You are on page 1of 9

Name: Professional Ethics In Programming

BSIT IS-1A

-------
Name: Professional Ethics In Programming
BSIT IS-1A
Name: Professional Ethics In Programming
BSIT IS-1A
1. Have you solved the puzzle? Did you enjoy it?

2. Do you have an answer that relates to computer perpetrator?

3. Do you have an answer that relates to browsing activity?

4. Do you have an idea now what our topic is all about? Are you excited
to discuss the word that you’ve answered in the puzzle?

1. Which of the following techniques do not help prevent computer crimes?


A. Backups
B. Digital forensic analysis
C. Firewalls
D. Encryption
2. Which of the following describes a firewall?
A. A copy of data
B. Data that cannot be lost
C. Digital forensic analysis
D. Device or software that acts as a checkpoint between a network or
stand-alone computer and internet.
3. In which of the following is a computer not incidental to the crime?
A. Computer manipulation
B. Money laundering
C. Criminal enterprises
D. Sex crimes
4. What is “Hacktivist”?
A. Politically motivated hacker // these on-line vandals typically attack
corporation and ISP’s
B. Denial of service attacker
C. A proponent of Napster
D. A person engaging in an intentional act involving a computer in which
the person may have gained at the victim’s expenses
5. Which of the following is an example of computer manipulation crime?
A. An intruder removes valuable information from a computer
Name: Professional Ethics In Programming
BSIT IS-1A
system.
B. Hacking
C. A person alters payroll records to attain a higher rate of pay // this
describe unauthorized entry into a computer system
D. Medical records are altered
6. An intruder removes valuable information from a computer system. What
term describes this crime?
A. Computer vandalism// this describes unauthorized entry into a
computer system.
B. Hacking
C. A person alters payroll records to attain a higher rate of pay
D. Medical alteration
7. Which of the following is not similar between real-world stalking and
cyberstalking?
A. Most victims are women
B. Most stalkers are men
C. The stalker and victim are near to each other
D. Stalker is generally motivated by the desire to control the victim
8. Which of the following is NOT a worm?
A. Storm C. Red Code
B. I LOVE YOU D. SirCam
9. A Trojan horse is like a ______ that executes when it is triggered by a specific
event.
A. Botnets B. Logic bomb
C. Zombies D. Rootkit
10.It is an attack on an information system that takes advantage of a particular
system vulnerability.
A. Zero-day Attack
C. Worms
B. Distributed Denial-of-Service Attack
D. Exploit
Name: Professional Ethics In Programming
BSIT IS-1A

1. How many friend requests do you have?


2. How many friends do you have?
3. Do you accept friend requests even if you did not know the person?
4. Do you have birthdate information in your FB account?
5. Does your birth date information is the right date for your birthday?
6. Does your Fb name is your real name?
7. Did you set your privacy setting on your FB account?

1. Do you experience that your account was hacked?


2. Does your FB account have a strong password and do not relate to your
personal information? Such as your last name and your birthdate.
3. Have you realized that your information was exposed to the public?
4. Do you realize that setting privacy is very important? And do not display
more information to the public? With that, are you excited to explore the
topic?

1. Which of the following describe the Information privacy?


A. The combination of communications privacy and data privacy
B. The ability to communicate with others without those communications
being monitored by another person or organization.
C. The ability to limit access to one’s personal data by other individuals
and organizations in order to exercise a substantial degree of control
over that data and its use
D. None of the above
2. A law passed in 1970 that regulates the operations of credit-reporting
bureaus, including how they collect, store, and use credit information.
A. Fair Information Practices
B. Fair Credit Reporting Act
C. Right to Financial Privacy Act
D. Financial Data
3. The collection, preparation, review, and production of electronically stored
information for use in criminal and civil legal actions and proceedings.
A. Electronic discovery
B. Electronic Health Record
C. Education Rate Program
D. Electronically Stored Information (ESI)
Name: Professional Ethics In Programming
BSIT IS-1A
4. Any form of digital information, including emails, drawings, graphs, Web
pages, photographs, word-processing files, sound recordings, and
databases stored on any form of magnetic storage device, including hard
drives, CDs, and flash drives.
A. Electronic discovery
B. Electronic Health Record
C. Education Rate Program
D. Electronically Stored Information (ESI)
5. An electronic text file that a Web site downloads to visitors’ hard drives so it
can identify them on subsequent visits.
A. Electronic Discovery
B. Communication Assistance for Law Enforcement Act
C. Cookies
D. Downloads
6. Which of the following names of the software used by U.S. Food and Drug
Administration(FDA) captured some 80,000 pages of email including users’
email passwords and bank account information.?
A. Mkeystroke Monitoring
B. Ukeystroke monitoring
C. Keystroke monitoring
D. Xkeystroke monitoring
7. How much the number of many closed circuits TV cameras (CCTV) in
operation throughout Great Britain – which amount to 1 CCTV camera for
every 14 people.
A. 4.1 million
B. 4.2 million
C. 4.3 million
D. 4.4 million
8. How many citizens of every 1 CCTV camera in china?
A. 469,000
B. 470, 000
C. 472,000
D. 474,000
9. A device that records vehicle and occupant data for a few seconds before,
during, and after any vehicle crash that is severe enough to deploy the
vehicle’s air bags.
A. Vehicle event data recorder
B. Block box
C. Virtualization software
D. Vehicle event software
10.Which of the following is NOT spy software?
A. Mobile Spy
B. ePhone Tracker
Name: Professional Ethics In Programming
BSIT IS-1A
C. FlexSPY
D. Mobile Nanny

1. Which human right is represented in this picture?

2. Which human right is represented in this picture?

3. Which human right is represented in this picture?


Name: Professional Ethics In Programming
BSIT IS-1A

1. What are some of the underlying ideas and values of the three (3) pictures?

2. Based on the three (3) pictures, what are the human rights that we have?

3. Who do you think should be responsible for upholding the rights? Are you
sure that the right is protected and respected?

1. The following key issues related to freedom of expression except ____.


A. Controlling access to information on the internet
B. Anonymity on the internet
C. Defamation and hate speech
D. Social Media Bullying
2. Which of the following is NOT part of the controlling Access to information on
the internet?
A. Communications Decency Act
B. American Civil Liberties Union
C. Child Online Protection Act
D. Children’s Internet Protection Act
3. The Communication Decency Act aims is to protect children from
pornography on the internet. How much is the fine once the person convicted
of the transmission of “indecent” material over the internet?
A. $250,000
B. $350,000
C. $450,000
D. $550,000
4. In what section of the CDA that gives immunity to the social media companies
that will not be sued for user postings that appear on their sites?
A. Section 30
B. Section 130
C. Section 230
D. Section 330
5. A software that can be used to block access to certain Web sites that contain
material deemed inappropriate or offensive.
Name: Professional Ethics In Programming
BSIT IS-1A
A. Firewall
B. Internet Filtering
C. Controlling access to information on the internet
D. Internet Censorship
6. Base June 30, 2012 on the Top five countries with the highest number of
internet users. Which of the following countries rank the highest percentage
result of internet users.
A. China
B. United States
C. India
D. Japan (79.5%)
7. What country that their government demands have closed more Google
Gmail accounts and more blogger sites than in any other country.
A. Brazil
B. China
C. Cuba
D. Egypt
8. Despite the importance of anonymity in early America, it took nearly
______ years for the Supreme Court to render rulings that addressed
anonymity as an aspect of the Bill of Rights.
A. 50 years
B. 100 years
C. 150 years
D. 200 years
9. It involves the examination of Internet records in an attempt to reveal the
identity of an anonymous poster is called ____.
A. Transparency
B. Internet censorship
C. Doxing
D. Anonymous remailer service
10.A lawsuit in which the identity of the defendant is temporarily unknown,
typically because the defendant is communicating anonymously or using a
pseudonym.
A. John Doe Lawsuit
B. Jacob Watterling Lawsuit
C. Miller v. California
D. Intrusion Detection Lawsuit
M

You might also like