You are on page 1of 53

SOCIAL AND PROFESSIONAL

ISSUES

Question 1
Complete
Mark 1.00 out of 1.00

Flag question

Question text
As humans tend to follow a life script, an individual's reaction to certain rules of conduct is
always intentional.

Select one:
True
False

Question 2
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Morality is enforced by the authority that enacted them and security forces

Select one:
True
False

Question 3
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Time and place influence the context of morality.

Select one:
True
False

Question 4
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Determinative Laws fixes ways of acting in accordance with natural law.

Select one:
True
False

Question 5
Complete
Mark 1.00 out of 1.00

Flag question

Question text
The two kinds of rules of conduct; Directives which involves the macroethical level and
Social policies that involves the microethical level.
Select one:
True
False

Question 6
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Impartial moral rules are ideally designed to apply equitably to all participants in the system.

Select one:
True
False

Question 7
Complete
Mark 1.00 out of 1.00

Flag question

Question text
As morality is a survival script humans follow daily, it became a general trait that is flexible
with different backgrounds.

Select one:
True
False
Question 8
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Legal acts conform to what an individual believes to be the right thing to do.

Select one:
True
False

Question 9
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Believing in human life implies on the belief that life has a purpose and this applies to
everyone, whether one believes in a superior deity or an atheist.

Select one:
True
False

Question 10
Complete
Mark 1.00 out of 1.00
Flag question

Question text
Since morality is culturally based, individuals are bound to live within the guidelines the
society lives with.

Select one:
True
False

Question 1
Complete
Mark 1.00 out of 1.00

Flag question

Question text
It is the core of human dignity and autonomy
privacy
Answer: 

Question 2
Complete
Mark 1.00 out of 1.00

Flag question

Question text
It involves the indirect gathering of personal information through an analysis of implicit
patterns discoverable in data.

Select one:
a.
Data Mining

b.
Information Matching

c.
Web Mining

d.
Data Bidding

Question 3
Complete
Mark 1.00 out of 1.00

Flag question

Question text
It is the application of data mining techniques to discover patterns from the Web
w eb mining
Answer: 

Question 4
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Under what condition can data collections become an invasion of privacy?

Select one:
a.
when information is used for unauthorized purposes

b.
sold to the highest bidder
c.
when information is used for unauthorized access

d.
there is no limit to what one can do

Question 5
Complete
Mark 1.00 out of 1.00

Flag question

Question text
One of the contributing factors in the cause of violations is when consumers lack the ethics
of how what they consider a little bit of information can turn into a big invasion of privacy

Select one:
True
False

Question 6
Complete
Mark 1.00 out of 1.00

Flag question

Question text
The danger with information matching is that no one knows who will use the built profiles
from the matched information and where it will be used

Select one:
True
False

Question 7
Complete
Mark 1.00 out of 1.00
Flag question

Question text
There are different strands of information to be protected, which does not belong to a
group:

Select one:
a.
Personal Information

b.
Employment Information

c.
Financial Information

d.
Medical Information

Question 8
Complete
Mark 0.00 out of 1.00

Flag question

Question text
If the codes of conduct focuses on rules and guidelines, autonomy focuses on Answer
the relatio

Question 9
Complete
Mark 1.00 out of 1.00
Flag question

Question text
It is an invasion of privacy by wrongful entry, seizing, or acquiring possession of the
property of others
intrusion
Answer: 

Question 10
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Individuals whose data are mined cannot be identified with or linked to certain newly
created groups.

Select one:
True
False

Question 1
Complete
Mark 1.00 out of 1.00

Flag question

Question text
The moral concept of whistle-blowing is good when the activities involved pose serious
danger and harm to human life

Select one:
True
False
Question 2
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Professional Codes of Conduct addresses the following except:

Select one:
a.
Compliance and Competence

b.
Confidentiality and Commitment

c.
Moral and Legal Standards

d.
Sanction Mechanics

Question 3
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Even with long years of experience, skills based on shallow knowledge of the field could be
damaging to the profession

Select one:
True
False

Question 4
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Individuals whose data are mined can become identified with or linked to certain newly
created groups.

