GEEMIDTERM REVIEW Flashcards

1
Q

What is one of the major advantages of social media in communication?
A) It ensures face-to-face interaction
B) It enables instantaneous communication across vast distances
C) It eliminates the spread of misinformation
D) It prevents distractions in conversations

A

B) It enables instantaneous communication across vast distances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How has social media affected the quality of communication?
A) It has improved face-to-face communication
B) It has reduced distractions and notifications
C) It often leads to superficial interactions
D) It eliminates the risk of incivility

A

C) It often leads to superficial interactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How has social media affected the quality of communication?
A) It has improved face-to-face communication
B) It has reduced distractions and notifications
C) It often leads to superficial interactions
D) It eliminates the risk of incivility

A

It often leads to superficial interactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is a positive effect of social media in schools?
A) It helps students and teachers collaborate effectively
B) It prevents distractions in the classroom
C) It guarantees students will stay focused
D) It replaces the need for traditional learning methods

A

It helps students and teachers collaborate effectively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is one of the negative effects of social media in schools?
A) It prevents students from accessing educational resources
B) It serves as a major distraction, reducing productivity
C) It eliminates the need for physical classrooms
D) It discourages online communication among students

A

It serves as a major distraction, reducing productivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How has social media impacted businesses?
A) It has made it more difficult for businesses to engage with customers
B) It has become essential for marketing and networking
C) It prevents companies from building an online reputation
D) It discourages businesses from using online platforms

A

It has become essential for marketing and networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which platform is commonly used for professional networking?
A) Instagram
B) LinkedIn
C) TikTok
D) Snapchat

A

LinkedIn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is maintaining an online presence challenging for businesses?
A) Negative feedback can spread quickly
B) Customers rarely engage with online content
C) Businesses cannot advertise online
D) It eliminates the need for customer service

A

Negative feedback can spread quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an example of an online collaboration tool?
A) Facebook
B) Microsoft Teams
C) TikTok
D) Instagram

A

Microsoft Teams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do online collaboration tools improve productivity?
A) By making communication and project management more efficient
B) By increasing the number of face-to-face meetings
C) By making tasks more complicated to track
D) By eliminating the need for deadlines

A

By making communication and project management more efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is a feature of online collaboration tools?
A) File sharing and task assignment
B) Eliminating the need for internet access
C) Preventing teams from working remotely
D) Reducing the need for online discussions

A

File sharing and task assignment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is one challenge of social media that users must navigate?
A) Lack of accessibility
B) Information overload and privacy concerns
C) Limited availability of communication tools
D) Restriction of personal expression

A

Information overload and privacy concerns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How has Google Docs changed collaboration?
A) By preventing online document editing
B) By allowing real-time collaboration and editing
C) By limiting the number of users who can edit a document
D) By making group projects more difficult

A

By allowing real-time collaboration and editing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the main challenge of using online collaboration tools?
A) They cannot be accessed remotely
B) They require careful management to maximize benefits
C) They discourage teamwork
D) They prevent the completion of projects on time

A

They require careful management to maximize benefits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the overall impact of social media and online collaboration tools?
A) They have fundamentally transformed communication, relationships, education, and business
B) They have only improved social interaction but not productivity
C) They have had only negative effects on society
D) They have completely replaced traditional communication methods

A

They have fundamentally transformed communication, relationships, education, and business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is one major benefit of using social media in education?
A) It eliminates the need for traditional classrooms
B) It extends learning opportunities beyond the classroom
C) It reduces the importance of textbooks
D) It prevents students from being distracted

A

It extends learning opportunities beyond the classroom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How can social media help in extending learning opportunities?
A) By replacing in-person learning with only online learning
B) By providing platforms for remote classes, discussions, and sharing announcements
C) By making students spend more time on entertainment apps
D) By reducing the use of learning management systems

A

By providing platforms for remote classes, discussions, and sharing announcements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How does social media help create connections between students and alumni?
A) By allowing universities to track students’ social media usage
B) By providing a way to communicate and network across different groups
C) By ensuring students only interact with their classmates
D) By limiting social media use among students

A

By providing a way to communicate and network across different groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

