Professional Documents
Culture Documents
Final Exam Reviewer CS 8
Final Exam Reviewer CS 8
1. It refers to social conventions about right and wrong that are so widely shared that they
become the basis for an established consensus.
MORALITY
3. Ethics comes from the Greek word _____ which means _____.
ETHOS, CHARACTER
8. It is a system of rules that tells us what we can and cannot do. These are enforced by a set
of institutions (the police, courts, law-making bodies).
LAW
MORAL ACTS
11. It is defined as the degree to which an individual can determine which personal
information is to be shared with whom and for what purpose.
PRIVACY
12. It is a statement contained on a website that details how the operators of the site will
collect, store, protect, and utilize personal data provided by its users.
PRIVACY POLICY
13. It refers to the ability of an individual or group of individuals to express their beliefs,
thoughts, ideas, and emotions about different issues free from government censorship.
FREEDOM OF EXPRESSION
15. It relates to any rights you have to control your personal information and how it’s used.
PRIVACY
18. “An act protecting individual personal information in Information and Communications
Systems in the government and the private sector, creating for this purpose a national
privacy commission, and for other purposes”.
REPUBLIC ACT NO. 10173
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
TO BE INFORMED TO RECTIFICATION
TO OBJECT TO ERASURE OR BLOCKING
TO ACCESS TO DAMAGES
22. According to the 1986 constitution of The Republic of the Philippines, under which
section is the right to express ideas and opinions openly without fear of censorship or
repercussion guaranteed?
Guaranteed under Article III, Bill of Rights, Section 4 of the 1986 constitution of The
Republic of the Philippines.
23. It is defined as “the act of making untrue statements about another which damages
his/her reputation.
DEFAMATION
24. It is the term for the defamatory statement through printed or broadcast over the
media.
LIBEL
26. "the public and malicious imputation of a crime, or of a vice or defect, real or imaginary,
or any act, omission, condition, status, or circumstance tending to cause the dishonor,
discredit, or contempt of a natural or juridical person, or to blacken the memory of one
who is dead".
LIBEL, ACCORDING TO THE ARTICLE 353 OF THE REVISED PENAL CODE
27. Libel by means of writings or similar means. — A libel committed by means of writing,
printing, lithography, engraving, radio, phonograph, painting, theatrical exhibition,
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
28. Oral defamation shall be punished by arresto mayor in its maximum period to prisión
correccional in its minimum period if it is of a serious and insulting nature; otherwise the
penalty shall be arresto menor or a fine not exceeding 200 pesos.
ARTICLE 358 OF THE REVISED PENAL CODE (SLANDER)
29. The penalty of arresto mayor in its maximum period to prisión correccional in its
minimum period or a fine ranging from 200 to 1,000 pesos shall be imposed upon any
person who shall perform any act not included and punished in this title, which shall cast
dishonor, discredit or contempt upon another person. If said act is not of a serious
nature, the penalty shall be arresto menor or a fine not exceeding 200 pesos.
ARTICLE 359 OF THE REVISED PENAL CODE (SLANDER BY DEED)
30. It is the use of Internet-based social media sites to stay connected with friends, family,
colleagues, customers, or clients.
SOCIAL NETWORKING
31. The world’s first postal service is created in Assyria. The phrase “the cheque’s in the
mail” is coined.
550 BC
32. In what year was the telegraph invented, and who is credited with the development of
the first successful optical telegraph?
1792, French engineer Claude Chappe and his brothers.
33. In what year did the world's first "selfie" take place, and who was the individual
responsible for capturing it?
1839 by Robert Cornelius
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
35. In what year was the radio, an early precursor to Spotify, invented?
1891
36. During which decade were the world's first "supercomputers" built, where world’s
scientists begin developing ways for those supercomputers to communicate with each
other.
1940s
37. In which decade did the earliest forms of the "internet" begin to appear but are
extremely limited in both scale and scope.
1960s
39. In which year was the world's first social networking site, "Six Degrees," created?
1997
41. In which month and year was LinkedIn founded, leading to excitement among
headhunters and hiring agencies?
