You are on page 1of 25

UM Tagum College

UM Visayan Campus, Tagum City, Davao del Norte


Telefax No.: (084) 655-9607 | Local 135

CS 8 – SOCIAL ISSUES AND PROFESSIONAL PRACTICE

FINAL EXAM REVIEWER

1. It refers to social conventions about right and wrong that are so widely shared that they
become the basis for an established consensus.
MORALITY

2. It is a set of beliefs about right and wrong behavior within a society.


ETHICS

3. Ethics comes from the Greek word _____ which means _____.
ETHOS, CHARACTER

4. How does a person who acts with integrity typically behave?


A person who acts with integrity typically behaves in accordance with a personal code
of principles.

5. What is one approach to acting with integrity, which is considered a cornerstone of


ethical behavior?
One approach to acting with integrity is to extend to all people the same respect and
consideration that you expect to receive from others.

6. It refers to one’s personal beliefs about right and wrong.


MORALS

7. It is the term that describes standards or codes of behavior expected of an individual by a


group (nation, organization, profession) to which an individual belongs.
ETHICS

8. It is a system of rules that tells us what we can and cannot do. These are enforced by a set
of institutions (the police, courts, law-making bodies).
LAW

9. These are acts that conform to the law.


LEGAL ACTS

10. It conforms to what an individual believes to be the right thing to do.


Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College

UM Visayan Campus, Tagum City, Davao del Norte


Telefax No.: (084) 655-9607 | Local 135

MORAL ACTS

11. It is defined as the degree to which an individual can determine which personal
information is to be shared with whom and for what purpose.
PRIVACY

12. It is a statement contained on a website that details how the operators of the site will
collect, store, protect, and utilize personal data provided by its users.
PRIVACY POLICY

13. It refers to the ability of an individual or group of individuals to express their beliefs,
thoughts, ideas, and emotions about different issues free from government censorship.
FREEDOM OF EXPRESSION

14. An act protecting individual personal information in Information and Communications


Systems in the government and the private sector, creating for this purpose a national
privacy commission, and for other purposes.
DATA PRIVACY ACT OF 2012

15. It relates to any rights you have to control your personal information and how it’s used.
PRIVACY

16. Who needs a privacy policy?


Any company that gathers user’s data is required to have a privacy policy.

17. What is included in the privacy policy?


The exact information that will be collected from website users, which may include
names, physical or e-mail addresses, IP addresses, and telephone numbers, and
location tracking.

18. “An act protecting individual personal information in Information and Communications
Systems in the government and the private sector, creating for this purpose a national
privacy commission, and for other purposes”.
REPUBLIC ACT NO. 10173

19. This Republic Act is otherwise known as _____.

Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College

UM Visayan Campus, Tagum City, Davao del Norte


Telefax No.: (084) 655-9607 | Local 135

DATA PRIVACY ACT OF 2012

20. It refers to an individual whose personal, sensitive personal, or privileged information is


processed.
DATA SUBJECT

21. Rights of Data Subject

TO BE INFORMED TO RECTIFICATION
TO OBJECT TO ERASURE OR BLOCKING
TO ACCESS TO DAMAGES

22. According to the 1986 constitution of The Republic of the Philippines, under which
section is the right to express ideas and opinions openly without fear of censorship or
repercussion guaranteed?
Guaranteed under Article III, Bill of Rights, Section 4 of the 1986 constitution of The
Republic of the Philippines.

23. It is defined as “the act of making untrue statements about another which damages
his/her reputation.
DEFAMATION

24. It is the term for the defamatory statement through printed or broadcast over the
media.
LIBEL

25. It is the term for the defamatory statement if through oral.


SLANDER

26. "the public and malicious imputation of a crime, or of a vice or defect, real or imaginary,
or any act, omission, condition, status, or circumstance tending to cause the dishonor,
discredit, or contempt of a natural or juridical person, or to blacken the memory of one
who is dead".
LIBEL, ACCORDING TO THE ARTICLE 353 OF THE REVISED PENAL CODE

