You are on page 1of 4

SCORE

_______
50

JOSE RIZAL UNIVERSITY


Final Exam

Name:
Subject/Section:

Day/Time:
Professor:

MELJUN P. CORTES

STRICTLY NO ERASURES ERASURES ARE CONSIDERED WRONG

I.

MATCHING TYPE: [Knowledge Level and Analysis Level] (1 point each


20 points)
Choose the correct answer from the table above, write your answer beside each
number clearly.

purpose
specification
openness
principle
Encryption
collection
limitation
Carnivore

data quality

get data

click-stream
data
use limitation
freedom of
information act
private key
encryption
system

security
safeguards
Accountability
individual
participation
privacy act

collaborative
filtering
cryptography
post data
demographic
filtering
childrens
online privacy

public key
encryption
advance
surveillance
rules-based
Spamming
European com.
Directive of
1998

1.

Personal data should not be used for other than the specified purpose
without the consent of the individual or by authority of law.
2.
Data principles should exist and a data controller should be identified.
3.
Limit the collection of personal data. All such data must be obtained by
lawful and fair means with the subjects consent and knowledge.
4.
Personal data should be accurate, complete, current, and relevant to the
purpose for which they are used.
5.
Personal data should be protected against unauthorized access,
modification, or disclosure.
6.
An individual should have the right to review his/her data, to challenge
the correctness of the data, and to have incorrect data changed.
7.
The purpose for which personal data is collected should be specified and
that purpose should not be changed.
8.
A data controller should be responsible for ensuring that the above
principles are met.
9.
Offers consumer recommendations based on the types of products
purchased by other individuals who bought the same product as another
customer.
10.
Is another for of personalization software that augments click-stream
data and user-supplied data with demographic information associated with use
Zip codes to make product suggestions.
11.
Personalization software uses business rules tied to customer-provided
preference information or online behavior to determine the most appropriate
page views and product information to display.
12.
Is the sending of copies of the same e-mail message to a large number of
people in an attempt to cause those people to read a message they migh
otherwise choose not to receive.
13.
An e-mail version of a telephone wiretap.

Under: MELJUN P. CORTES

1/4

14.

Passed in 1966 and amended in 1974, provides the public with the
means to gain access to certain government records.
15.
Limits how the US government collects, maintains, uses, and
disseminates personal information.
16.
This law states that web sites that cater to children must offer
comprehensive privacy policies on their sites, notify their parents or guardians
about their data collection practices from children under 13 years old.
17.
Is an international organization consisting of 30 members countries. Its
goal is to set policies and make agreements in areas where multilateral
agreement is necessary to individual countries to make progress in a global
economy.
18.
Uses a single key to both encode and decode messages.
19.
Is the process of converting an original electronic message into a form
that can be understood by the intended recipients.
20.
Is the data entered into blank fields on an affiliated Web pages when a
consumer signs up for a service.

Name:
Subject/Section:

II.

Day/Time:
Professor:
Leon

Dr. Nelly Dalisay De

IDENTIFICATION: Identify the correct answer from the given words


below.
(1 point each 20 points)
Certification
Code of Ethics
Cookies
Cracker
Cryptography
CyberCriminal
CyberTerrorist
DenialofService Attack
Hacker
Industrial Spy

Insider
IT User
Perpetrators of Computer Crimes
Profession
Public Trust
Software Piracy
Trojan Horse
Web Bugs
Whistle Blowing
Worm

(1) Is a calling that requires specialized knowledge and trained judgment.


(2) Is a process that one undertakes voluntarily to prove competency in a
set of skills.
(3) Is a built on the expectation that a professional will behave ethically
(4) A person for whom a hardware or software product is designed.
(5) States the values, principles, and rules by which members of a
professional organization are expected to abide.
(6) Is the act of illegally making copies of software or enabling others to
access software to which they not entitled.
(7) Attracts attention to a negligent, illegal, unethical, abusive or
dangerous act that threatens the public interest.
(8) Are tiny files deposited on a hard drive on a web site places so that it
can remember information by tracking visits to the website and
identifying the visitor.
(9) Tiny graphic files embedded in e-mail messages and web pages
designed to monitor OnLine internet user behavior.

Under: MELJUN P. CORTES

2/4

(10)
The science of encoding and decoding messages where only
sender and intended receiver can understand the messages.
(11)
These are generally thrill seekers wanting to take on a challenge;
common criminals looking for financial gain; industrial spies trying to
gain a competitive advantage; terrorist seeking to cause destruction in
order to bring attention to their cause.
(12)
They test the limits of system in order to gain publicity.
(13)
They cause problems, steals data, and corrupts system software.
(14)
They attempt financial gain and disrupts companys information
systems.
(15)
They attempt to capture trade secrets and gain competitive
advantage. These people are well-funded and well trained.
(16)
They attempt to gain financial advantage over the net. These
people are well-funded and well trained.
(17)
They cause destruction to key infrastructure components. These
people are not necessarily well-funded and well trained.
(18)
(19)
Most Common Computer Security Attacks / Viruses
(20)

Name:
Subject/Section:

III.

Day/Time:
Professor:
Leon

Dr. Nelly Dalisay De

ESSAY: [Evaluation level and Synthesis Level] (10 points)

Under: MELJUN P. CORTES

3/4

Illustrative Case for COPYRIGHT


INFRINGEMENT
College
English
For Today
By:
Habana,P.
Cinco, A.
Fernando,J

Developing
English
Proficiency
By:
Robles,F

DE
CE
P
T [G.R. No. 131522. July 19, 1999]
PACITA I. HABANA, ALICIA L. CINCO and JOVITA N. FERNANDO
vs.
FELICIDAD C. ROBLES and GOODWILL TRADING CO., INC.
In plagiarism, in case the plagiarist will sell the object/property plagiarized,
the buyer may not be liable if he is in good faith.
CAN THE PLAGIARIST ESCAPE LIABILITY IF HE IS IN GOOD FAITH?
Answer & Explain?
I. Given Case Scenario
II. Statement of the Problem or Concerned Issue
III. Identifying the Stakeholders and Their Positions
IV. Identifying the I.T. Professional Relationship(s) Involved
V. Stating the Alternative Solutions (At least 3)
VI. Recommending and Justifying the Best Solution

Under: MELJUN P. CORTES

4/4