. It is important for individuals to take steps to protect their personal information and monitor their accounts regularly to detect and prevent identity theft.

    Rate this question:

  • 8. 

    What is the purpose of Identity Theft?

    • A.

      To steal someones data

    • B.

      To impersonate a person

    • C.

      To spread a virus

    Correct Answer
    B. To impersonate a person
    Explanation
    The purpose of identity theft is to impersonate a person. Identity thieves aim to assume someone else's identity by using their personal information, such as their name, Social Security number, or financial details, for fraudulent purposes. This can include accessing the victim's financial accounts, making unauthorized transactions, or committing various types of fraud under the victim's name. By impersonating the person, the identity thief can exploit their identity for personal gain, such as obtaining credit, making purchases, or engaging in illegal activities, while leaving the victim to deal with the consequences.

    Rate this question:

  • 9. 

    What is data breach?

    • A.

      Stealing of online information

    • B.

      Identity theft to impersonate a person

    • C.

      Unauthorized access into large database of information

    Correct Answer
    C. Unauthorized access into large database of information
    Explanation
    The correct answer is unauthorized access into a large database of information. A data breach refers to a situation where an individual or entity gains unauthorized access to a database or system containing sensitive or confidential information. This breach can result in the theft, exposure, or compromise of data, potentially leading to various consequences such as identity theft, financial loss, or reputational damage.

    Rate this question:

  • 10. 

    What is clicked-stream data?

    • A.

      Information gathered from the government

    • B.

      Information gathered from hackers

    • C.

      Information gathered by monitoring online activity

    Correct Answer
    C. Information gathered by monitoring online activity
    Explanation
    Clicked-stream data refers to information that is collected by monitoring online activity. This data includes the actions taken by users while browsing the internet, such as the web pages visited, links clicked, and interactions with online content. It helps in analyzing user behavior, identifying patterns, and making data-driven decisions for improving user experience, marketing strategies, and website optimization. This data is typically collected using tracking technologies like cookies or through analytics tools integrated into websites and applications.

    Rate this question:

  • 11. 

    The right to freedom of expression has been broadened by the Supreme Court tin include nonverbal, visual and symbolic forms of expression.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The Supreme Court has expanded the scope of freedom of expression to include nonverbal, visual, and symbolic forms of expression. This means that individuals have the right to express themselves not only through spoken or written words but also through actions, images, and symbols. This broader interpretation of freedom of expression recognizes that communication can take various forms and that individuals should be able to express their ideas and opinions in different ways.

    Rate this question:

  • 12. 

    A written statement that is false and that harms another person is called ______.

    • A.

      A lie

    • B.

      Slander

    • C.

      Libel

    • D.

      Defamation

    Correct Answer
    C. Libel
    Explanation
    Libel refers to a written statement that is false and harms another person's reputation. Unlike slander, which is spoken, libel specifically pertains to written or printed defamatory statements. Defamation is a broader term that encompasses both libel and slander. Therefore, in this context, libel is the most appropriate answer as it specifically addresses false written statements that harm someone's reputation.

    Rate this question:

  • 13. 

    The best internet filters rely on the use of _________.

    • A.

      URL filtering

    • B.

      Keyword filtering

    • C.

      Dynamic content filtering

    • D.

      All of the above

    Correct Answer
    C. Dynamic content filtering
    Explanation
    Dynamic content filtering is the best option for internet filters because it allows for real-time analysis and filtering of web content based on various factors such as keywords, URLs, and other dynamic elements. This type of filtering is more effective in blocking inappropriate or harmful content as it adapts to changes in web content and can identify and block new threats. URL filtering and keyword filtering are also important components of internet filters, but dynamic content filtering encompasses both of these methods and offers a more comprehensive approach to content filtering.

    Rate this question:

  • 14. 

    Anonymous expression, or the expression of opinions by people who do not reveal their identities has been found as illegal.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The given statement is false. Anonymous expression or the expression of opinions by people who do not reveal their identities is not inherently illegal. While there may be certain situations or contexts where anonymous expression can be restricted or regulated by law, it is not universally illegal. In many jurisdictions, anonymous expression is protected as a form of free speech, allowing individuals to express their opinions without fear of retaliation or persecution.

    Rate this question:

  • 15. 

    A lawsuit in which the true identity of the defendant is temporarily unknown is called John Lawsuit.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because a lawsuit in which the true identity of the defendant is temporarily unknown is actually called a John Doe lawsuit, not a John Lawsuit. The term "John Doe" is commonly used as a placeholder name for an unidentified or unknown person in legal proceedings.