Select one:
True
False

Question 5
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Which is not true about the word profession?

Select one:
a.
In the early times there is little distinction between manual and intellectual groups.

b.
It was once related with religious life.

c.
It a specific set of skills or a mastery of knowledge in a particular field.

d.
Since the beginning, there is an emphasis on intellectual capabilities for membership in a
group as it is deemed important
Question 6
Complete
Mark 0.00 out of 1.00

Flag question

Question text
If the codes of conduct focuses on rules and guidelines, autonomy focuses on Answer
the relatio

Question 7
Complete
Mark 1.00 out of 1.00

Flag question

Question text
The primary purpose of professional code of ethics is to promote the public image of the
profession by specifying and enforcing the ethical behavior expected from its members

Select one:
True
False

Question 8
Complete
Mark 1.00 out of 1.00

Flag question

Question text
This is another term for large commercial databases
data w arehouse
Answer: 

Question 9
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Showing an act of kindness in exchange to an equal act of kindness is an example what
culture-free moral codes?
the bronze rule
Answer: 

Question 10
Complete
Mark 1.00 out of 1.00

Flag question

Question text
It is a human cognitive process of looking for ways to generate or affirm a proposition
Reasoning
Answer: 

Question 11
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Ethics is defined as a field of inquiry whose subject is human actions and these human
human conduct
actions are called Answer .

Question 12
Complete
Mark 1.00 out of 1.00
Flag question

Question text
It involves the indirect gathering of personal information through an analysis of implicit
patterns discoverable in data.

Select one:
a.
Information Matching

b.
Data Bidding

c.
Data Mining

d.
Web Mining

Question 13
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Harassment is a form of discrimination and it mainly involves making decisions that
negatively affect an individual.

Select one:
True
False

Question 14
Complete
Mark 1.00 out of 1.00
Flag question

Question text
It takes part in building character traits in people.
morality
Answer: 

Question 15
Complete
Mark 1.00 out of 1.00

Flag question

Question text
One of the contributing factors in the cause of violations is when consumers lack the
knowledge of how what they consider a little bit of information can turn into a big invasion
of privacy

Select one:
True
False

Question 16
Complete
Mark 1.00 out of 1.00

Flag question

Question text
There are different strands of information to be protected, which does not belong to a
group:

Select one:
a.
Financial Information

b.
Personal Information

c.
Medical Information

d.
Employment Information

Question 17
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Which is true about Morality?

Select one:
a.
It does not involve special knowledge that can be understood only by privileged individuals

b.
It prevents harm and suffering, a moral system aims at promoting human flourishing

c.
It measures for us to compare something else whose qualities we doubt

d.
It shares the behavioral patterns of a group

Question 18
Complete
Mark 1.00 out of 1.00
Flag question

Question text
It is the application of data mining techniques to discover patterns from the Web
w eb mining
Answer: 

Question 19
Complete
Mark 1.00 out of 1.00

Flag question

Question text
It is an interpretation is done based on a system that uses a process of argumentation
consisting of a mixture of inductions and deductions
ethical theories
Answer: 

Question 20
Complete
Mark 1.00 out of 1.00

Flag question

Question text
It is when laws are used to resolve interpersonal conflicts in a society.

Select one:
a.
Enforcement Laws

b.
Enforcement Codes

c.
Conflict Laws

d.
Conflict Resolution

Question 21
Complete
Mark 1.00 out of 1.00

Flag question

Question text
These are guidelines that state the dos and dont's of a professional that protects individual
members and their image.

Select one:
a.
Professional Code

b.
Institutional Code

c.
Community Code

d.
Personal Code

Question 22
Complete
Mark 1.00 out of 1.00

Flag question

Question text
As humans tend to follow a life script, an individual's reaction to certain rules of conduct is
always intentional.
Select one:
True
False

Question 23
Complete
Mark 1.00 out of 1.00

Flag question

Question text
A provider of service should first inquire the customer before an action of service should be
done. This statement shows _______.