According to studies, how can social media contribute to student enrollment?
A) It prevents students from transferring to other schools
B) It encourages students to focus only on social media instead of studying
C) It attracts prospective students by showcasing campus life and opportunities
D) It has no impact on student enrollment

A

It attracts prospective students by showcasing campus life and opportunities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What role does social media play in university branding?
A) It helps universities improve their reputation and attract more students
B) It replaces traditional marketing methods like posters and brochures
C) It is used to rank universities in global lists
D) It only serves as a platform for alumni networking

A

It helps universities improve their reputation and attract more students

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is one way teachers can use Facebook in the classroom?
A) By friending students and sending private messages
B) By creating Facebook Groups for course updates and discussions
C) By requiring students to post their personal information
D) By blocking students from using other social media

A

By creating Facebook Groups for course updates and discussions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Why is it important to maintain professional boundaries when using social media for education?
A) To ensure that students cannot interact with teachers
B) To prevent personal and professional interactions from mixing
C) To discourage students from using social media
D) To make sure students only use email for communication

A

To prevent personal and professional interactions from mixing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How can live streaming be useful in education?
A) It allows teachers to record and share lectures for students who missed class
B) It makes students dependent on video content instead of reading
C) It forces students to attend lectures in real-time only
D) It replaces the need for assignments and exams

A

It allows teachers to record and share lectures for students who missed class

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How can X (formerly Twitter) be used for educational purposes?
A) To post class updates, reminders, and learning resources
B) To require students to follow celebrities for research
C) To discourage students from using long-form content
D) To eliminate the need for textbooks

A

To post class updates, reminders, and learning resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is an educational benefit of blogs in the classroom? A) They help students improve their writing and critical thinking skills B) They replace the need for exams C) They allow students to post anything they want without supervision D) They encourage students to copy content from other sources
They help students improve their writing and critical thinking skills
26
Why is Instagram a useful platform for digital storytelling in education? A) It allows students to present visual content creatively B) It forces students to take more selfies for school projects C) It eliminates the need for essays and reports D) It reduces student engagement in learning
It allows students to present visual content creatively
27
How can Pinterest be used in an educational setting? A) To organize resources, lesson plans, and student research B) To replace textbooks with digital pins C) To encourage students to play games instead of studying D) To limit students' access to online resources
To organize resources, lesson plans, and student research
28
How does LinkedIn support students in their post-graduation journey? A) By helping students build professional connections and career opportunities B) By making students focus only on job searching instead of studying C) By requiring students to use it daily D) By replacing university career services
By helping students build professional connections and career opportunities
29
What is a benefit of using TikTok in education marketing? A) It helps create engaging, user-generated content to attract students B) It eliminates the need for university websites C) It requires universities to make viral dance videos D) It only benefits entertainment-related courses
It helps create engaging, user-generated content to attract students
30
Why should universities include social media links on their websites? A) To make it easier for students and parents to find official social media pages B) To force students to follow their social media accounts C) To track students’ social media activity D) To reduce the use of traditional school emails
To make it easier for students and parents to find official social media pages
31
How can universities use social media to showcase student life? A) By posting photos and videos of campus events and extracurricular activities B) By sharing only academic materials C) By discouraging students from posting about their experiences D) By making students sign agreements not to use social media
By posting photos and videos of campus events and extracurricular activities
32
What is the purpose of creating alumni community groups on social media? A) To allow alumni to stay connected with the university and network with current students B) To limit alumni engagement after graduation C) To prevent students from communicating with alumni D) To replace alumni events with online interactions
To allow alumni to stay connected with the university and network with current students
33
Why is it important for universities to have a social media crisis strategy? A) To ensure that institutions can quickly communicate with students during emergencies B) To prevent students from discussing crises on social media C) To replace the need for emergency hotlines D) To use social media only for positive news
To ensure that institutions can quickly communicate with students during emergencies
34
How can chatbots be used in higher education social media management? A) To provide immediate responses to common student inquiries B) To replace human advisors entirely C) To discourage students from asking questions D) To create unnecessary notifications for students
To provide immediate responses to common student inquiries
35
Why is it important to analyze social media content performance in education? A) To understand what type of content engages students the most B) To remove low-performing content from the internet C) To prevent universities from making new posts D) To ensure that all content is liked by every student
To understand what type of content engages students the most
36
What is a key challenge universities face when managing multiple social media accounts? A) Decentralization of different accounts and content B) Students ignoring social media completely C) Professors refusing to use technology D) Lack of internet access on university campuses
Decentralization of different accounts and content
37
Who is known as the “Father of Modern Chemistry”? A. John Dalton B. Robert Boyle C. Dmitri Mendeleev D. Antoine Lavoisier
Antoine Lavoisier
38
What is the smallest unit of an element? A. Molecule B. Atom C. Electron D. Ion
Atom
39
Which of the following is a compound? A. Oxygen (O₂) B. Hydrogen (H₂) C. Water (H₂O) D. Nitrogen (N₂)
Water (H₂O)
40
Which of the following describes a chemical property? A. Color B. Density C. Flammability D. Mass
Flammability
41
What do we call a combination of two or more substances that are not chemically combined? A. Element B. Compound C. Mixture D. Solution
Mixture
42
Which state of matter has a definite shape and volume? A. Liquid B. Gas C. Plasma D. Solid
Solid
43
Which of the following changes is a chemical change? A. Melting ice B. Boiling water C. Cutting paper D. Burning wood
Burning wood
44
What is the charge of a proton? A. Negative B. Neutral C. Zero D. Positive
Positive
45
What is the center of an atom called? A. Electron cloud B. Proton C. Nucleus D. Shell
Nucleus
46
Which particle has no charge? A. Proton B. Electron C. Neutron D. Ion
Neutron
47
Who proposed the planetary model of the atom? A. Dalton B. Bohr C. Thomson D. Rutherford
Bohr
48
Which element has the atomic number 1? A. Helium B. Lithium C. Hydrogen D. Carbon
