Follow and like us on our Facebook page where we post on the new release subject and answering tips and tricks to help save your time so that you can never feel stuck again.
Shortcut

Ctrl + F is the shortcut in your browser or operating system that allows you to find words or questions quickly.

Ctrl + Tab to move to the next tab to the right and Ctrl + Shift + Tab to move to the next tab to the left.

On a phone or tablet, tap the menu icon in the upper-right corner of the window; Select "Find in Page" to search a question.

Share Us

Sharing is Caring

It's the biggest motivation to help us to make the site better by sharing this to your friends or classmates.

Professional Ethics in Information Technology

This course covers the ethical principles and practices in the information technology industry, including social responsibility, privacy, and security.

ethics

code

privacy

cybersecurity

intellectual property

decision-making

drm

net neutrality

piracy

social media

plagiarism

hacking

censorship

accountability

transparency

It is when an action is right if the consequences of that action are favorable to all except the actor

  • Alruism
  • Altruist
  • Altruism
  • Attruism

Which does not belong to the group:

  • Hacker’s Ethics
  • Denial of Service
  • Political Activism
  • Terrorism

Which statement is true about Artificial Intelligence?

  • Both Statements are True
  • Both Statements are False
  • Statement II is True
  • Statement I is True

It is developed over a period of time based on either the religion or culture of the indigenous people in the area.

  • Professional Code
  • Community Code
  • Personal Code
  • Institutional Code

Which among the following has the longest imprisonment charge

  • reclusion perpetua
  • arresto mayor
  • prision mayor
  • prision minor

It takes part in building character traits in people.

  • morality

With the relationship between the provider and receiver of the service/product present, a power play may sometimes be in favor of the provider not the receiver

  • True
  • False

unauthorized ways

  • Cyberpiracy

If intimidation and fear of reprisals is present, __ is good because useful information may be revealed.

  • anonymity

Legal acts conform to what an individual believes to be the right thing to do.

  • True
  • False

All of the statements are true about the first requirement of a Patent Work except:

  • It is industrially applicable
  • It can be related to a product or process
  • It must be new and useful
  • It must serve a basic purpose

Which is true about Morality?

  • It prevents harm and suffering, a moral system aims at promoting human flourishing
  • It does not involve special knowledge that can be understood only by privileged individuals
  • It measures for us to compare something else whose qualities we doubt
  • It shares the behavioral patterns of a group

The alteration of information may be caused by the disclosure of personal information

  • True
  • False

The human errors in coding can be sometimes referred to as __.

  • bugs

These are guidelines that state the dos and dont's of a professional that protects individual members and their image.

  • Professional Code
  • Institutional Code
  • Personal Code
  • Community Code

reckless alteration

  • Data Interference

unauthorized access

  • Cybertrespass

Time and place influence the context of morality.

  • True
  • False

According to this theory actions are judged according on the results. For example, a person kills one person to prevent the deaths of others.

  • Altruism
  • Relativism
  • Deontology
  • Consequentialism

Which of the following does not describe the word ethics?

  • widely shared social conventions about right and wrong
  • theoretical examination of morality and morals
  • the study of right and wrong in human conduct
  • human actions performed consciously and willfully that one can be held responsible

The danger with information matching is that everyone knows who will use the built profiles from the matched information and where it will be used

  • True
  • False

Morality is enforced by the authority that enacted them and security forces

  • True
  • False

creative works

  • Copyright

When two persons have jointly made an invention, the right to the patent shall belong to _______.

  • Both of them
  • The person with the most work
  • The person with the original idea
  • None of them

Penetration can be done with or without the use of the internet

  • True
  • False

Encryption and Authentication

  • Information security

These are set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge

  • rootkit

A set of legal rights which result from intellectual activity in the industrial, scientific, literary, and artistic fields is called __.

  • Intellectual Property

Since morality is culturally based, individuals are bound to live within the guidelines the society lives with.

  • True
  • False

Which of the following is a purpose of a social networking web site?

  • I, II, III
  • II, III
  • All of the Above
  • IV, I

It is a messaging social platform that enables a user to chat with friends by using pictures

  • snapchat

Impartial moral rules are ideally designed to apply equitably to all participants in the system.

  • True
  • False

Maintaining the status quo by preventing the unauthorized modification of files is an example of __.

  • Integrity

Rootkit

  • Exploits

Showing an act of kindness in exchange to an equal act of kindness is an example what culture-free moral codes?

  • the bronze rule

Under what condition can data collections become an invasion of privacy?

  • when information is used for unauthorized purposes
  • when information is used for unauthorized access
  • there is no limit to what one can do
  • sold to the highest bidder

It is the application of data mining techniques to discover patterns from the Web

  • web mining

Which is not a characteristic of an intellectual object:

  • They are the manifestation of ideas
  • It can be given a right to ownership
  • It is easily owned
  • It can be easily reproduced

Instilling fear and doubt and compromising the integrity of the data can lead to

  • extortion

It comes from an enforceable part of the moral code that differs with each society and culture.

  • conventional law

The primary purpose of professional code of ethics is to promote the public image of the profession by specifying and enforcing the ethical behavior expected from its members

  • True
  • False

Which does not belong to the group?