    Rate this question:

  • 16. 

    In the Philippines setting, which of the following statements about internet pornography is true?

    • A.

      It has no established laws for internet pornography

    • B.

      Minors can be easily exposed to porn.

    • C.

      Pornography can be easily distributed through the internet

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    In the Philippines setting, all of the statements about internet pornography are true. The country does not have established laws specifically addressing internet pornography, making it difficult to regulate. Additionally, minors can easily be exposed to pornography online due to the lack of strict regulations. Furthermore, the internet provides an easy and widespread platform for the distribution of pornography, further exacerbating the issue.

    Rate this question:

  • 17. 

    Is defamation, slander and libel a freedom of expression?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Defamation, slander, and libel are not considered to be protected forms of freedom of expression. While freedom of expression is a fundamental right, it is not absolute and can be limited in certain cases. Defamation, slander, and libel involve making false statements about someone that harm their reputation, and these actions are generally not protected under freedom of expression as they can cause harm to individuals or their livelihoods. Therefore, the correct answer is False.

    Rate this question:

  • 18. 

    What is the difference between defamation and slander?

    • A.

      Defamation is verbal lie that harms another person

    • B.

      Libel is a written lie that harms another people

    • C.

      Defamation is a written lie

    • D.

      Libel is verbal in nature that harms another person.

    Correct Answer(s)
    A. Defamation is verbal lie that harms another person
    B. Libel is a written lie that harms another people
    Explanation
    The explanation for the given correct answer is that defamation refers to any false statement made about someone that harms their reputation, and it can be either verbal or written. On the other hand, libel specifically refers to a false statement that is written or published, such as in a newspaper or online, which also harms someone's reputation. Therefore, defamation can encompass both verbal and written lies, while libel specifically refers to written lies.

    Rate this question:

  • 19. 

    The Child Online Protection Act prohibited dissemination of harmful material to minors and was ruled unconstitutional.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The Child Online Protection Act (COPA) was indeed passed by the US Congress in 1998 to restrict the dissemination of harmful material to minors over the internet. However, it was not ruled unconstitutional. The Supreme Court upheld the constitutionality of COPA in 2002, but the case was then sent back to lower courts for further review. In 2009, COPA was finally struck down as unconstitutional by the Third Circuit Court of Appeals. Therefore, the correct answer is false.

    Rate this question:

  • 20. 

    The most basic legal guarantee to the right of freedom of expression in the Philippines is ________.

    • A.

      Communism

    • B.

      Democracy

    • C.

      Socialism

    Correct Answer
    B. Democracy
    Explanation
    The most basic legal guarantee to the right of freedom of expression in the Philippines is democracy. Democracy is a political system that upholds the principles of individual rights and freedoms, including freedom of expression. In a democratic society, citizens have the right to express their opinions, ideas, and beliefs without fear of censorship or persecution. This fundamental aspect of democracy ensures that the people of the Philippines are able to voice their thoughts and participate in public discourse, contributing to a free and open society.

    Rate this question:

  • 21. 

    _________ is a term used to describe works of the mind that are distinct and owned or created by a single person or group.

    • A.

      Intellectual rights

    • B.

      Privacy

    • C.

      Intellectual property

    Correct Answer
    C. Intellectual property
    Explanation
    Intellectual property refers to the creations of the mind that are unique and owned or produced by an individual or a group. This term encompasses various forms of intangible assets, such as inventions, literary and artistic works, designs, symbols, names, and images used in commerce. It grants exclusive rights to the creators or owners, allowing them to control and protect their creations from unauthorized use or exploitation by others. Intellectual property plays a crucial role in incentivizing innovation, creativity, and economic growth by providing legal protection and recognition to the creators' efforts and investments.

    Rate this question:

  • 22. 

    A ________ is a form of protection for intellectual property that does noe require any disclosures or filing  of an application.

    • A.

      Copyright

    • B.

      Patent

    • C.

      Trade secret

    • D.

      Trademark

    Correct Answer
    C. Trade secret
    Explanation
    A trade secret is a form of protection for intellectual property that does not require any disclosures or filing of an application. Unlike copyright, patent, and trademark, which require some form of registration or filing, a trade secret is protected simply by keeping the information confidential. This means that the owner of a trade secret does not need to disclose or file any information with a government agency in order to receive protection.

    Rate this question:

  • 23. 

    A ______ allows portions fo the copyrighted materials to be used without permission under certain circumstances.

    • A.

      Patent

    • B.

      Copyright

    • C.