DECEMBER 2002
43. In what month and year did Friendster achieve a milestone by reaching 3 million users?
July 2002
44. In what month and year was the image sharing site Photobucket launched?
MAY 2003
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
AUGUST 2003
47. In which month and year was the photo-sharing site Flickr launched?
FEBRUARY 2004
48. In which month and year were Facebook Ads launched to support exponential growth?
APRIL 2004
50. In what month and year was YouTube acquired by Google for $1.65 billion.
OCTOBER 2006
52. In which month and year did the Facebook "Newsfeed" go live?
SEPTEMBER 2006
53. In what month and year did the hashtag (#) make its debut on Twitter?
AUGUST 2007
55. In which month and year did Facebook introduce the "like" button, allowing users to
express their appreciation for status updates, photos, videos, links, and advertisements?
FEBRUARY 09, 2009
56. In what month and year did Facebook surpass Myspace in user count for the first time,
marking a significant milestone in their competition?
MAY 2009
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
58. In which month and year was Instagram launched and hits 1 million users by December.
OCTOBER 2010
60. In what month and year did Facebook acquire Instagram, and who were the founders of
Instagram at the time of the acquisition?
APRIL 2012, KEVIN SYSTROM AND MIKE KRIEGER
61. In which month and year did Facebook achieve the milestone of having 1 billion active
users?
OCTOBER 2012
62. In which month and year did Twitter reach 140 million active users?
DECEMBER 2012
63. In which month and year did Snapchat users start sending 60 million snaps per day?
FEBRUARY 2013
64. In which month and year did Myspace re-launch with a new website, mobile app, and an
endorsement from Justin Timberlake?
JANUARY 2013
65. In which month and year did Instagram achieve the milestone of reaching 200 million
active users?
MARCH 2014
66. In what month and year did Snapchat achieve 100 million active users, with the majority
being millennials?
APRIL 2015
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
MAY 2015
69. In what month and year did Snapchat introduce its "filters" feature, allowing users to
add animal ears to their snaps?
SEPTEMBER 2015
70. In which month and year did Instagram announce that it had reached 500 million active
users?
JUNE 2016
71. In which month and year did Time Inc acquire Myspace?
FEBRUARY 2016
72. In what year did Snapchat undergo a rebranding, changing its name to "Snap Inc," and
also introduce smart sunglasses named "Spectacles"?
SEPTEMBER 2016
73. In what month and year did the unauthorized harvesting of 50 million Facebook profiles
for Cambridge Analytica without consent occur? A major data breached causing
Facebook stocks to plummet.
MARCH 2018
74. In what month and year did Mark Zuckerberg testify before Congress regarding the
Facebook-Cambridge Analytica data breach?
APRIL 2018
75. In which month and year did Facebook launch the "Care" reaction to provide people
with a means to express support during the COVID-19 crisis?
APRIL 2020
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
77. It is a bullying that takes place over digital devices like cell phones, computers, and
tablets. It can occur through SMS, Text, and apps, or online in social media, forums, or
gaming where people can view, participate in, or share content.
CYBERBULLYING
78. What Republic Act in the Philippines where cyberbullying defined as: “ any severe or
repeated use by one or more students of a written, verbal or electronic expression, or a
physical act or gesture, or any combination thereof, directed at another student that has
effect of actually causing or placing the latter in reasonable fear of physical or emotional
harm or damage to his property; creating hostile environment at school for the other
student; infringing on the rights of the other student at school; or materially and
substantially disrupting the education process or the orderly operation of a school”
REPUBLIC ACT 10627 OTHERWISE KNOWN AS ANTI-BULLYING ACT OF THE PHILIPPINES
79. It is a threatening behavior or unwanted advances directed at an adult using the Internet
or other forms of online and electronic communications; it is the adult version of
cyberbullying.
CYBERSTALKING
80. It involves the use of social media networks to communicate and promote the benefits
of products and services.
