You are on page 1of 4

A patent must not be obvious to the general public

Select one:
True

False

Which does not belong to the group:


Select one:
a.
Denial of Service

Both the sender and the receiver each have a pair of keys, one public and one private.
Asymmetric encryption

If intimidation and fear of reprisals is present, anonymity is good because useful information
may be revealed.

One is not known by any name including pseudo names.


Pseudo identity

Individuals found guilty of child pornography violated


d.
Anti-Child Pornography Code of 2009

A set of legal rights which result from intellectual activity in the industrial, scientific, literary,
and artistic fields is called Intellectual property

Which among the following has the longest imprisonment charge


reclusion perpetua
Match the words to the given choices:

Which among the following has the shortest imprisonment charge.


arresto mayor

All of the statements are true about the first requirement of a Patent Work except:
It must serve a basic purpose

They launch computer-based attacks against other computers or networks in an attempt to


intimidate or coerce a government in order to advance certain political or social objectives
Cyberterrorist
These are set of programs that enables its user to gain administrator level access to a
computer without the end user’s consent or knowledge
Rootkit
The increasing level of familiarity in human actions, may it be good or bad is called
Moral Decay
It is a right to distribute, display, perform, or reproduce an original work in copies or to
prepare derivative works based on the work.
Copyright

When two persons have jointly made an invention, the right to the patent shall belong to
Both of them
The alteration of information may be caused by the disclosure of personal information False
Which does not belong to the group: Legal Claim
Which is not a characteristic of an intellectual object: It is easily owned
Dramatizations, translations, and adaptations of musicals are example of derivative works
One of the advantages of anonymity is that disputes could be solved if information from
individuals’ party to these disputes can reveal the necessary information False

Penetration can be done with or without the use of the internet True
Instilling fear and doubt and compromising the integrity of the data can lead to
cyber terrorism
Which is not true about an Insider Threat. They are a major source of computer crimes
It is hardware or software used to isolate the sensitive portions of an information system
facility from the outside world and limit the potential damage that can be done by a
malicious intruder Firewall
Which of the following does not belong to the group? Collective marks
These individuals test the limitations of information systems out of intellectual curiosity
Hackers

Maintaining the status quo by preventing the unauthorized modification of files is an


example of Integrity
They use hacking to achieve a political or social goal. Hacktivism
Worms are programs where malicious code is hidden inside a seemingly harmless program
False
Which does not belong to the group? Works of Applied Art

In Spear-phishing, con artists send legitimate looking e-mails urging the recipient to take
action to avoid a negative consequence or to receive a reward. False
The owner of a patent has no right to prevent third parties from using the patented product
if it has been put on the market by the owner of the product False
It includes the integrity, confidentiality, and availability of information at the servers
Information security
Shapes cannot be registered as trademarks if the shapes are not necessitated by technical
factors False
A patent claim can be cancelled if it adheres to the public order. False
It is a type of offense when an individual accesses the whole or part of a computer system
without permission or right Illegal Access
This penalty will cause an accused to be imprisoned for two to four decades.
reclusion perpetua
Republic Act No. 8293 is also known as the Copyright
Frauds are sometimes a form of collaboration between an employee and a non-employee
True
It is the acquisition of a domain name on the Internet in bad faith or with the intent to
profit, mislead, destroy one’s reputation or deprive others from registering the same
domain name. Cybersquatting

You might also like