      Fair use doctrine

    Correct Answer
    C. Fair use doctrine
    Explanation
    The fair use doctrine is a legal principle that allows for the limited use of copyrighted materials without seeking permission from the copyright owner. It provides a balance between the rights of the copyright holder and the public's interest in accessing and using copyrighted works for purposes such as criticism, commentary, teaching, research, or news reporting. This doctrine recognizes that certain circumstances may warrant the use of copyrighted materials without infringing on the rights of the copyright holder.

    Rate this question:

  • 24. 

    A __________ is an exclusive right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work.

    • A.

      Patent

    • B.

      Copyright

    • C.

      Fair use doctrine

    Correct Answer
    B. Copyright
    Explanation
    Copyright is the correct answer because it grants the exclusive rights to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work. This means that the creator of the work has the sole authority to control how it is used and can prevent others from using or reproducing it without permission.

    Rate this question:

  • 25. 

    When does infringement occur?

    • A.

      When a person copied a copyrighted material with permission

    • B.

      When a person copied a copyrighted material without permission

    • C.

      When a person distributes a copyrighted material with permission

    Correct Answer
    B. When a person copied a copyrighted material without permission
    Explanation
    Infringement occurs when a person copies a copyrighted material without permission. This means that the person is using someone else's work without obtaining the necessary rights or licenses to do so. This unauthorized copying is a violation of the copyright owner's exclusive rights and is considered illegal.

    Rate this question:

  • 26. 

    Which of the following is an example of an intellectual property?

    • A.

      A business process for the efficient handling of medical insurance claims

    • B.

      A computer program

    • C.

      The design for a computer microprocessor

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    All of the options provided are examples of intellectual property. Intellectual property refers to creations of the mind, such as inventions, designs, and processes, that are protected by law. A business process for handling medical insurance claims, a computer program, and the design for a computer microprocessor are all products of intellectual creativity and innovation, making them eligible for intellectual property protection. Therefore, all of the options listed are examples of intellectual property.

    Rate this question:

  • 27. 

    Plagiarism is an issue in academia.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Plagiarism is indeed a significant issue in academia. It refers to the act of using someone else's work or ideas without giving them proper credit, which is considered unethical and a breach of academic integrity. Plagiarism can take various forms, such as copying and pasting text from sources without citation, paraphrasing without acknowledgment, or even self-plagiarism by reusing one's own work without permission. Educational institutions and researchers put great emphasis on detecting and preventing plagiarism to maintain the credibility and originality of academic work.

    Rate this question:

  • 28. 

    The process of taking something apart in order to understand it, build a copy of it, or improve it is called ________.

    • A.

      Reverse programming

    • B.

      Reverse engineering

    • C.

      Cracking and hacking

    • D.

      All of the above

    Correct Answer
    B. Reverse engineering
    Explanation
    Reverse engineering is the correct answer because it refers to the process of dismantling or deconstructing a product or system in order to understand its components, design, and functionality. This process can be used to create a copy of the original product, improve upon it, or gain insights into its inner workings. "Reverse programming" is not a commonly used term and "cracking and hacking" are not accurate descriptions of the process of taking something apart to understand it.

    Rate this question:

  • 29. 

    Which of the following is true about open source code?

    • A.

      There is only one definition of source code.

    • B.

      Open source code is free to distribute and free to reverse engineer.

    • C.

      Putting open source code to a public domain is illegal.

    Correct Answer
    B. Open source code is free to distribute and free to reverse engineer.
    Explanation
    Open source code refers to software whose source code is made available to the public, allowing anyone to view, modify, and distribute it. The answer states that open source code is free to distribute and free to reverse engineer. This means that individuals can share the code with others and examine its inner workings without any legal restrictions. Open source code encourages collaboration, innovation, and transparency within the software development community. It promotes the idea of sharing knowledge and empowering individuals to customize and improve software according to their needs.

    Rate this question:

  • 30. 

    A _________ is a logo, package, design, phrase, sound or word that enables a consumer to differentiate one company's products to another.

    • A.

      Copyright

    • B.

      Sign

    • C.

      Trademark

    Correct Answer
    C. Trademark
    Explanation
    A trademark is a logo, package, design, phrase, sound, or word that enables a consumer to differentiate one company's products from another. It serves as a unique identifier for a company's goods or services, helping consumers recognize and associate them with a specific brand. Unlike copyright, which protects original works of authorship, and signs, which are more general in nature, trademarks specifically focus on distinguishing products and creating brand recognition in the market.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Oct 12, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 02, 2012
    Quiz Created by
    Anthzila
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.