27. Libel by means of writings or similar means. — A libel committed by means of writing,
printing, lithography, engraving, radio, phonograph, painting, theatrical exhibition,

Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College

UM Visayan Campus, Tagum City, Davao del Norte


Telefax No.: (084) 655-9607 | Local 135

cinematographic exhibition, or any similar means, shall be punished by prisión


correccional in its minimum and medium periods or a fine ranging from 200 to 6,000
pesos, or both, in addition to the civil action which may be brought by the offended
party."
ARTICLE 355 OF THE REVISED PENAL CODE

28. Oral defamation shall be punished by arresto mayor in its maximum period to prisión
correccional in its minimum period if it is of a serious and insulting nature; otherwise the
penalty shall be arresto menor or a fine not exceeding 200 pesos.
ARTICLE 358 OF THE REVISED PENAL CODE (SLANDER)

29. The penalty of arresto mayor in its maximum period to prisión correccional in its
minimum period or a fine ranging from 200 to 1,000 pesos shall be imposed upon any
person who shall perform any act not included and punished in this title, which shall cast
dishonor, discredit or contempt upon another person. If said act is not of a serious
nature, the penalty shall be arresto menor or a fine not exceeding 200 pesos.
ARTICLE 359 OF THE REVISED PENAL CODE (SLANDER BY DEED)

30. It is the use of Internet-based social media sites to stay connected with friends, family,
colleagues, customers, or clients.
SOCIAL NETWORKING

31. The world’s first postal service is created in Assyria. The phrase “the cheque’s in the
mail” is coined.
550 BC

32. In what year was the telegraph invented, and who is credited with the development of
the first successful optical telegraph?
1792, French engineer Claude Chappe and his brothers.

33. In what year did the world's first "selfie" take place, and who was the individual
responsible for capturing it?
1839 by Robert Cornelius

34. In what year was the telephone invented?


1890

Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College

UM Visayan Campus, Tagum City, Davao del Norte


Telefax No.: (084) 655-9607 | Local 135

35. In what year was the radio, an early precursor to Spotify, invented?
1891

36. During which decade were the world's first "supercomputers" built, where world’s
scientists begin developing ways for those supercomputers to communicate with each
other.
1940s

37. In which decade did the earliest forms of the "internet" begin to appear but are
extremely limited in both scale and scope.
1960s

38. In which year was the worldwide web invented?


1989

39. In which year was the world's first social networking site, "Six Degrees," created?
1997

40. In what year did Six Degrees shut down forever?


2001

41. In which month and year was LinkedIn founded, leading to excitement among
headhunters and hiring agencies?
DECEMBER 2002

42. In what month and year was Friendster launched?


MARCH 2002

43. In what month and year did Friendster achieve a milestone by reaching 3 million users?
July 2002

44. In what month and year was the image sharing site Photobucket launched?
MAY 2003

45. In which month and year was Myspace founded?

Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College

UM Visayan Campus, Tagum City, Davao del Norte


Telefax No.: (084) 655-9607 | Local 135

AUGUST 2003

46. In which month and year was Facebook founded?


FEBRUARY 2004

47. In which month and year was the photo-sharing site Flickr launched?
FEBRUARY 2004

48. In which month and year were Facebook Ads launched to support exponential growth?
APRIL 2004

49. In which month and year was Reddit founded?


JUNE 2005

50. In what month and year was YouTube acquired by Google for $1.65 billion.
OCTOBER 2006

51. In which month and year was Twitter founded?


MARCH 2006

52. In which month and year did the Facebook "Newsfeed" go live?
SEPTEMBER 2006

53. In what month and year did the hashtag (#) make its debut on Twitter?
AUGUST 2007

54. In which month and year did Spotify officially go live?


SPOTIFY WAS LAUNCED ON OCTOBER 07, 2008

55. In which month and year did Facebook introduce the "like" button, allowing users to
express their appreciation for status updates, photos, videos, links, and advertisements?
FEBRUARY 09, 2009

56. In what month and year did Facebook surpass Myspace in user count for the first time,
marking a significant milestone in their competition?
MAY 2009

Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College

UM Visayan Campus, Tagum City, Davao del Norte


Telefax No.: (084) 655-9607 | Local 135

57. When did Pinterest go live?


MARCH 2010

58. In which month and year was Instagram launched and hits 1 million users by December.
OCTOBER 2010

59. In which month and year was Snapchat launched?


SEPTEMBER 2011

60. In what month and year did Facebook acquire Instagram, and who were the founders of
Instagram at the time of the acquisition?
APRIL 2012, KEVIN SYSTROM AND MIKE KRIEGER

61. In which month and year did Facebook achieve the milestone of having 1 billion active
users?
OCTOBER 2012

62. In which month and year did Twitter reach 140 million active users?
DECEMBER 2012

63. In which month and year did Snapchat users start sending 60 million snaps per day?
FEBRUARY 2013

64. In which month and year did Myspace re-launch with a new website, mobile app, and an
endorsement from Justin Timberlake?
JANUARY 2013

65. In which month and year did Instagram achieve the milestone of reaching 200 million
active users?
MARCH 2014

66. In what month and year did Snapchat achieve 100 million active users, with the majority
being millennials?
APRIL 2015

67. In which month and year did Facebook enable GIFs?

Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College

UM Visayan Campus, Tagum City, Davao del Norte


Telefax No.: (084) 655-9607 | Local 135

MAY 2015

68. In which month and year did Friendster shut down?


JUNE 2015

69. In what month and year did Snapchat introduce its "filters" feature, allowing users to
add animal ears to their snaps?
SEPTEMBER 2015

70. In which month and year did Instagram announce that it had reached 500 million active
users?
JUNE 2016

71. In which month and year did Time Inc acquire Myspace?
FEBRUARY 2016

72. In what year did Snapchat undergo a rebranding, changing its name to "Snap Inc," and
also introduce smart sunglasses named "Spectacles"?
SEPTEMBER 2016

73. In what month and year did the unauthorized harvesting of 50 million Facebook profiles
for Cambridge Analytica without consent occur? A major data breached causing
Facebook stocks to plummet.
MARCH 2018

74. In what month and year did Mark Zuckerberg testify before Congress regarding the
Facebook-Cambridge Analytica data breach?
APRIL 2018

75. In which month and year did Facebook launch the "Care" reaction to provide people
with a means to express support during the COVID-19 crisis?
APRIL 2020

76. Top 15 Most Popular Social Networking Sites

FACEBOOK INSTAGRAM WEIBO


YOUTUBE QZONE TWITTER

Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College

UM Visayan Campus, Tagum City, Davao del Norte


Telefax No.: (084) 655-9607 | Local 135

REDDIT FLICKR ODNOKLASSNIKI


PINTEREST GOOGLE+ MEETUP
ASK.FM LINKEDIN
TUBMLR VK

77. It is a bullying that takes place over digital devices like cell phones, computers, and
tablets. It can occur through SMS, Text, and apps, or online in social media, forums, or
gaming where people can view, participate in, or share content.
CYBERBULLYING

78. What Republic Act in the Philippines where cyberbullying defined as: “ any severe or
repeated use by one or more students of a written, verbal or electronic expression, or a
physical act or gesture, or any combination thereof, directed at another student that has
effect of actually causing or placing the latter in reasonable fear of physical or emotional
harm or damage to his property; creating hostile environment at school for the other
student; infringing on the rights of the other student at school; or materially and
substantially disrupting the education process or the orderly operation of a school”
REPUBLIC ACT 10627 OTHERWISE KNOWN AS ANTI-BULLYING ACT OF THE PHILIPPINES

79. It is a threatening behavior or unwanted advances directed at an adult using the Internet
or other forms of online and electronic communications; it is the adult version of
cyberbullying.
CYBERSTALKING

80. It involves the use of social media networks to communicate and promote the benefits
of products and services.
SOCIAL NETWORK ADVERTISING

81. A self-regulating business model that helps a company be socially accountable—to itself,
its stakeholders, and the public
CORPORATE SOCIAL RESPONSIBILITY (CSR)

82. It is related to work that needs a high level of education or special training.
PROFESSION

Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College

UM Visayan Campus, Tagum City, Davao del Norte


Telefax No.: (084) 655-9607 | Local 135

83. It is a designation demonstrating a professional's competency in a certain aspect of


technology.
IT CERTIFICATION

84. Benefits of ethics in business:

Gain customer trust, thereby increasing sales.