Select one:
a.
Responsibility

b.
Commitment

c.
Autonomy

d.
Integrity

Question 24
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following does not describe the word ethics?

Select one:
a.
widely shared social conventions about right and wrong
b.
human actions performed consciously and willfully that one can be held responsible

c.
theoretical examination of morality and morals

d.
the study of right and wrong in human conduct

Question 25
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Ethical decision making is the process of making a decision which may result in one or more
moral conflicts while ethical reasoning is when ethical principles is integrated in the
reasoning process

Select one:
True
False

Question 26
Complete
Mark 1.00 out of 1.00

Flag question

Question text
It comes from an enforceable part of the moral code that differs with each society and
culture.
conventional law
Answer: 

Question 27
Complete
Mark 1.00 out of 1.00

Flag question

Question text
The two kinds of rules of conduct; Directives which involves the macroethical level and
Social policies that involves the microethical level.

Select one:
True
False

Question 28
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Determinative Laws fixes ways of acting in accordance with natural law.

Select one:
True
False

Question 29
Complete
Mark 1.00 out of 1.00
Flag question

Question text
This theory states that ethical statements cannot be proven and are really only statements
about how someone feels.
emotivism
Answer: 

Question 30
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Listening in to other people's conversations is an example of what privacy violation?

Select one:
a.
Misuse of Information

b.
Intrusion

c.
Information Matching

d.
Interception of Information

Question 31
Complete
Mark 1.00 out of 1.00
Flag question

Question text
It is a system created by and for human beings usually in public deliberations like a council
of elders or representatives in national legislatures.

Select one:
a.
Convertional Law

b.
Conventional Law

c.
Constitutional Law

d.
Legislative Law

Question 32
Complete
Mark 1.00 out of 1.00

Flag question

Question text
The danger with information matching is that everyone knows who will use the built profiles
from the matched information and where it will be used

Select one:
True
False

Question 33
Complete
Mark 1.00 out of 1.00
Flag question

Question text
Under what condition can data collections become an invasion of privacy?

Select one:
a.
when information is used for unauthorized access

b.
when information is used for unauthorized purposes

c.
sold to the highest bidder

d.
there is no limit to what one can do

Question 34
Complete
Mark 1.00 out of 1.00

Flag question

Question text
It is an act of seeking public attention to what is considered an illegal or mismanaged act
Whistle-Blow ing
Answer: 

Question 35
Complete
Mark 1.00 out of 1.00
Flag question

Question text
In order for professions and trades to uphold essential requirements, integrity, commitment,
and professional codes of conduct must be met.

Select one:
True
False

Question 36
Complete
Mark 1.00 out of 1.00

Flag question

Question text
The decision-making process is developed that individuals tend to execute automatically
without thinking about the steps that go through. The step that involves others in
brainstorming is __________.

Select one:
a.
Implement Decisions

b.
Developing Alternatives

c.
Identify Alternatives

d.
Evaluating Alternatives

Question 37
Complete
Mark 1.00 out of 1.00
Flag question

Question text
According to this theory actions are judged according on the results. For example, a person
kills one person to prevent the deaths of others.

Select one:
a.
Relativism

b.
Altruism

c.
Consequentialism

d.
Deontology

Question 38
Complete
Mark 1.00 out of 1.00

Flag question

Question text
It is when an action is right if the consequences of that action are favorable to all except the
actor

Select one:
a.
Alruism

b.
Altruism
c.
Altruist

d.
Attruism

Question 39
Complete
Mark 1.00 out of 1.00

Flag question

Question text
It is an invasion of privacy by wrongful entry, seizing, or acquiring possession of the
property of others
intrusion
Answer: 

Question 40
Complete
Mark 1.00 out of 1.00

Flag question

Question text
It is developed over a period of time based on either the religion or culture of the
indigenous people in the area.

Select one:
a.
Institutional Code

b.
Professional Code

c.
Community Code
d.
Personal Code

Question 41
Complete
Mark 1.00 out of 1.00

Flag question

Question text
For formal education to be effective in teaching and enforcing the pillars of professionalism
it must be _________

Select one:
a.
Committed

b.
Direct

c.
Responsible

d.
Incremental

Question 42
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Which is true about Licensing Authorities.
I.  Before a license is issued an individual must be tested.
II. Violation of the rules from the licensing authority may lead to recalling of the license
III. After the test, the licensing authority may deny issuing the license

Select one:
a.
III & II

b.
I, II, & III

c.
I & III

d.
 I & II

Question 43
Complete
Mark 1.00 out of 1.00

Flag question

Question text
With the relationship between the provider and receiver of the service/product present, a
power play may sometimes be in favor of the provider not the receiver

Select one:
True
False

Question 44
Complete
Mark 1.00 out of 1.00

Flag question

Question text
It is the core of human dignity and autonomy
privacy
Answer: 

Question 45
Complete
Mark 1.00 out of 1.00

Flag question

Question text
It is an unwritten law that holds our rights of self-preservation
natural law
Answer: 

Question 46
Complete
Mark 1.00 out of 1.00

Flag question

Question text
It is when ethical reasoning remained the same even with the evolution of ethical discipline.

Select one:
a.
Emotivism

b.
Deontology

c.
Utilitarianism

d.
Relativism

Question 47
Complete
Mark 1.00 out of 1.00
Flag question

Question text
A man who did something to help others but it is against his will is not considered good.
This is an example of _________.

Select one:
a.
Emotivism

b.
Deontology

c.
Relativism

d.
Utilitarianism

Question 48
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Morality is enforced by the authority that enacted them and security forces

Select one:
True
False

Question 49
Complete
Mark 1.00 out of 1.00
Flag question

Question text
Rules that guides individual actions such as not taking the possessions of others are
Directives
called Answer .

Question 50
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Legal acts conform to what an individual believes to be the right thing to do.

Select one:
True
False

Question 1
Complete
Mark 10.00 out of 10.00

Flag question

Question text
Match the following words to the given choices

Witness Protection Pseudo identity


Answer 1
Coded Messages Cryptography
Answer 2
No Identity Anonymity
Answer 3
Encryption and Authentication Information security
Answer 4
E-mail Fraud Phishing
Answer 5
Secret-key Encryption Symmetric encryption
Answer 6
Rootkit Exploits
Answer 7
Digital Signature Authentication
Answer 8
Sensors, Security Lighting and Natural Trees Physical Security Barriers
Answer 9
Preventing of unauthorized disclosure of Confidentiality
information Answer 10

Question 1
Complete
Mark 10.00 out of 10.00

Flag question

Question text
Match the words to the given choices:

creative works Copyright


Answer 1
inventions Patents
Answer 2
reckless alteration Data Interference
Answer 3
adaptations Derivative w orks
Answer 4
computer programs Original w orks
Answer 5
unauthorized ways Cyberpiracy
Answer 6
unauthorized access Cybertrespass
Answer 7
reclusion and Psychological Effects
isolation Answer 8
shapes and colors Trademark
Answer 9
reckless hindering System Interference
Answer 10

Question 1
Complete
Mark 1.00 out of 1.00
Flag question

Question text
Frauds are sometimes a form of collaboration between an employee and a non-employee

Select one:
True
False

Question 2
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Penetration can be done with or without the use of the internet

Select one:
True
False

Question 3
Complete
Mark 0.00 out of 1.00

Flag question

Question text
The owner of a patent has no right to prevent third parties from using the patented product
if it has been put on the market by the owner of the product

Select one:
True
False

Question 4
Complete
Mark 1.00 out of 1.00

Flag question

Question text
A patent must not be obvious to the general public

Select one:
True
False

Question 5
Complete
Mark 0.00 out of 1.00

Flag question

Question text
Shapes cannot be registered as trademarks if the shapes are not necessitated by technical
factors

Select one:
True
False

Question 6
Complete
Mark 1.00 out of 1.00

Flag question

Question text
One of the advantages of anonymity is that disputes could be solved if information from
individuals’ party to these disputes can reveal the necessary information

Select one:
True
False

Question 7
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Worms are programs where malicious code is hidden inside a seemingly harmless program

Select one:
True
False

Question 8
Complete
Mark 1.00 out of 1.00

Flag question

Question text
A patent claim can be cancelled if it adheres to the public order.

Select one:
True
False

Question 9
Complete
Mark 1.00 out of 1.00
Flag question

Question text
In Spear-phishing, con artists send legitimate looking e-mails urging the recipient to take
action to avoid a negative consequence or to receive a reward.

Select one:
True
False

Question 10
Complete
Mark 1.00 out of 1.00

Flag question

Question text
The alteration of information may be caused by the disclosure of personal information

Select one:
True
False

Question 11
Complete
Mark 1.00 out of 1.00

Flag question

Question text
It is a type of offense when an individual accesses the whole or part of a computer system
without permission or right
Illegal Access
Answer: 
Question 12
Complete
Mark 0.00 out of 1.00

Flag question

Question text
Instilling fear and doubt and compromising the integrity of the data can lead to
cyber terrorism
Answer: 

Question 13
Complete
Mark 0.00 out of 1.00

Flag question

Question text
They use hacking to achieve a political or social goal.
Hacktivism
Answer: 

Question 14
Complete
Mark 1.00 out of 1.00

Flag question

Question text
They launch computer-based attacks against other computers or networks in an attempt to
intimidate or coerce a government in order to advance certain political or social objectives
cyberterrorist
Answer: 

Question 15
Complete
Mark 1.00 out of 1.00
Flag question

Question text
A set of legal rights which result from intellectual activity in the industrial, scientific, literary,
Intellectu
and artistic fields is called Answer .

Question 16
Complete
Mark 1.00 out of 1.00

Flag question

Question text
It is a right to distribute, display, perform, or reproduce an original work in copies or to
prepare derivative works based on the work.
copyright
Answer: 

Question 17
Complete
Mark 0.00 out of 1.00

Flag question

Question text
Copyright
Republic Act No. 8293 is also known as the Answer .

Question 18
Complete
Mark 1.00 out of 1.00

Flag question
Question text
derivative
Dramatizations, translations, and adaptations of musicals are example of Answer .

Question 19
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Both the sender and the receiver each have a pair of keys, one public and one private.
Asymmetric encryption
Answer: 

Question 20
Complete
Mark 1.00 out of 1.00

Flag question

Question text
anonymity
If intimidation and fear of reprisals is present, Answer  is good because useful
information may be revealed.

Question 21
Complete
Mark 1.00 out of 1.00

Flag question

Question text
These are set of programs that enables its user to gain administrator level access to a
computer without the end user’s consent or knowledge
Rootkit
Answer: 

Question 22
Complete
Mark 1.00 out of 1.00

Flag question

Question text
It includes the integrity, confidentiality, and availability of information at the servers
Information security
Answer: 

Question 23
Complete
Mark 1.00 out of 1.00

Flag question

Question text
It is hardware or software used to isolate the sensitive portions of an information system
facility from the outside world and limit the potential damage that can be done by a
malicious intruder
Firew alls
Answer: 

Question 24
Complete
Mark 0.00 out of 1.00

Flag question

Question text
One is not known by any name including pseudo names.
Pseudo identity
Answer: 

Question 25
Complete
Mark 1.00 out of 1.00
Flag question

Question text
Maintaining the status quo by preventing the unauthorized modification of files is an
Integrity
example of Answer .