SOCIAL NETWORK ADVERTISING
81. A self-regulating business model that helps a company be socially accountable—to itself,
its stakeholders, and the public
CORPORATE SOCIAL RESPONSIBILITY (CSR)
82. It is related to work that needs a high level of education or special training.
PROFESSION
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
85. It was defined by Reddy (2016) as “the rules and procedures that should be carried out in
an office by the employer and the employees to maintain a professional company culture
and to build a better relationship with their customers by providing better services”.
WORKPLACE/WORK ETHICS
PUNCTUALITY
ACCOUNTABILITY
FOCUS
INITIATIVE
PRODUCTIVITY
PROFESSIONALISM
DEDICATION
DESIRE TO IMPROVE
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135
87. It means being focused, and giving time to the things that needs to be done as
scheduled.
DEDICATION
88. It means paying attention to the task assigned to you. This means an employee should
not get distracted by social media, chatting with employees and the like.
FOCUS
89. Being on time at work is important. Employees should respect that time is valuable in
the company. In addition, it does not only refer to being at work on time but also applies
to project deadlines.
PUNCTUALITY
90. According to Reddy (2020), it is the term for doing something without being ask.
Responsible employees do not wait to be commanded before working on the task
assigned.
INITIATIVE
91. Accomplishing more than the tasks in each time frame and avoiding distractions is
productivity.
PRODUCTIVITY
92. Treating other colleagues and employers with respect, dressing appropriately for the
job, going to work on time, performing duties and responsibilities given are all acts of
professionalism.
PROFESSIONALISM
93. Being accountable means shouldering the tasks and projects assigned to you and not
blaming others even if things go wrong.
ACCOUNTABILITY
94. A good employee who accepts feedback and suggestions has a desire to improve.
DESIRE TO IMPROVE
95. According to Reynold (2019) it “is the concept that an organization should act ethically
by taking responsibility for the impact of its actions on its shareholders, consumers,
employees, community, environment, and suppliers” (p.10).
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135
98. How can IT workers be categorized professionally, considering their education and
training?
IT workers can be considered professionals since they have undergone high level of
education and training related to their field.
99. Why does courses related to Computing such as Computer Science, Information
Technology, Information Systems and the like have no licensure exams?
Due to the fact that technology is continuously evolving and these courses are
technology-dependent.
100. It states the principles and core values that are essential to the work of a particular
occupational group (Reynolds, 2015).
PROFESSIONAL CODE OF ETHICS
101. What are the two main parts that are created by professional organizations in most
codes of ethics in different professions?
First, outlines what the organization aspires to become.
Second, lists the rules and principles by which members of the organization are
expected to abide.
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135
103. What are the benefits an individual can get for applying professional code of ethics?
Ethical decision making
High standards of practice and ethical behavior
Trust and respect from the general public
Evaluation benchmark
104. Founded in 1946, it is one of the oldest and largest IT professional associations among
38 IEEE societies with over 85, 000 members. It helps the information and career
development of computing researchers and practitioners with technical journals,
magazines, books, conferences, etc. It sponsors conferences, journals, local and student
chapters, technical committees and standard working groups.
INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS COMPUTER SOCIETY
105. A computing society founded in 1947 with over 97, 000 students and professional
members in more than 100 countries. As of 2015, ACM publishes 50 journals and
magazines and 30 newsletters. ACM sponsors 37 special interest groups representing
major areas of computing, each provides publication, workshops and conferences.
ASSOCIATION FOR COMPUTING MACHINERY (ACM)
106. Started in Chicago in 1951. It provides IT-related seminars and conferences, information
on IT issues and forums for networking with other IT workers. Its mission is to provide
superior leadership and education in information technology. Furthermore, one of its
goals is to help members themselves more marketable in the IT industry.
ASSOCIATION OF INFORMATION TECHNOLOGY PROFESSIONALS (AITP)
107. Provides information security training and certification for a wide range of individuals,
such as auditors, system administrators and security managers.