Hydrogen
49
How many electrons can the first energy level hold? A. 8 B. 18 C. 10 D. 2
2
50
What do you call the vertical columns in the periodic table? A. Rows B. Periods C. Groups D. Blocks
Groups
51
Which subatomic particle is responsible for bonding? A. Proton B. Electron C. Neutron D. Nucleus
Electron
52
What is a major reason why cybersecurity is increasingly important today? A. Increase in hardware prices B. Decline of traditional banking C. Rise of connected devices and online platforms D. Decrease in government funding
Rise of connected devices and online platforms
53
What is a primary challenge in cybersecurity? A. Too many software updates B. Evolving cyber threats C. Declining number of users D. Hardware limitations
Evolving cyber threats
54
What is an example of an external cyber threat? A. Employee negligence B. Insider sabotage C. Ransomware attack D. Weak office policies
Ransomware attack
55
What can be a consequence of a data breach at a financial institution? A. Decreased internet speed B. Loss of personal devices C. Identity theft and financial loss D. Better customer service
Identity theft and financial loss
56
What is an example of a critical infrastructure that can be targeted by cyberattacks? A. Shopping malls B. Sports stadiums C. Power grids D. Movie theaters
Power grids
57
What is an insider threat? A. Attack from a foreign country B. System crash due to software bugs C. Breach caused by a trusted individual within an organization D. Spyware from untrusted sources
Breach caused by a trusted individual within an organization
58
Why are insider threats difficult to detect? A. They don’t leave logs B. They use advanced AI C. They often have legitimate access D. They are usually hackers from outside
They often have legitimate access
59
Which of the following is a concern related to data collection by companies? A. Faster data transfer B. Increased server space C. Unauthorized surveillance and misuse of data D. Better internet speed
Unauthorized surveillance and misuse of data
60
Which law is designed to protect personal data in the European Union? A. CCPA B. HIPAA C. FOIA D. GDPR
GDPR
61
What is the purpose of the California Consumer Privacy Act (CCPA)? A. Reduce internet costs B. Encourage software sales C. Protect consumer data D. Track email traffic
Protect consumer data
62
What is one way organizations improve cybersecurity? A. Selling customer data B. Ignoring phishing emails C. Conducting regular cybersecurity audits D. Disabling antivirus software
Conducting regular cybersecurity audits
63
What is the goal of a phishing attack? A. Boost system speed B. Gain sensitive information C. Update applications D. Promote new websites
Gain sensitive information
64
How is spear phishing different from phishing? A. It only targets schools B. It focuses on specific groups C. It uses social media D. It involves software bugs
It focuses on specific groups
65
What is SQL injection? A. Uploading viruses into networks B. Overloading server bandwidth C. Inserting malicious code into SQL queries D. Running out-of-date firewalls
Inserting malicious code into SQL queries
66
What does a DoS (Denial-of-Service) attack do? A. Steals customer data B. Slows down computers with viruses C. Prevents legitimate users from accessing a service D. Encrypts files for ransom
Prevents legitimate users from accessing a service
67
How is a DDoS attack different from a DoS attack? A. It involves hackers in person B. It uses multiple devices in a botnet C. It steals data only from banks D. It happens only during holidays
It uses multiple devices in a botnet
68
What cybercrime increased the most in the Philippines from 2013 to 2019? A. ATM fraud B. Online libel C. System hacking D. Online threats
Online libel
69
Which type of cybercrime had zero reported incidents in 2013 but rose to 133 by 2019? A. Online scam B. Illegal access C. Unjust vexation D. Robbery with intimidation
Illegal access
70
What is the first step to take when surfing the internet safely? A. Open all unknown links B. Disable firewalls C. Use strong passwords and avoid suspicious links D. Share private data with friends
Use strong passwords and avoid suspicious links
71
What is a potential danger of using open wireless networks in public places like coffee shops? A. Slow internet speed B. Inability to send emails C. Vulnerability to hacking and account compromise D. High data charges
Vulnerability to hacking and account compromise
72
Which of the following is not a result of malicious software? A. Improved system performance B. Stolen personal information C. Destroyed files D. Launched attacks on financial systems
Improved system performance
73
What did the word “hacker” originally mean? A. Criminal trying to access confidential data B. Person writing viruses C. Explorer or risk-taker demonstrating technical skills D. Teenager using the internet
Explorer or risk-taker demonstrating technical skills
74
What was the contribution of MIT’s Tech Model Railroad Club to the concept of hacking? A. They developed the first virus B. They created the first computer worm C. They built a complex electronic switching system for trains D. They developed early antivirus software
They built a complex electronic switching system for trains
75
How did the movie WarGames influence public perception of hackers? A. It made hacking illegal B. It led to fewer computer users C. It inspired teenagers to explore cyberspace D. It stopped government surveillance
It inspired teenagers to explore cyberspace
76
Which of the following is not a common low-tech hacking technique? A. Social engineering B. Dumpster diving C. Eavesdropping D. Firewall tunneling
Firewall tunneling
77