Question 26
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Which does not belong to the group:

Select one:
a.
Political Activism

b.
Hacker’s Ethics

c.
Terrorism

d.
Denial of Service

Question 27
Complete
Mark 1.00 out of 1.00
Flag question

Question text
The increasing level of familiarity in human actions, may it be good or bad is called _______.

Select one:
a.
Psychological Effects

b.
Moral Decay

c.
Trust

d.
Loss of privacy

Question 28
Complete
Mark 1.00 out of 1.00

Flag question

Question text
These individuals test the limitations of information systems out of intellectual curiosity

Select one:
a.
Crackers
b.
Industrial Spies

c.
Insiders

d.
Hackers

Question 29
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Individuals found guilty of child pornography violated _____________.

Select one:
a.
Anti-Child Pornography Act of 2009

b.
Anti-Child Pornography Act of 9775

c.
Anti-Child Pornography Code of 2009

d.
Anti-Child Pornography Code of 2012

Question 30
Complete
Mark 1.00 out of 1.00
Flag question

Question text
This penalty will cause an accused to be imprisoned for two to four decades.

Select one:
a.
reclusion perpetua

b.
arresto mayor

c.
prision mayor

d.
prision minor

Question 31
Complete
Mark 1.00 out of 1.00

Flag question

Question text
It is the acquisition of a domain name on the Internet in bad faith or with the intent to
profit, mislead, destroy one’s reputation or deprive others from registering the same
domain name.

Select one:
a.
Misuse of Devices

b.
Cybersquatting

c.
Data Interference

d.
System Interference

Question 32
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Which among the following has the longest imprisonment charge

Select one:
a.
arresto mayor

b.
prision minor

c.
prision mayor

d.
reclusion perpetua
Question 33
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Which among the following has the shortest imprisonment charge.

Select one:
a.
reclusion perpetua

b.
prision minor

c.
prision mayor

d.
arresto mayor

Question 34
Complete
Mark 0.00 out of 1.00

Flag question

Question text
Which is not true about an Insider Threat.
Select one:
a.
They have access to the computer system

b.
The only suspects are employees

c.
They are a major source of computer crimes

d.
They have knowledge in the computer system

Question 35
Complete
Mark 0.00 out of 1.00

Flag question

Question text
Which does not belong to the group:

Select one:
a.
Non-tangible

b.
Non-exclusionary
c.
Scarcity

d.
Legal Claim

Question 36
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Which is not a characteristic of an intellectual object:

Select one:
a.
It is easily owned

b.
It can be easily reproduced

c.
It can be given a right to ownership

d.
They are the manifestation of ideas

Question 37
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following does not belong to the group?

Select one:
a.
Industrial Design

b.
Musical compositions

c.
Sermons

d.
Collective marks

Question 38
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Which does not belong to the group?

Select one:
a.
General Works

b.
Pseudonymous Works
c.
Joint Authorship Works

d.
Works of Applied Art

Question 39
Complete
Mark 1.00 out of 1.00

Flag question

Question text
All of the statements are true about the first requirement of a Patent Work except:

Select one:
a.
It must serve a basic purpose

b.
It is industrially applicable

c.
It must be new and useful

d.
It can be related to a product or process

Question 40
Complete
Mark 1.00 out of 1.00

Flag question

Question text
When two persons have jointly made an invention, the right to the patent shall belong to
_______.

Select one:
a.
The person with the most work

b.
The person with the original idea

c.
None of them

d.
Both of them

Question 41
Complete
Mark 10.00 out of 10.00

Flag question

Question text
Match the words to the given choices:

inventions Patents
Answer 1
computer programs Original w orks
Answer 2
reckless alteration Data Interference
Answer 3
adaptations Derivative w orks
Answer 4
unauthorized ways Cyberpiracy
Answer 5
creative works Copyright
Answer 6
reclusion and Psychological Effects
isolation Answer 7
shapes and colors Trademark
Answer 8
unauthorized access Cybertrespass
Answer 9
reckless hindering System Interference
Answer 10

You might also like