Reduce employee turnover.
Attract potential talented individuals to work for the company thereby reducing
recruitment costs.
Draw potential investors, maintain the share price of the company, making it less
susceptible to company acquisition.

85. It was defined by Reddy (2016) as “the rules and procedures that should be carried out in
an office by the employer and the employees to maintain a professional company culture
and to build a better relationship with their customers by providing better services”.
WORKPLACE/WORK ETHICS

86. 8 Characteristics of Work Ethics:

PUNCTUALITY
ACCOUNTABILITY
FOCUS
INITIATIVE
PRODUCTIVITY
PROFESSIONALISM
DEDICATION
DESIRE TO IMPROVE

Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135

87. It means being focused, and giving time to the things that needs to be done as
scheduled.
DEDICATION

88. It means paying attention to the task assigned to you. This means an employee should
not get distracted by social media, chatting with employees and the like.
FOCUS

89. Being on time at work is important. Employees should respect that time is valuable in
the company. In addition, it does not only refer to being at work on time but also applies
to project deadlines.
PUNCTUALITY

90. According to Reddy (2020), it is the term for doing something without being ask.
Responsible employees do not wait to be commanded before working on the task
assigned.
INITIATIVE

91. Accomplishing more than the tasks in each time frame and avoiding distractions is
productivity.
PRODUCTIVITY

92. Treating other colleagues and employers with respect, dressing appropriately for the
job, going to work on time, performing duties and responsibilities given are all acts of
professionalism.
PROFESSIONALISM

93. Being accountable means shouldering the tasks and projects assigned to you and not
blaming others even if things go wrong.
ACCOUNTABILITY

94. A good employee who accepts feedback and suggestions has a desire to improve.
DESIRE TO IMPROVE

95. According to Reynold (2019) it “is the concept that an organization should act ethically
by taking responsibility for the impact of its actions on its shareholders, consumers,
employees, community, environment, and suppliers” (p.10).
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135

CORPORATE SOCIAL RESPONSIBILITY (CSR)

TOP 10 COMPANIES WITH THE BEST CSR REPUTATION IN 2020


1. LEGO
2. WALT DISNEY COMPANY
3. ROLEX
4. FERRARI
5. MICROSOFT
6. LEVI’S
7. NETFLIX
8. ADIDAS
9. BOSCH
10. INTEL

96. It takes charge of administrative control and supervision of at least 42 professions.


PROFESSIONAL REGULATION COMMISSION (PRC)

97. Why does IT workers cannot be considered as professionals?


Since they do not hold license issued by the PRC

98. How can IT workers be categorized professionally, considering their education and
training?
IT workers can be considered professionals since they have undergone high level of
education and training related to their field.

99. Why does courses related to Computing such as Computer Science, Information
Technology, Information Systems and the like have no licensure exams?
Due to the fact that technology is continuously evolving and these courses are
technology-dependent.

100. It states the principles and core values that are essential to the work of a particular
occupational group (Reynolds, 2015).
PROFESSIONAL CODE OF ETHICS

101. What are the two main parts that are created by professional organizations in most
codes of ethics in different professions?
First, outlines what the organization aspires to become.
Second, lists the rules and principles by which members of the organization are
expected to abide.
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135

102. If an activity is not defined as illegal, does it implies that it is ethical?


No, it does not imply that it is ethical even if it wasn’t defined as illegal.

103. What are the benefits an individual can get for applying professional code of ethics?
Ethical decision making
High standards of practice and ethical behavior
Trust and respect from the general public
Evaluation benchmark

104. Founded in 1946, it is one of the oldest and largest IT professional associations among
38 IEEE societies with over 85, 000 members. It helps the information and career
development of computing researchers and practitioners with technical journals,
magazines, books, conferences, etc. It sponsors conferences, journals, local and student
chapters, technical committees and standard working groups.
INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS COMPUTER SOCIETY

105. A computing society founded in 1947 with over 97, 000 students and professional
members in more than 100 countries. As of 2015, ACM publishes 50 journals and
magazines and 30 newsletters. ACM sponsors 37 special interest groups representing
major areas of computing, each provides publication, workshops and conferences.
ASSOCIATION FOR COMPUTING MACHINERY (ACM)

106. Started in Chicago in 1951. It provides IT-related seminars and conferences, information
on IT issues and forums for networking with other IT workers. Its mission is to provide
superior leadership and education in information technology. Furthermore, one of its
goals is to help members themselves more marketable in the IT industry.
ASSOCIATION OF INFORMATION TECHNOLOGY PROFESSIONALS (AITP)

107. Provides information security training and certification for a wide range of individuals,
such as auditors, system administrators and security managers.
SYSADMIN, AUDIT, NETWORK, SECURITY (SANS) INSTITUTE

108. “indicates that a professional possesses a particular set of skills, knowledge, or abilities,
in the opinion of the certifying organization”
CERTIFICATION

109. A person who passes this has a higher chance of being employed and has an advantage
over other IT professionals who did not obtain any of these.
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135

IT CERTIFICATION

110. As stated by the Information Systems Audit and Control Association (ISACA), the above-
mentioned certifications guarantees that the bearer is knowledgeable in risks to
information systems, then designing/implementing solutions. As stipulated by the IT
Skills and Salary Report, this certification has an average annually salary of $119,227 and
is a good certification for those interested in Information Systems Security positions.
CRISC: CERTIFIED IN RISK AND INFORMATION SYSTEM CONTROL

111. It is another certification by ISACA which recognizes competence in information


security management. Passers on this certification are someone who manages, designs,
and assesses information security in an organization. Furthermore, to be able to take
this certification exam, you need to have existing certifications like GIAC. They earn an
average of $118,348 annually according to the Skills and Salary Report.
CISM: CERTIFIED INFORMATION SECURITY MANAGER

112. It recognizes expertise in security and risk management just like CRISC and CISM. It is
reported that holders of this certification earn $110,603 annually as salary.
CISSP: CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL

113. The Project Management Institute (PMI) guarantees that the holders on this
certification are proficient in Project Management. According to PMI, they should be
able to “speak and understand the global language of project management”. PMP is
reported to have an average yearly salary of $109,405.
PMP: PROJECT MANAGEMENT PROFESSIONAL
114. is another IASCA certification which guarantees that Information Systems Auditor
possesses the right skills essential in evaluating systems follow best practices to “support
trust in and value from information systems”. They are reported to have $106,181 as an
average salary.
CISA: CERTIFIED INFORMATION SYSTEMS AUDITOR

115. It is a certification for someone with at least one (1) year of experience in networking
and certifies that the holder is capable of implementing and maintaining wide-area
networks and works with specialists on solutions. It has an average annual salary
amounting to $97,038.
CCNP ROUTING AND SWITCHING

116. It is a certification from CISCO, for network design. As a requirement to qualify for the
certification, an individual should have taken prior CISCO certification such as CCNP
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135

Routing and Switching, or any CCIE certification. If an individual is interested in becoming


a network engineer, CCDA certification should be taken. It has an average income of
$99,701.
CCDA: CISCO CERTIFIED DESIGN ASSOCIATE

117. It has an average annual salary of $96,215. Holders of this certification are responsible
in implementing technology over a wide variety of versions of Microsoft Products.
MSCE: MICROSOFT CERTIFIED SYSTEMS ENGINEER

118. This certification has an average salary of $95,434 yearly. This certification distinguishes
those who can employ ITIL concepts of quality IT solutions in real-world situations. It is
the third version, an internationally recognized collection of best practices for managing
information technology (IT).
ITIL (INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY) V3 FOUNDATION

