Professional Documents
Culture Documents
Gee Midterm Reviewer
Gee Midterm Reviewer
Router
Computers are linked together using cables or wireless technology, within one building or over a small geographic LAN
area.
It refers to creations of the mind: inventions, literary and artistic works, symbols, names, images, and designs used in Intellectual Property
commerce.
It is any visible sign capable of distinguishing the services of an enterprise and shall include a stamped or marked Service Mark
container of goods
___________ is intended to protect designs which have an industrial or commercial use. Design Registration
A formula, devise, process, method or compilation of information gives the owner an advantage over competitors Trade Secrets
__________ is a protocol supporting the practice of peer-to-peer file sharing that is used to distribute large amounts Bit Torrent
of data over the Internet.
Miguel wants to stop receiving a marketing campaign from a company. He requested the company to stop sending it. Right to Object
What right Miguel can exercide in this situation?
It defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in HTTP
response to various commands.
A network layer protocol that reports errors and provides information related to IP packet processing. Internet Control Message Protocol
Someone who was attempting to get a system to do something it had never done before. Hacker
the person inside the organization to gain access to confidential information. system administrator and call that Social Engineer
person, pretending to be his supervisor's supervisor and demanding to know why he is unable to access a specific
machine.
unauthorized access to or interference with a computer system/server or information and communication system 1 and 2
Which statements are part of self-Censorship: I, II, and III
I. The most common form of censorship
II. Group decides for itself not to publish
III. Rating systems
IV. Prepublication review
V. Government monopolization
malicious code to your computer or mobile device that leaves you open to a cyberattack. You don't have to click on Drive-By Downloads
anything.
Messages embedded in files transferred between computers e-mail
the set of all mail servers and connectors within a company or organization. network cloud
Senders and receivers do not derive equal benefit from emails Social contract theory evaluation
Which is an example of spam? Newsletter you did not sign up for
what is unique about every webpage? URL
Most common form of censorship where individuals inside the group prefer not to publish. Self-Censorship
Also referred to as content control software Web Filter
if someone steals your personal information without your permission. Identity Theft
Social Factors contributing to computer addiction Peer Groups
_____ is any private corporate data that provides a competitive advantage to any business Trade Secrets
The owner has 20 years to stop others in making, using and selling the invention. Patent
“An act protecting individual personal information in information and communications systems in the government and REPUBLIC ACT 10173 - DATA
the private sector, creating for this purpose a National Privacy Commission, and for other purposes” PRIVACY ACT OF 2012
In what year does the movie WarGames came out? 1983
BIND, Apache and Sendmail are example of ______ Open-Source Software
A ____ is a web-based collaboration platform that lets users to organize the storage, creation, and modification of Wiki
material. It is also means quick or fast.
A NOT gate and an AND gate are combined. If an AND gate gives a 0 output, this gate gives a 1 output. NAND Gates
Early in ____ between 8 and 15 million computers were infected with Conficker, including portions of military 2009
networks in France, the United Kingdom, and Germany.
It’s been estimated that as much as _____ of spam is distributed through botnets. 90 percent
Innocent users are used as a means for an end (eliminating spams) Kantian Evaluation
A most common form of censorship Self-censorship
Confidential piece of intellectual property that gives the company a competitive advantage Trade Secret
A public (not secret) document that provides a detailed description of the invention Patent
manipulation of a person inside the organization to gain access to confidential information. Social engineering
Copyright protection began in what year? May 31, 1970
malicious software, is any program or file that is harmful to a computer user. Malware
what year lasser launce? April 2004
software that allows an unauthorized user to have privileged access to a computer and to restricted areas of its Rootkit
software.
method of attacking a database-driven Web application that has improper security. SQL injection
It is a source of information that is run by the internet. WWW
This type of hacker is considered as ethical hacker, for respecting the law. White Hat Hacker
These are illegal activities done on the internet, usually, stealing someone's identity or performing fraud. Cybercrime
A web that contains a drug transactions, political protests, illegal information, and private communication. Dark Web
This is a freedom of a person to keep or share his/her personal information. Privacy
When a piece of private information got leaked, it is called? Information Disclosure
Unwanted junk mail usually happens in text messages or emails. Spam
It is a base 2 number conversion coding. Binary
Prevent inappropriate images and words shared in public Censorship
A way to keep children safe from inappropriate content is by parent restrictions called? Parental Control
Convert the following decimal number to binary: 311 100110111
Convert the following decimal number to octal: 311 467
Convert the following decimal number to hexadecimal: 311 137
10101010 + 11001100 101110110
Convert the following binary number to octal: 0101110110 566
Below are the most commonly used bases in modern computing and digital elecrtonics, except: fractional
Which of the following is the base of decimal? 10
Which of the following is the base of octal? 8
Which of the following is the base of hexadecimal? 16
It is possible to convert base 10 to hexadecimal with letters included. True; since 10-16 equates to A-G
respectively
The numbers included in binary are: i. 1 ii. 2 iii. 0 iv. 3 i, iii
When adding binary, 0+0 equates to 0
When additing binary, 0+1 equates to 1
When adding binary, 1+1 equates to 0 carry 1
When multiplying binary, 1 * 1 equates to 1
It is a legal concept that protects the exclusive rights of creators or owners of software, preventing others from Software copyright
copying, distributing, or using their software without permission.