SYSADMIN, AUDIT, NETWORK, SECURITY (SANS) INSTITUTE
108. “indicates that a professional possesses a particular set of skills, knowledge, or abilities,
in the opinion of the certifying organization”
CERTIFICATION
109. A person who passes this has a higher chance of being employed and has an advantage
over other IT professionals who did not obtain any of these.
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135
IT CERTIFICATION
110. As stated by the Information Systems Audit and Control Association (ISACA), the above-
mentioned certifications guarantees that the bearer is knowledgeable in risks to
information systems, then designing/implementing solutions. As stipulated by the IT
Skills and Salary Report, this certification has an average annually salary of $119,227 and
is a good certification for those interested in Information Systems Security positions.
CRISC: CERTIFIED IN RISK AND INFORMATION SYSTEM CONTROL
112. It recognizes expertise in security and risk management just like CRISC and CISM. It is
reported that holders of this certification earn $110,603 annually as salary.
CISSP: CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL
113. The Project Management Institute (PMI) guarantees that the holders on this
certification are proficient in Project Management. According to PMI, they should be
able to “speak and understand the global language of project management”. PMP is
reported to have an average yearly salary of $109,405.
PMP: PROJECT MANAGEMENT PROFESSIONAL
114. is another IASCA certification which guarantees that Information Systems Auditor
possesses the right skills essential in evaluating systems follow best practices to “support
trust in and value from information systems”. They are reported to have $106,181 as an
average salary.
CISA: CERTIFIED INFORMATION SYSTEMS AUDITOR
115. It is a certification for someone with at least one (1) year of experience in networking
and certifies that the holder is capable of implementing and maintaining wide-area
networks and works with specialists on solutions. It has an average annual salary
amounting to $97,038.
CCNP ROUTING AND SWITCHING
116. It is a certification from CISCO, for network design. As a requirement to qualify for the
certification, an individual should have taken prior CISCO certification such as CCNP
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135
117. It has an average annual salary of $96,215. Holders of this certification are responsible
in implementing technology over a wide variety of versions of Microsoft Products.
MSCE: MICROSOFT CERTIFIED SYSTEMS ENGINEER
118. This certification has an average salary of $95,434 yearly. This certification distinguishes
those who can employ ITIL concepts of quality IT solutions in real-world situations. It is
the third version, an internationally recognized collection of best practices for managing
information technology (IT).
ITIL (INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY) V3 FOUNDATION
119. This certification is not vendor-specific certification, which means it is not tied to any
brand. It is a certification for IT workers who demonstrate knowledge in assessing the
security of computer systems by exploring the possible vulnerabilities and weaknesses in
target systems in a lawful manner. The average annual salary of a Certified Ethical Hacker
is around $95,155.
CERTIFIED ETHICAL HACKER (CEH)
120. What is cybercrime?
A. Traditional crime committed with the use of computers
B. Any crime committed using digital technology
C. Hacking into government databases
D. Only crimes related to software development
124. Which type of phishing involves attackers posing as a trustworthy entity to obtain
sensitive information?
A. Spear phishing
B. Vishing
C. Pharming
D. Whaling
130. What precautionary measure can help prevent falling victim to phishing attacks?
A. Sharing passwords with colleagues
B. Clicking on links from unknown sources
C. Verifying the legitimacy of emails before responding
D. Disabling antivirus software
133. How can users enhance their cybersecurity in the context of phishing?
A. Use the same password in all of your accounts
B. Click on every link received in emails
C. Regularly update passwords
D. Share sensitive information freely
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135
135. How can users protect themselves from phishing attacks on social media platforms?
A. Accept all friend requests
B. Share personal information openly
C. Verify the authenticity of messages and links
D. Use the same password across all platforms
137. Which type of phishing attack involves fraudulent phone calls to obtain sensitive
information?
A. Smishing
B. Vishing
C. Pharming
D. Whaling
139. What should users do if they suspect they have fallen victim to a phishing attack?
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135
140. What is the significance of regularly updating software and operating systems in
preventing phishing attacks?