119. This certification is not vendor-specific certification, which means it is not tied to any
brand. It is a certification for IT workers who demonstrate knowledge in assessing the
security of computer systems by exploring the possible vulnerabilities and weaknesses in
target systems in a lawful manner. The average annual salary of a Certified Ethical Hacker
is around $95,155.
CERTIFIED ETHICAL HACKER (CEH)
120. What is cybercrime?
A. Traditional crime committed with the use of computers
B. Any crime committed using digital technology
C. Hacking into government databases
D. Only crimes related to software development

121. What is phishing?


A. A type of malware
B. A method of social engineering
C. Unauthorized access to computer systems
D. A form of online protest

122. What is the primary purpose of a phishing email?


A. To provide useful information.
B. To spread awareness about cybersecurity
C. To deceive recipients into revealing sensitive information
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135

D. To offer free software downloads

123. Which of the following is a common goal of phishing attacks?


A. Stealing personal information
B. Enhancing computer performance
C. Promoting online safety
D. Improving internet speed

124. Which type of phishing involves attackers posing as a trustworthy entity to obtain
sensitive information?
A. Spear phishing
B. Vishing
C. Pharming
D. Whaling

125. What is smishing?


A. Social media phishing
B. SMS phishing
C. Smartphone phishing
D. Smarwatch phishing

126. What is vishing?


A. Voice-based phishing
B. Visual phishing
C. Video-based phishing
D. Virtual phishing

127. What is the primary purpose of smishing attack?


A. Intercepting emails
B. Stealing data through social media
C. Manipulating smartphone users through text messages
D. Spreading malware through smartphone apps

128. Which of the following is a common sign of a phishing email?


Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135

A. Urgency and threats


B. Grammatically perfect sentences
C. Generic greetings
D. Clear sender identification

129. What is whaling in the context of phishing attack?


A. Large-scale phishing attacks
B. Attacks on marine-related industries
C. Targeting high-profile individuals or executives
D. Attacks on environmental organizations

130. What precautionary measure can help prevent falling victim to phishing attacks?
A. Sharing passwords with colleagues
B. Clicking on links from unknown sources
C. Verifying the legitimacy of emails before responding
D. Disabling antivirus software

131. Which of the following is NOT a method of delivering phishing emails?


A. Email attachments
B. Social media messages
C. Instant messaging
D. Face-to-face communication

132. What is ransomware?


A. A type of phishing attack
B. Malicious software that encrypts files and demands payment for their release
C. A form of social engineering
D. An ethical hacking tool

133. How can users enhance their cybersecurity in the context of phishing?
A. Use the same password in all of your accounts
B. Click on every link received in emails
C. Regularly update passwords
D. Share sensitive information freely
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135

134. What is social engineering in the context of cybercrimes?


A. Manipulating individuals into divulging confidential information
B. A method of securely coding software
C. Using encryption algorithms to protect data
D. A form of artificial intelligence in cybersecurity

135. How can users protect themselves from phishing attacks on social media platforms?
A. Accept all friend requests
B. Share personal information openly
C. Verify the authenticity of messages and links
D. Use the same password across all platforms

136. What is the purpose of a denial-of-service (DoS) attack?


A. To steal sensitive information
B. To overwhelm a system, making it unavailable to users
C. To spread malware through email attachments
D. To enhance the performance of a website

137. Which type of phishing attack involves fraudulent phone calls to obtain sensitive
information?
A. Smishing
B. Vishing
C. Pharming
D. Whaling

138. What is a common precautionary measure to avoid falling victim to ransomware


attacks?
A. Opening email attachments from unknown sources
B. Regularly updating antivirus software
C. Disabling firewall protection
D. Sharing encryption keys with colleagues

139. What should users do if they suspect they have fallen victim to a phishing attack?
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135

A. Keep it to themselves to avoid embarrassment


B. Share the incident on social media for awareness
C. Change passwords and monitor accounts for suspicious activity
D. Respond to further phishing attempts to gather evidence

140. What is the significance of regularly updating software and operating systems in
preventing phishing attacks?
A. It slows down computer performance
B. It increases vulnerability to attacks
C. It patches security vulnerabilities and enhances protection
D. It has no impact on cybersecurity

141. How can users identify a secure website and reduce the risk of falling victim to phishing
on fake websites?
A. Look for a padlock icon in the address bar and use "https" in the URL
B. Trust websites with flashy animations and pop-ups
C. Share personal information without checking the site's security features
D. Ignore the website's URL and proceed with transactions

142. What does the term "bug" refer to in software development?


A. A feature requested by the customer
B. An error or flaw in the code
C. A document outlining project requirements
D. A software design pattern

143. Which of the following is a common practice to prevent phishing attacks in an


organizational setting?
A. Share sensitive information freely within the organization
B. Disable all security features to streamline communication
C. Use generic, easily guessable passwords for all accounts
D. Conduct regular security awareness training for employees

144. What should users be cautious about when receiving unexpected emails urging
immediate action, such as verifying account information or resetting passwords?
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135

A. Take immediate action without question


B. Verify the email's legitimacy by clicking on provided links
C. Contact the company directly using official contact information input
D. Share the email on social media for community

145. Why is it crucial for organizations to implement a strong incident response plan to
combat phishing attacks?
A. To ignore phishing attempts and discourage attackers
B. To alert employees about the latest phishing techniques.
C. To efficiently respond and mitigate the impact of a successful attack
D. To share sensitive information with external entities

146. How can users strengthen their password security to prevent falling victim to phishing
attacks?
A. Use the same password for multiple accounts
B. Use easily guessable passwords like "password123"
C. Enable multi-factor authentication (MFA)
D. Share passwords with trusted friends

147. In smishing attacks, what is a common characteristic of malicious text messages?


A. Grammatically perfect sentences
B. Urgent requests for information
C. Clear sender identification
D. Neutral and non-emotional language

148. What precautionary measure can help individuals avoid falling victim to smishing
attacks?
A. Open all text messages and click on links without verification
B. Share personal information freely through text messages
C. Verify the legitimacy of text messages and avoid clicking on suspicious links
D. Respond to urgent requests for information immediately

149. What precautionary measure can help individuals avoid falling victim to vishing
attacks?
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135

A. Avoid answering phone calls from unknown numbers


B. Share personal information over the phone freely
C. Trust all incoming calls without verification
D. Respond to urgent requests for information immediately

150. What is angler phishing?


A. A type of fishing for aquatic animals
B. A phishing attack targeting anglers and fishermen
C. A deceptive technique that uses fake customer support handles on social media
D. A phishing attack that leverages comments on social media to distribute malicious
content

151. How do attackers often disguise their malicious links in angler phishing attacks?
A. By using shortened URLs
B. By using long and descriptive URLS
C. By embedding the links in images
D. By avoiding the use of links altogether

152. How can users recognize potential angler phishing attacks on social media?
A. By ignoring all comments on social media
B. By clicking on all shared links for verification
C. By checking the authenticity of profiles and scrutinizing links in comments
D. By responding to all comments to establish communication

153. In angler phishing, what is the danger of clicking on malicious links in comments or
replies?
A. A. It improves online security
B. It can lead to the installation of malware or the theft of sensitive information
C. It enhances social media engagement
D. It supports legitimate businesses

154. What is a potential consequence for individuals who fall victim to angler phishing
attacks?
A. Increased social media followers
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135

B. Enhanced cybersecurity awareness


C. Compromised accounts and potential identity theft
D. Improved online reputation

155. What is the primary cybersecurity law in the Philippines that aims to prevent and
address cybercrime?
A. Data Privacy Act of 2012
B. Cybersecurity Act of 2012
C. Republic Act No. 10175
D. Electronic Commerce Act of 2000

156. What is the significance of the Anti-Cybercrime Group (ACG) in the Philippines?
A. It is responsible for investigating and combating cybercrime
B. It focuses on preventing physical crimes only
C. It promotes cybersecurity awareness through educational programs
D. It manages the country's internet infrastructure

157. What is the primary focus of the Data Privacy Act of 2012 in the Philippines?
A. Protecting individuals from cyber threats
B. Regulating the use of electronic signatures
C. Safeguarding the privacy of personal information collected and processed by the
government and private sector
D. Enforcing strict internet censorship

158. In angler phishing, what is the danger of clicking on malicious links in comments or
replies?
A. It improves online security
B. It enhances social media engagement
C. It supports legitimate businesses
D. It can lead to the installation of malware or the theft of sensitive information

159. Why do attackers favor social media platforms for angler phishing?
A. Social media has strong security measures
B. Social media users are less likely to click on links
Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135

C. Social media allows for easy distribution and engagement


D. Social media bans phishing content
160. What does the term "debugging" mean in software development?
A. Removing features from the software
B. Testing the software with real-world data
C. Fixing errors or defects in the code
D. Documenting the software requirements

161. What is the purpose of a software warranty?


A. To guarantee that the software will never have any bugs
B. To provide financial compensation if the software fails
C. To ensure that the software meets specific quality standards
D. To protect the software from unauthorized use

162. What is a software failure?


A. A planned outcome of the software development process
B. An unexpected behavior or defect in the software that prevents it from functioning as
intended
C. A feature enhancement requested by users
D. A documented requirement of the software

163. What is the term for a software failure that results in a violation of the software's
security policy?
A. Security breach
B. Privacy infringement
C. Vulnerability exploit
D. Authentication failure

164. Which of the following is NOT a consequence of software failure?


A. Financial loss
B. Loss of user trust
C. Increased productivity
D. Reputation damage

Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135

165. What is software warranty?


A. A guarantee that the software will never fail
B. A legal agreement between the software developer and the user
C. A promise that the software will meet specific quality standards for a specified period
D. An insurance policy covering damages caused by software failures

166. What is software development?


A. The process of designing hardware components for computers
B. The process of marketing and selling software products
C. The process of maintaining and updating existing software systems
D. The process of designing, specifying, documenting, testing, and framework of
computer coded programming

167. What is the primary goal of addressing software failures through warranty?
A. To absolve the developer of any responsibility for software defects
B. To minimize the financial impact on the developer due to defects
C. To enhance customer satisfaction and confidence in the software product
D. To shift the blame for failures onto the customer

168. Which of the following is NOT a common cause of software failure?


A. Incorrect user input
B. Hardware failure
C. Inadequate testing
D. Well-documented code

169. What is the primary goal of software development?


A. Maximizing project cost
B. Minimizing project duration
C. Meeting customer requirements
D. Reducing project scop
170. In English grammar, it refers to the classification of nouns and pronouns as masculine,
feminine, and neuter.
Gender

Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135

171. How can we usually determine the gender of a word?


By using the pronoun that refers to it (he, she, or it).

172. Why is gender important for writers?


Writers need to consider gender to ensure nouns and pronouns agree grammatically.

173. Why do we use different pronouns for people and things?


We use gendered pronouns (she/her for women, he/him for men) for people because
they have genders. We use the pronoun "it" for things because they are inanimate and
don't have genders.

174. It is a generalized view or preconception about attributes or characteristics, or the roles


that are or ought to be possessed by, or performed by, women and men.
Gender stereotype

175. When is a gender stereotype harmful?


A gender stereotype is harmful when it restricts what people can do in their lives,
careers, and personal development.

176. It refers to words and expressions that offend because they make inappropriate
assumptions or stereotypes about gender, ethnicity, physical or mental disability, age, or
sexual orientation.
Biased language

177. How can we avoid bias in conversations?


The easiest way to avoid bias is simply not to mention differences among people
unless the differences are relevant to the discussion.

178. What can sexist language lead to?


Sexist language can breed and reinforce inequality.

179. How can I write in a way that's fair to both men and women?
Accordingly, use nonsexist occupational descriptions in your writing.

180. Can biased language hurt your credibility?


Yes, biased language, even if unintentional, can damage your credibility.

Prepared by
VAN RENZO CLARIN
BS Computer Science Undergraduate

You might also like