How long does software copyright protection last? Software copyright protection
typically lasts for the life of the author
plus 70 years.
Can you copyright open-source software? Yes, open-source software can be
copyrighted.
It refers to the unauthorized use, distribution, or copying of software. It is a violation of software copyright law and can Software piracy
lead to legal and financial penalties.
What is WIPO mean? World Intellectual Property
Organization (WIPO)
It is an international organization that administers various treaties related to intellectual property, including copyright. WIPO
It provides resources and guidance to help countries develop and implement effective copyright laws, including those
related to software.
Can you copyright an idea for software? No, the ideas themselves are not
eligible for copyright protection.
Software copyright provides legal protection to software developers and companies. TRUE
Software copyright helps to ensure that creators receive financial compensation for their work. TRUE
It is a legal doctrine that allows limited use of copyrighted material without requiring permission from the copyright Fair use
holder. In software, this might apply to activities like reverse engineering, interoperability, or education.
It is one of the proposed solutions to Spam Epidemic that add a cost to every email that is sent for ads Micropayment System
The following statements are violations of Software Copyrights, which of the statements are true? Statement I, II, III
I. Copying a program to give or sell to someone else
II. Preloading a program onto the hard disk of a computer being sold
III. Distributing a program over the Internet
Freedom of expression is in the ___ Amendment of US Constitution that covers political and and non political speech 1st Amendment
Convert 1096 into binary, octal, and hexadecimal Binary : 10001001000
Octal : 2110
Hexadecimal : 448
Social, Situational, and Individual factors are the three contributing factors to computer addiction. TRUE
The following statements are Beneficial consequences of Open-Source Software, which of the statements are false? Statement III & IV
I. Gives everyone the opportunity to improve program - Eliminates tension between
II. New versions of programs appear more frequently obeying the law and helping others
III. Includes tension between obeying the law and helping others - Programs belong to the entire
IV. Programs belong to the entire society community
Under Republic Act 10173, Data Privacy Act of 2012 (DPA) stated that "The processing of all types of personal Data Privacy and Cybercrime
information and to any natural and juridical persons involved in personal information processing shall comply to the Prevention in the Philippine Digital
law" and can be found at page 24 of the ___. Age
The right to access is your right to find out whether an organization holds any personal data about you and if so, gain None of the above
“reasonable access” to them. The following are the statements that you may demand to access EXCEPT.
I. The contents of your personal data that were processed.
II. Names and addresses of the recipients of your data.
III. The identity and address of the personal information controller.
IV. Date when your data was last accessed and modified.
In the movie Live Free or Die Hard, a terrorist organization hacks into a variety of computer and communication TRUE
systems to seize control of traffic lights, natural gas pipelines, and electrical power grids.
It is a requirement to access a computer system login name and password
It means looking through garbage for interesting bits of information. Dumpster diving
These are the two early worms to strike instant messaging systems in 2001. Choke and Hello
The following are beneficial consequences of open-source software EXCEPT. Programs belong to only a certain
community
What does GNU stands for? General Public License
Without attracting a critical mass of developers, open-source SW quality can be _____. Poor
Spam is more than ___ times cheaper than junk mail. 100
What does CIPA stands for? Child Internet Protection Acts
Types of wired home networks include all of the following EXCEPT. Wi-Fi
It is a cable that consists of a single copper wire. Coaxial
It is responsible for screening television programs and films. Movie and Television Review and
Classification Board (MTRCB)
What are the three basic types of logic gates? AND gate, OR gate, and the NOT
gate
What are the beneficial consequences of Open-Source Software Statement I only.
Statement I: Programs belong to entire community.
Statement II: Source code included in the distribution.
Statement III: Provides tension between obeying law and helping others.
Statement IV: Old versions of programs appear more frequently.