A. It slows down computer performance
B. It increases vulnerability to attacks
C. It patches security vulnerabilities and enhances protection
D. It has no impact on cybersecurity
141. How can users identify a secure website and reduce the risk of falling victim to phishing
on fake websites?
A. Look for a padlock icon in the address bar and use "https" in the URL
B. Trust websites with flashy animations and pop-ups
C. Share personal information without checking the site's security features
D. Ignore the website's URL and proceed with transactions
144. What should users be cautious about when receiving unexpected emails urging
immediate action, such as verifying account information or resetting passwords?
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135
145. Why is it crucial for organizations to implement a strong incident response plan to
combat phishing attacks?
A. To ignore phishing attempts and discourage attackers
B. To alert employees about the latest phishing techniques.
C. To efficiently respond and mitigate the impact of a successful attack
D. To share sensitive information with external entities
146. How can users strengthen their password security to prevent falling victim to phishing
attacks?
A. Use the same password for multiple accounts
B. Use easily guessable passwords like "password123"
C. Enable multi-factor authentication (MFA)
D. Share passwords with trusted friends
148. What precautionary measure can help individuals avoid falling victim to smishing
attacks?
A. Open all text messages and click on links without verification
B. Share personal information freely through text messages
C. Verify the legitimacy of text messages and avoid clicking on suspicious links
D. Respond to urgent requests for information immediately
149. What precautionary measure can help individuals avoid falling victim to vishing
attacks?
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135
151. How do attackers often disguise their malicious links in angler phishing attacks?
A. By using shortened URLs
B. By using long and descriptive URLS
C. By embedding the links in images
D. By avoiding the use of links altogether
152. How can users recognize potential angler phishing attacks on social media?
A. By ignoring all comments on social media
B. By clicking on all shared links for verification
C. By checking the authenticity of profiles and scrutinizing links in comments
D. By responding to all comments to establish communication
153. In angler phishing, what is the danger of clicking on malicious links in comments or
replies?
A. A. It improves online security
B. It can lead to the installation of malware or the theft of sensitive information
C. It enhances social media engagement
D. It supports legitimate businesses
154. What is a potential consequence for individuals who fall victim to angler phishing
attacks?
A. Increased social media followers
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135
155. What is the primary cybersecurity law in the Philippines that aims to prevent and
address cybercrime?
A. Data Privacy Act of 2012
B. Cybersecurity Act of 2012
C. Republic Act No. 10175
D. Electronic Commerce Act of 2000
156. What is the significance of the Anti-Cybercrime Group (ACG) in the Philippines?
A. It is responsible for investigating and combating cybercrime
B. It focuses on preventing physical crimes only
C. It promotes cybersecurity awareness through educational programs
D. It manages the country's internet infrastructure
157. What is the primary focus of the Data Privacy Act of 2012 in the Philippines?
A. Protecting individuals from cyber threats
B. Regulating the use of electronic signatures
C. Safeguarding the privacy of personal information collected and processed by the
government and private sector
D. Enforcing strict internet censorship
158. In angler phishing, what is the danger of clicking on malicious links in comments or
replies?
A. It improves online security
B. It enhances social media engagement
C. It supports legitimate businesses
D. It can lead to the installation of malware or the theft of sensitive information
159. Why do attackers favor social media platforms for angler phishing?
A. Social media has strong security measures
B. Social media users are less likely to click on links
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135
163. What is the term for a software failure that results in a violation of the software's
security policy?
A. Security breach
B. Privacy infringement
C. Vulnerability exploit
D. Authentication failure
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135
167. What is the primary goal of addressing software failures through warranty?
A. To absolve the developer of any responsibility for software defects
B. To minimize the financial impact on the developer due to defects
C. To enhance customer satisfaction and confidence in the software product
D. To shift the blame for failures onto the customer
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135
176. It refers to words and expressions that offend because they make inappropriate
assumptions or stereotypes about gender, ethnicity, physical or mental disability, age, or
sexual orientation.
Biased language
179. How can I write in a way that's fair to both men and women?
Accordingly, use nonsexist occupational descriptions in your writing.
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate