cs37 midtrms Flashcards

(59 cards)

1
Q

Intellectual Property (IP) refers to:
Computer hardware
Physical assets owned by companies
Creations of the human mind
Financial investments

A

creations of the human mind

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following can be copyrighted?
Algorithms
Purely abstract ideas
Architectural works
Mathematical formulas

A

Architectural works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the main role of WIPO?
Use IP to stimulate innovation and creativity
Enforce military trade agreements
Protect only U.S. copyrights
Promote industrial espionage

A

use of intellectual property to stimulate innovation and
creativity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The copyright term has been extended how many times since 1960?
7
11
9
5

A

11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A design patent protects:
Software source code
Mathematical equations
Trade secrets
A new and ornamental design

A

A new and ornamental design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The Intellectual Property Code of the Philippines is:
RA 8791
RA 10173
RA 9160
RA 8293

A

RA 8293

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The WTO replaced GATT in:
1967
1979
1995
2000

A

1995

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Competitive intelligence differs from industrial espionage because:
It hacks competitor systems
It uses legal means
It steals trade secrets
It involves spying

A

It uses legal means

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A utility patent is valid for up to:
20 years
10 years
15 years
25 years

A

15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Privacy is best defined as:
A financial confidentiality clause
The ability to own patents
A government-regulated security policy
The right to be left alone

A

The right to be left alone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cybersecurity refers to:
Monitoring employee attendance
Installing antivirus only
Protecting physical office spaces
Protecting systems, networks, and data from unauthorized access

A

Protecting systems, networks, and data from unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Using a computer to commit real-world crimes like credit card fraud means the computer is:
A bystander
A target
A tool for learning
A weapon

A

a weapon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When the computer is the target, an example is:
Credit card fraud
Denial-of-Service (DoS) attack
Email spam
Phishing scam

A

Denial-of-Service (DoS) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When the computer is the weapon, an example is:
Worm infection
Firewall bypass
Credit card fraud
Hacking

A

Credit card fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spear phishing targets:
Specific organizations or employees
Bank ATMs
Smartphones only
Random internet users

A

Specific organizations or employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an exploit?
A type of antivirus software
An encrypted code
A bug fix
An attack that uses a system vulnerability

A

An attack that uses a system vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Data Loss Prevention (DLP) focuses on:
Deleting corrupted files
Removing old backups
Tracking and protecting data in use, in motion, and at rest
Encrypting only emails

A

Tracking and protecting data in use, in motion, and at rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A program that looks harmless but contains malicious code is a:
Rootkit
Worm
Trojan horse
Virus

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which law regulates commercial spam emails in the U.S.?
CAN-SPAM Act
Data Privacy Act
Cybersecurity Act
Homeland Security Act

A

CAN-SPAM Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which system monitors hostile cyber activity?
Cloud backup
VPN
Proxy server
IDS

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

WIPO was established in 1967.
False
True

A

falsee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The DMCA of 1998 created a safe harbor provision for online service providers.
False
True

A

truee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Plagiarism is legally the same as copyright infringement.
False
True

A

falsee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An exploit is a defensive measure taken to protect computer systems from malware.
True
False

25
Copying a substantial and material part of another's copyrighted work without permission is called copyright __________.
infringement
26
The RA __________ is the Data Privacy Act of 2012 which protects personal information in the Philippines.
10173
27
Confidentiality in the CIA triad ensures that only authorized individuals can access sensitive information. False True
truee
28
Malware that locks users out of their system until payment is made is called _______.
ransomware
29
A _______ is a system of software or hardware that controls network access based on organizational policies.
firewall
30
What do IT workers and clients usually establish their relationship through? Informal meetings Verbal promises Casual agreements Contractual terms
Contractual terms
31
Why are IT workers not recognized as legal professionals? They lack skills They are not licensed by the government They work with computers only They do not study ethics
They are not licensed by the government
32
Which organization fights software piracy? IEEE ACM ISO Business Software Alliance (BSA)
Business Software Alliance (BSA)
33
Who are IT users? Only programmers Only administrators People who use hardware or software products IT teachers
People who use hardware or software products
34
What percentage of employees report not being given clear directions at work? 20% 75% 57% 40%
0.57
35
Which is NOT a way to improve communication? Ignore employee concerns Provide descriptive feedback Schedule check-ins Encourage two-way communication
Ignore employee concerns
36
Which statement about IT professional organizations is correct? They issue government licenses A universal IT ethics code exists No single dominant IT professional organization exists Membership is mandatory
No single dominant IT professional organization exists.
37
Which is broader in perspective? Job experience Industry association certifications Vendor certifications Company training
Industry association certifications
38
Which skill is ranked highest by employers? Public speaking Writing code Adaptability Oral communication
Oral communication
39
Certification proves that: They are ACM members An IT professional possesses specific skills and knowledge They will always succeed in a job They are licensed by the government
An IT professional possesses specific skills and knowledge
40
The ACM Code of Ethics requires computing professionals to primarily consider: Financial profit System efficiency Public good Organizational loyalty
Public good
41
Which of the following is NOT an ACM general ethical principle? Be fair Respect privacy Maximize profit Avoid harm
Maximize profit
42
ACM principle 2.6 emphasizes that professionals should: Accept projects beyond their expertise Perform work only in areas of competence Ignore skill limitations Focus only on leadership roles
Perform work only in areas of competence
43
ACM leadership principles require leaders to: Prioritize company profit Avoid responsibility for staff development Ensure public good is the central concern Encourage secrecy
Ensure public good is the central concern
44
The AAP Code of Ethics is aligned with the: ASEAN Guide on AI Governance and Ethics UN Global Compact EU AI Act US Federal Guidelines
ASEAN Guide on AI Governance and Ethics
45
A guiding principle of the AAP Code is: Profit maximization Limiting collaboration Corporate secrecy Transparency and Explainability
Transparency and Explainability
46
Considering environmental sustainability in AI projects is emphasized under: Confidentiality rules Professional competence Guiding principles Leadership ethics
Guiding principles
47
The IEEE Code of Ethics was first adopted in: 1950 1974 1912 1990
1912
48
The current IEEE Code of Ethics consists of: 10 principles 7 principles 12 principles 3 principles
10 principles
49
IEEE members are committed to rejecting: Innovation Bribery Criticism Professional review
Bribery
50
IT professionals are legally recognized as professionals in all countries. False True
51
Certification alone guarantees that an IT worker will perform well on the job. False True
False
52
Certification is a substitute for professional experience. False True
FALSEe
53
ACM professionals must respect confidentiality. True False
TRUEe
54
The AAP Code discourages collaboration among professionals. True False
False
55
IEEE members are expected to avoid harassment and discrimination. False True
TRUEe
56
Misrepresentation is the misstatement or incomplete statement of a ______ fact.
material
57
A professional code of ethics improves ethical decision making and enhances public ______.
trust
58
ACM principle 1.2 states that computing professionals should avoid __________.
harm
59
IEEE Principle 7 requires members to avoid discrimination based on race, religion, gender, disability, age, national origin, sexual orientation, gender identity, or gender __________.
expression