A type of Ethical Evaluations of Publishing Blacklist wherein the receiver as well as the sender do not derive equal Social contract theory evaluation
benefit from emails.
What is/are true about the challenges Posed by the Internet? Statement II, and IV.
Statement I: Determines the age of users.
Statement II: Many-to- Many communications.
Statement III: Child Internet Protection Acts started to arise.
Statement IV: Huge number of Web sites.
Actions owners of digital intellectual property take to protect their rights. Digital Rights Management
The following are the violations on software copyrights except one. Selling
The following are the characteristics of license except one There are restrictions preventing
others from selling or giving away
software
New versions of programs appear more frequently is one of the beneficial consequences of open-source software TRUE
Sendmail is an example of open-source software TRUE
Web is based on the internet and is not decentralized. FALSE
“An act protecting individual personal information in information and communications systems in the government and RA 10173 Data Privacy Act of 2012
the private sector, creating for this purpose a National Privacy Commission, and for other purposes”
School ID is an example of offline identity TRUE
An account on Facebook is an example of offline identity FALSE
A low-tech techniques that allows hckers to look through garbage for interesting bits of information Dumpster Diving
An explorer and a risk taker that tries to make a system do something that has never done before. Hacker
A symbol, word, or phrase used to identify and distinguish a company's products or services from those of others Trademark
Which of the following is an example of intellectual property? Copyright
A technique used by hackers to gain unauthorized access to a database by injecting SQL code SQL injection
Which of the following is not an example of cybercrime? Online gaming
A type of software that is designed to harm or disrupt computer systems, networks, or devices Malware
How does email works? Email messages are sent through a
series of servers that route the
message from the sender to the
recipient.
Which of the following is an example of a blog? The Huffington Post
Which of the following is a common use of BitTorrent? Downloading large files, such as
movies or video games, from the
internet.
The right to know what personal information is being collected, processed, and stored by an organization. Right to access
The smallest unit of information used in computing and digital communications, represented as either 0 or 1. Binary digit
1. What is not attributes of web increases the utility of the internet
Which is not according to Kant about pornography pornography makes money
What is direct censorship Government manipulation
"The only ground on which intervention is justified is to prevent harm _______; the individual's own good is not a to others
sufficient condition"
Factors to computer addiction, except Achievements
TCP-based protocol allows administrators to view and modify _______ information. endpoint
_____________ are used to communicate with servers and send messages to other clients. software clients
Walkie-talkie is an example of? two-way communication
It has a purpose of saving information. network connectivity
Bluetooth is the best example of? wireless network
It is a type of hacker that is also called as Robinhood. blue hacker
Managed devices on the network can use this protocol to send error messages. Internet control message protocol
This is a government agency that is responsible for reviewing and giving out ratings for TV programs and films in the MTRCB
Philippines
This is the best example of an intellectual property Inventions
This type of information refers to race, ethnic origin, marital status, age, color, health, and education. Sensitive Personal Information
A government body created under the Data Privacy Act of 2012, which is responsible for mandating information National Privacy Commission
privacy. This also gives you the right to file a complaint regarding your personal information.
The most famous worm of all time was also the first one to get the attention of the mainstream media Moris Worm
It is a type of entertainment medium that aims to promote sexual arousal by producing sexually explicit videos. Pornography
An American trade association that establisheses guidelines for film content similar to MTRCB. Motion Picture Association (MPA)
Which among is the true contributing factor to computer addiction? Feeling of alienation
Which of the following are true? D- Development--oriented, R-
Regulatory, E- Enforcement, A-
Adjudicatory, M- Policy-making
Censorship rating started on 1995 ESRB
Who signed the Republic Act of 9283? Senator Raul S. Roco
It deals with the protection of works and the rights of their authors Berne Convention
What is the meaning of Internet? International Network
Helps negotiate the use sharing and assigning of IP so that companies and individuals can use government Technology Transfer/T2
technology or joint project between the government
Amount of email that is spam has increased ___ in 2009. 90%
This country forbids access to neo-Nazi sites. Germany
Which is not applicable under rating systems in self-censorship. Web
The right to dispute and have corrected any inaccuracy or error in the data a personal information controller (PIC) The right to rectify
holds about you.
Members of the _____ and ______ Subcommittee built an elaborate electronic switching system to control the Signals and Power
movement of the trains.
Which does not belong under Protecting Intellectual Property. Censorship
Hacking or _____ which refers to unauthorized access into or interference in a computer system/server or information Cracking
and communication system.
