Computer Ethics Flashcards

1
Q

Ethics is derived from the Greek term “ethos”, which means ______________.

A

character or custom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

refers to the guiding precepts and norms that are adopted and applied to regulate and control the use of computers and its applications.

A

Computer Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

characterized by an explicit attempt by attackers to prevent or bar legitimate users of computers from availing themselves of computer services.

A

Denial of service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

There are basic types of attacks in ‘Denial of service attack’:

A

a) Consumption of scarce, limited or non renewable resources

b) Destruction or alteration of configuration information,

c) Physical destruction or alteration of network components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

involves unauthorized access to a computer, its files, and programs. There are many reasons why hackers hack computers.

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

if a system offers some type of service and a hacker has a use for it, he/she will hack the system

A

Theft of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

for example, a hacker may get into the homepage of the university that kicked him out and deface the homepage

A

Vengeance and hatred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

sending of abusive emails or messages to other people or newsgroups.

A

Flaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is considered poor online conduct and is not tolerated
well in chatrooms or newsgroups.

A

Flaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

sometimes called unsolicited commercial email, is the Internet version of junk mail. It is an attempt to deliver a message over the Internet to someone who would not otherwise choose to receive it.

A

Spamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Almost all spam is ___________.

A

commercial advertising

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a program that reproduces its own code by attaching itself to other executable files in such a way that the virus code is executed when the infected executable file is executed.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is a self replicating program designed to spread across a network without requiring any outside actions to take place.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

messages about free money, children in trouble and other items designed to grab your attention and get you to forward the message to everyone you know
(chain letters).

A

Internet hoaxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is concerned with the promotion of the welfare of the people. In computing, social justice would pertain to equity of access. Some issues emanating from equity of access involves gender, physical disabilities, language

A

Social justice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____________ is one of the constitutional rights guaranteed by the supreme law of the land. Hence, it is constantly advocated by those who do no want to be subjected to restrictions in their expressions or articulation of their thoughts.

A

The right to freedom of expression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

is an asset, and as such it can be bought, licensed, exchanged, or gratuitously given away like any form of property.

A

Intellectual property

18
Q

has the right to prevent the unauthorized use or sale of the property.

A

intellectual property owner

19
Q
  • used to prevent an invention from being created, sold, or used by another party without
    permission.
A

Patent

20
Q
  • a distinctive sign which allows consumers to easily identify the particular goods or services that a
    company provides. Some examples include McDonald’s golden arch, the Facebook logo and so on.
A

Trademark

21
Q
  • covers “tangible” forms of creations and original work for example, art, music, architectural
    drawings, or even software codes.
A

Copyright

22
Q
  • are the secrets of a business. They are proprietary systems, formulas, strategies, or other
    information that is confidential and is not meant for unauthorized commercial use by others.
A

Trade Secret

23
Q

the act of using software without paying the appropriate license. This is the same as stealing from the software developer.

A

Software Piracy

24
Q

occurs anytime that a person copies any written work and claims it as its own. With the advent of the Internet, cut and paste plagiarism becomes common.

A

Plagiarism

25
Q

recognizes electronic signatures found in electronic documents as equivalent to signature on a written document.

A

E Commerce Law of the Philippines (Republic Act No. 8792)

26
Q

refers to any distinctive mark, characteristic and/or sound in electronic form, representing the identity of a person and attached to or logically associated with the
electronic data message or electronic document or any methodology or procedures employed or adopted by a person and executed or adopted by such person with the intention of authenticating or approving an electronic data message or electronic document.

A

Electronic Signature

27
Q

defines internet and computeroffenses and it aims to put users of the internet and computers in check by defining violations related to their use.

A

Cybercrime Prevention Act of 2012 (Republic Act No. 10175)

28
Q

The access to the whole or any part of a computer system without right.

A

Illegal Access

29
Q

The interception made by technical means without right of any non public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.

A

Illegal Interception

30
Q

The intentional or reckless alteration, damaging, deletion, or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses

A

Data Interference

31
Q

The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic
document, or electronic data messages, without right or authority, including the introduction or transmission of viruses

A

System Interference

32
Q

The input, alteration, or deletion of computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible; or

A

Computer-related Forgery

33
Q

a device, including a computer program, designed or adapted primarily for the purpose of committing any of the offenses under this Act;

A

Misuse of Devices

34
Q

A computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed with intent that it be used for the purpose of committing any of the offenses under this Act.

A

Misuse of devices

35
Q

the acquisition of domain name over the Internet in bad faith to profit, mislead, destroy reputation, and deprive others from the registering the same, if such a domain

A

Cyber-squatting

36
Q

The act of knowingly using computer data, which is the product of computer related forgery as, defined here, for the purpose of perpetuating a fraudulent or dishonest design.

A

Cyber-squatting

37
Q

The unauthorized input, alteration, or deletion of computer data orprogram or interference in the functioning of a computer system, causing damage thereby with fraudulent intent; provided that if no damage has yet been caused, the penalty imposed
shall be one (1) degree lower.

A

Computer-related Fraud

38
Q

The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right.

A

Computer-related Identity Theft

39
Q

The willful engagement, maintenance, control, or operation, directly or indirectly, of
any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system,
for favor or consideration.

A

Cybersex

40
Q

The unlawful or prohibited acts defined and punishable by Republic Act
No. 9775 or the Anti Child Pornography Act of 2009, committed through a computer system.

A

Child Pornography

41
Q

The transmission of commercial communication
with the use of computer system which seek to advertise sell, or offer for sale products and
services are prohibited unless

A

Unsolicited Commercial Communications

42
Q

The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal
Code, as amended committed through a computer system or any other similar means which
may be devised in the future.

A

Libel