What law penalizes hacking in the Philippines? A. Cybercrime Prevention Act B. Republic Act No. 8792 C. RA No. 10175 D. Data Privacy Act
Republic Act No. 8792
78
What is the penalty for hacking under Republic Act No. 8792? A. Community service B. Death penalty C. Fine and/or imprisonment D. License revocation
Fine and/or imprisonment
79
What does the term “malware” stand for? A. Major ware B. Malfunctioning hardware C. Malicious software D. Multi-layered architecture
Malicious software
80
Which of the following is not a type of malware? A. Trojan horse B. Virus C. Adware D. Firewall
Firewall
81
How does an email virus typically spread? A. By posting on social media B. Through Bluetooth C. Through infected email attachments D. Via cloud backups
Through infected email attachments
82
What is the primary way a worm spreads? A. Infected USB drives B. Email attachments C. Exploiting security holes in networks D. Physical installation
Exploiting security holes in networks
83
Which worm shut down computers shortly after booting in 2004? A. Conficker B. Hello C. Palevo D. Sasser
Sasser
84
What made the Conficker worm difficult to stop? A. It targeted Apple devices B. It deleted all files immediately C. It used multiple propagation methods and had advanced protections D. It was invisible to antivirus software
It used multiple propagation methods and had advanced protections
85
What is the goal of a cross-site scripting attack (XSS)? A. Infect mobile apps B. Take screenshots of users C. Inject malicious scripts into websites to be run by users’ browsers D. Crash web servers
Inject malicious scripts into websites to be run by users’ browsers
86
What does a drive-by download do? A. Downloads video games B. Installs updates C. Installs malware without user action D. Prompts for antivirus installation
Installs malware without user action
87
A Trojan horse is malware that: A. Replicates by itself B. Pretends to be useful while performing malicious tasks C. Exploits browser vulnerabilities D. Is downloaded only through emails
Pretends to be useful while performing malicious tasks
88
What is the origin of the term “Trojan horse” in computer security? A. A myth from Ancient Rome B. A UNIX system exploit C. The story of the wooden horse in Ancient Greece D. A character in a 1980s movie
The story of the wooden horse in Ancient Greece
89
Which malware is known to steal game passwords from digital picture frames? A. Conficker B. Palevo C. Mocmex D. Kelvir
Mocmex
90
What is a rootkit designed to do? A. Spread via text messages B. Give attackers privileged access to computers C. Encrypt user files D. Create new operating systems
Give attackers privileged access to computers
91
Spyware is typically used to: A. Speed up computers B. Protect banking info C. Monitor user activity without consent D. Display ads only
Monitor user activity without consent
92
Adware is a type of: A. Virus B. Worm C. Firewall D. Spyware
Spyware
93
What is a botnet? A. Antivirus update service B. Secure network of government systems C. Network of infected computers controlled remotely D. Data encryption program
Network of infected computers controlled remotely
94
What is a bot herder? A. Antivirus developer B. Hacker who controls a botnet C. Computer science teacher D. Network administrator
Hacker who controls a botnet
95
What does "netiquette" stand for? a. Network ticketing b. Net equity c. Internet etiquette d. Ethical internet laws
Internet etiquette
96
Which of the following is not a part of netiquette? a. Using proper language b. Respecting others' privacy c. Spreading rumors online d. Refraining from offensive remarks
Spreading rumors online
97
What is the main focus of computer ethics? a. Moral principles in technology use b. Hardware troubleshooting c. Software licensing deals d. Social media trends
Moral principles in technology use
98
Which commandment is violated by creating and spreading a virus? a. Thou shalt not interfere with other people’s computer work b. Thou shalt not bear false witness c. Thou shalt not snoop in other people's files d. Thou shalt think about the social consequences
Thou shalt not interfere with other people’s computer work
99
Reading someone’s email without permission is a violation of which commandment? a. Thou shalt not steal b. Thou shalt not snoop around in other people’s files c. Thou shalt not use others’ intellectual output d. Thou shalt bear true witness
Thou shalt not snoop around in other people’s files
100
Using pirated software breaks which commandment? a. Thou shalt not steal b. Thou shalt not bear false witness c. Thou shalt not use or copy software for which you have not paid d. Thou shalt think about the consequences
Thou shalt not use or copy software for which you have not paid
101
What is one consequence of poor internet security? a. Faster browsing b. Data breaches c. Easier password creation d. Safer communication
Data breaches
102
Internet security involves all the following except: a. Network protection b. Social media growth c. Browser safety d. Preventing fraud
Social media growth
103
What is the goal of internet security? a. To increase website visitors b. To prevent web-based attacks c. To speed up your computer d. To lower costs of hardware
To prevent web-based attacks
104
Spreading false information online is a violation of which computer ethic commandment? a. Thou shalt not use a computer to bear false witness b. Thou shalt not steal c. Thou shalt not interfere with other people’s work d. Thou shalt not appropriate other people’s output
Thou shalt not use a computer to bear false witness
105
What is information privacy? a. Sharing personal information on social media b. Controlling access and use of personal data c. Posting only public data d. Selling data securely
Controlling access and use of personal data
106
Which law in the Philippines governs data privacy? a. Republic Act 10173 b. Republic Act 9208 c. Cybercrime Prevention Act d. National Privacy Act
Republic Act 10173
107
A person whose personal data is processed is known as: a. Data Operator b. Data Subject c. PIC d. PIP
Data Subject
108
What is NOT an example of Personal Identifiable Information (PII)? a. Email address b. Mother’s maiden name c. Favorite color d. Phone number
Favorite color
109
What makes personal information “sensitive”? a. It includes health, race, political beliefs b. It is found in public records c. It is used for advertisement d. It is always encrypted
It includes health, race, political beliefs
110
The individual or entity that controls personal information is called: a. Personal Information Controller (PIC) b. Personal Information Processor (PIP) c. Data Encryptor d. Network Handler
Personal Information Controller (PIC)
111
Which of the following is true about user consent? a. It is optional under RA 10173 b. It must be freely given, specific, and informed c. It cannot be withdrawn d. It can be assumed
It must be freely given, specific, and informed
112
What is data minimization? a. Collecting only data necessary for a specific purpose b. Encrypting all data c. Deleting data after one use d. Maximizing data storage
Collecting only data necessary for a specific purpose
113
The law protects both offline and online identities. Which of the following is an offline identity? a. ID card b. Email address c. Username d. Social media profile
ID card
114
Why is respecting data privacy important? a. To increase followers b. To prevent identity theft and legal issues c. To reduce app usage d. To make data public
To prevent identity theft and legal issues
115
Under RA 10173, your personal data is treated like: a. Public property b. Personal property c. Government asset d. Intellectual property
Personal property
116
What is the right that allows you to know if your personal data is being collected or processed? a. Right to be Informed b. Right to Rectify c. Right to Object d. Right to Compensation
Right to be Informed
117
How is consent usually obtained by Personal Information Controllers (PICs)? a. By assuming it b. Through a consent form c. By requesting verbally d. Through public notice
Through a consent form
118
If your personal data has been compromised, the PIC must: a. Hide the incident b. Notify you in a timely manner c. Report it only to the media d. Ignore unless requested
Notify you in a timely manner
119
The most basic right under RA 10173 is: a. The Right to be Informed b. The Right to Access c. The Right to File a Complaint d. The Right to Damages
The Right to be Informed
120
What does the Right to Access allow you to do? a. See and obtain a copy of the personal data an organization holds about you b. Sell your personal data c. Track other people's data d. Modify system settings
See and obtain a copy of the personal data an organization holds about you
121
Under the Right to Access, which of the following may you request? a. The sources of your data and how it was processed b. Other people's private information c. Internet history logs d. Office procedures
The sources of your data and how it was processed
122
How should an organization provide your personal data when requested? a. In raw format b. In an easy-to-access format with a plain-language explanation c. Through encrypted files only d. Through verbal disclosure only
In an easy-to-access format with a plain-language explanation
123
You may request the identity and address of the: a. Personal Information Controller (PIC) b. Website administrator c. Marketing officer d. Data broker
Personal Information Controller (PIC)
124
Which of the following is not part of the Right to Access? a. Contents of your data b. Source of the data c. List of website visits d. Manner of processing
List of website visits
125
What is the Right to Rectify? a. Correct inaccurate or false data b. Remove cookies from a website c. Deactivate your account d. Revoke others' data
Correct inaccurate or false data
126
The Right to Rectify must be acted upon unless: a. The request is vexatious or unreasonable b. The request comes from minors c. The data is online d. The form is missing
The request is vexatious or unreasonable
127
If you request it, the PIC must inform third parties of: a. Any corrections to your personal data b. Your password c. Your IP address d. Your birth certificate
Any corrections to your personal data
128
What does the Right to Damages allow you to do? a. Claim compensation for harm caused by misuse of your data b. Demand free internet c. Request tax refunds d. Delete someone else's data
Claim compensation for harm caused by misuse of your data
129
Which of the following qualifies for a damages claim? a. Inaccurate or unlawfully obtained data used against you b. Loss of Wi-Fi c. Forgotten password d. Account deactivation
Inaccurate or unlawfully obtained data used against you
130
Where can you file a complaint if your data privacy rights are violated? a. National Privacy Commission (NPC) b. Supreme Court c. Department of Trade d. National Bureau of Investigation
National Privacy Commission (NPC)
131
You can file a complaint if your data has been: a. Misused, maliciously disclosed, or improperly disposed b. Deleted from your account c. Blocked on social media d. Used for advertisements
Misused, maliciously disclosed, or improperly disposed
132
What does the Right to Be Informed empower you to do? a. Take action to protect your data and assert other rights b. Collect other people’s data c. Block government access d. Sell your personal information
Take action to protect your data and assert other rights