Which is not a type of malware. Spywear
The appearance of the Kelvir worm in ____ forced the Reuters news agency to remove 60,000 subscribers from its 2005
Microsoft-based instant messaging service for 20 hours.
The attacker accesses the application like any other client of the application, but by _______ an SQL query into a text Inserting
string from the client to the application, the attacker can trick the application into returning sensitive information.
How firms get email addresses: Both I and II are true.
I. Opt-in lists
II. Dictionary attacks
Pornography is immoral in ethics. Which of the following is not under Kantianism. Those who produce pornography
make money
Challenges posed by the internet: II and III are true.
I. Static connections
II. Huge number of web sites
III. Can’t determine the age of users
IV. Easy access to information
Allows you to obtain and electronically move, copy or transfer your data in a secure manner, for further use. The right to data portability
Simply looking over the shoulder of a legitimate computer user to learn his login name and password Eavesdropping
Which does not belong under Property Rights. A person can claim more property
than he or she can use
BIND, Apache, Sendmail, Perl, and GNU are examples of __________. Open-Source Software
Minimum fine for Hacking in the Philippines P100,000.00
Social engineering is easier in _____ organizations where people do not know each other very well. Large
The Google __________ Team has discovered more than three million URLs that initiate drive-by downloads. Anti-Malware
Which is true in the statements below: a) Emails are messages
embedded in files transferred
between computers.
Which of the given was the correct format of an email? c) user … @ domain …
An instant message (IM) that has a link to a porn site is a great example of what we call: b) Spam
How do you stop spreading misinformation? b) Double-check other information’s
with more credible sources before
sharing to others.
Which is the correct value of “01110110” when changed in Hexadecimal? c) 76
Binary 110 + 111 is equal to? In octal. a) 5
Eavesdropping is a form of: b) Hacking
The trojan horse symbolizes what (in general): c) Deceit
It is a display of pop-up advertisements. b) Adware
Patrick was watching One Piece on an illegal site, while watching a big banner appear in front of his screen, it says b) A trojan horse
he won a new iPhone 14. This is an example of:
Statement 1: A phishing is when an attacker sends out millions of email messages from a botnet. Statement 2: SQL Only statement 1 is correct.
phishing is a variant of phishing in which the attacker selects email addresses that target a particular group of
recipients.
The ______ is the most basic right as it empowers you as a data subject to consider other actions to protect your right to be informed, data privacy,
_______ and assert your ________ rights. other privacy
Hacking/Cracking shall be punished by a minimum fine of 100,000 and a minimum mandatory imprisonment of 180 days
In the 1983 movie _______, a teenager breaks into a military computer and nearly causes a nuclear Armageddon. WarGames
After seeing the movie, a lot of teenagers were excited at the thought that they could prowl cyberspace with a home
computer and a modem. A few of them became highly proficient at breaking into government and corporate computer
networks. These actions helped change the everyday meaning of the word “hacker.”
To protect our computer system, we can install antivirus software. Commercial antivirus software packages allow vendor's
computer users to detect and destroy viruses lurking on their computers. To be most effective, users must keep them
up-to-date by downloading patterns corresponding to the latest viruses from the ______ Web site.
The following is how an email virus spread. Which statements are correct? 1. A computer user reads an email with an 1, 2, 3, and 4
attachment 2. The user opens the attachment, which contains a virus 3. The virus reads the user’s email address
book 4. The virus sends emails with virus-containing attachments
A worm is a self-contained program that spreads through a computer network by _________ in the computers exploiting security holes, 1975
connected to the network. The technical term “worm” comes from The Shockwave Rider, a ____ science fiction novel
written by John Brunner.
Digital Recording Technology such as compact discs (CD) is: 1. Cheaper to produce than vinyl records. 2. High- 1 and 3 only
capacity file servers. 3. Has higher quality.
In ____ RIAA sued four students (for distributing copyrighted music) for about $100 billion (settled for $50,000) 2003
Violations of Software Copyrights involves ______ a program to give or sell to someone else, ______ a program onto Copying, Preloading, Distributing
the hard disk of a computer being sold, and _____ a program over the Internet
The following are the proposed solution to spam epidemic, EXCEPT: ban solicited email by-laws (should
be unsolicited)
He says that pornography is immoral because all sexual gratification outside marriage is wrong Kant
What is usually maintained by an individual with regular entries of commentary? blog
What country has the ISPs sign where there is a "self-discipline" agreement? China
Under what contributing factors to computer addiction is the feeling of alienation? individual factors
How many employees or data subjects do companies must have to comply with the Data Privacy Act of 2012 (DPA)? 250 employees or 1000 data subjects
True or False: The minimum fine for Hacking or Cracking is one hundred thousand (100,000) and a maximum True (according to Ph RA 8792)
commensurate to the damage incurred and a mandatory imprisonment of six (6) months to three (3) years
True or False: A host is a piece of self-replicating code embedded within another program called the virus. False (should be vice versa)
The technical term "worm" comes from The Shockwave Rider, a 1975 science fiction novel written by whom? John Brunner
It's been estimated that as much as ___ percent of spam is distributed through botnets. 90%
It means giving data subjects genuine choice and control over how a Personal Information Controller (PC) uses their consent
data.
A third party who processes personal data on behalf of the data controller. Personal Information Processor
The 'legal' person that determines how the data will be processed. Personal Information Controller
If you personal data was used by a company without your consent and this caused damage to you like The right to damages
unemployment. What right may you exercise?
It is an act of stealing someone's ideas or words and passing them off as one's own. Plagiarism
This refers to an individual whose personal information is processed. Data Subject
Copyright law protects authored works; ______ law protects inventions. Patent
The main tactic used to circumvent _______ is to register numerous domain name variations as soon as an Cybersquatting
organization thinks it might want to develop a Web presence.
A ____ (not secret) document that provides a detailed description of the invention. public
It is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products trademark
from another's.
A _____ is a malicious software that allows an unauthorized user to have privileged access to a computer and to rootkit
restricted areas of its software.
Adware is a type of _____ that displays pop-up advertisements related to what the user is doing. spyware
The Sasser worm, launched in April _____, exploited a previously identified security weakness with PCs running the 2004
Windows operating system.
In a distributed denial-of-service (DDoS) attack, the attacker rents access to a botnet from a ___? bot herder
A _____ is a website that allows the easy creation and editing of any number of interlinked web pages via a web wiki
browser using a simplified markup language
Also known as the transient network Peer-to-peer Network
Refers to the manipulation of a person inside the organization to gain access to confidential information Social Engineering
Which of the following is not a malware? Social Engineering
The conficker or ____ worm, is notable because computer security experts have found it particularly difficult to Downadup
remove.
_____ is another way in which malware may be downloaded without a user’s knowledge. Cross-site scripting
An ethical evaluation of spamming that says 1 from 100,000 would buy because of a spam. Act utilitarian evaluation
An ethical evaluation of publishing blacklist that says innocent users are used as a means for an end. Kantian evaluation
It maintains good relations with government officials. Self-censorship
Companies also _________ trademarks by contacting those who misuse them. protect
Digital rights management are actions owners of _______ intellectual property take to protect their rights. digital
The binary of the decimal 312 is ________. 100111000
The binary of the decimal 123 is ________. 1111011
The octa of the decimal 312 is ________. 470
The hexa of the decimal 312 is _______. 138
The binary of the hexadecimal 1B3 is _______. 110110011
This is the set of all mail servers and connectors within a company or organization Network Cloud
An Ethical Evaluations of Publishing blaclist where senders and receivers do not derive equal benefit from emails Social contract theory evaluation
A quasi-judicial government agency under the Office of the President, which is responsible for the review and MTRCB
classification of television programs, movies and publicity materials.
The following are the Factors to Computer Addiction EXCEPT: IV. Physical
I. Social
II. Situational
III. Indivdual
IV. Physical
Examples of Intellectual Property, EXCEPT: II.Franchise
I. Trade secrets
II.Franchise
III. Patents
IV. Copyrights
V. Trademarks
What is the Intellectual Property Code of the Philippines that has been propsed by the late Senator Raul Roco R.A. 8293
It is a Violation of Software Copyrights that give or sell to someone else Copying a program
Open Source Softeware has no restrictions preventing others from selling or giving away software TRUE
What is the Republic Act for Data PRivacy Act od 2012 (DPA) REPUBLIC ACT 10173
A person who is an explorer, a risk-taker, someone who was trying to make a system do something it had never done Hacker
before.
A type of spyware that displays pop-up advertisements related to what the user is doing. Adware
From smallest to largest, what is the correct order? LAN - MAN - WAN
What type of network would qualify as a metropolitan area network (MAN)? A network that covers an area
equivalent to a city answer
The following are how an Email Virus Spreads, which is not correct? I. A computer user reads an email
I. A computer user reads an email without an attachment without an attachment
II. The user opens the attachment, which contains a virus
III. The virus reads the user’s email address book
IV. The virus sends emails with virus-containing attachments