  • Pseudonymous Works
  • General Works
  • Works of Applied Art
  • Joint Authorship Works

It is the harassment, torment, humiliation, or threatening of one minor by another minor or group of minors via the Internet or cell phone

  • Online Predator
  • Uploading of Inappropriate Material
  • Cyberbullying
  • Cyberstalking

It has been linked to depression, self-injurious behaviors, sleep disturbances, increased alcohol and tobacco use, and obesity

  • internet addiction

In Spear-phishing, con artists send legitimate looking e-mails urging the recipient to take action to avoid a negative consequence or to receive a reward.

  • True
  • False

As humans tend to follow a life script, an individual's reaction to certain rules of conduct is always intentional.

  • True
  • False

reckless hindering

  • System Interference

Worms are programs where malicious code is hidden inside a seemingly harmless program

  • True
  • False

An AI can achieve its goal without going through consequences

  • Correct -True
  • False

Rules that guides individual actions such as not taking the possessions of others are called __.

  • Directives

Which is not true about an Insider Threat.

  • The only suspects are employees
  • They have access to the computer system
  • They have knowledge in the computer system
  • They are a major source of computer crimes
  • Question text

One of the contributing factors in the cause of violations is when consumers lack the knowledge of how what they consider a little bit of information can turn into a big invasion of privacy

  • True
  • False

AIs are software programs that are vulnerable to attack just like all software

  • True
  • False

Listening in to other people's conversations is an example of what privacy violation?

  • Interception of Information
  • Information Matching
  • Misuse of Information
  • Intrusion

A patent claim can be cancelled if it adheres to the public order.

  • True
  • False

Believing in human life implies on the belief that life has a purpose and this applies to everyone, whether one believes in a superior deity or an atheist.

  • True
  • False

It is a system created by and for human beings usually in public deliberations like a council of elders or representatives in national legislatures.

  • Constitutional Law
  • Conventional Law
  • Legislative Law
  • Convertional Law

Both the sender and the receiver each have a pair of keys, one public and one private.

  • asymmetric encryption

Individuals found guilty of child pornography violated _____________.

  • Anti-Child Pornography Act of 9775
  • Anti-Child Pornography Code of 2012
  • Anti-Child Pornography Act of 2009
  • Anti-Child Pornography Code of 2009

In order for professions and trades to uphold essential requirements, integrity, commitment, and professional codes of conduct must be met.

  • True
  • False

It is a three dimensional interactive computer generated environment that incorporates a first person perspective

  • Virtual Reality

This penalty will cause an accused to be imprisoned for two to four decades.

  • prision mayor
  • prision minor
  • arresto mayor
  • reclusion perpetua

One of the contributing factors in the cause of violations is when consumers lack the ethics of how what they consider a little bit of information can turn into a big invasion of privacy

  • True
  • False

They use hacking to achieve a political or social goal.

  • Hacker

The owner of a patent has no right to prevent third parties from using the patented product if it has been put on the market by the owner of the product

  • True
  • False

A man who did something to help others but it is against his will is not considered good. This is an example of _________.

  • Emotivism
  • Relativism
  • Deontology
  • Utilitarianism

It is an interpretation is done based on a system that uses a process of argumentation consisting of a mixture of inductions and deductions

  • ethical theories

Professional Codes of Conduct addresses the following except:

  • Confidentiality and Commitment
  • Moral and Legal Standards
  • Sanction Mechanics
  • Compliance and Competence

One is not known by any name including pseudo names.

  • Untraceable Identity

It is hardware or software used to isolate the sensitive portions of an information system facility from the outside world and limit the potential damage that can be done by a malicious intruder

  • Firewalls

Human Nature can result to a bias environment that AIs might learn from.

  • True
  • False

The increasing level of familiarity in human actions, may it be good or bad is called _______.

  • Trust
  • Psychological Effects
  • Moral Decay
  • Loss of privacy

It involves the indirect gathering of personal information through an analysis of implicit patterns discoverable in data.

  • Data Mining
  • Data Bidding
  • Information Matching
  • Web Mining

For formal education to be effective in teaching and enforcing the pillars of professionalism it must be _________

  • Responsible
  • Incremental
  • Committed
  • Direct

It is a Website that contains an online personal journal with reflections, comments, and often hyperlinks provided by the writer

  • Blog

Harassment is a form of discrimination and it mainly involves making decisions that negatively affect an individual.

  • True
  • False

reclusion and isolation

  • Psychological Effects

Humans are not perfect; they are emotional, biased, easily manipulated and easily bored beings. Machines, however, don‘t have any of these problems.

  • Performance
  • Prediction
  • Cheap
  • Safety

It is a type of offense when an individual accesses the whole or part of a computer system without permission or right

  • Illegal Access

This theory states that ethical statements cannot be proven and are really only statements about how someone feels.

  • emotivism

It is an act of seeking public attention to what is considered an illegal or mismanaged act

  • whistle-blowing

It is the data left behind by users of electronic media

  • digital footprint

Dramatizations, translations, and adaptations of musicals are example of __.

  • derivative works

The data that the AI technology is using to train and learn mostly coveres all the aspect of human behavior

  • True
  • False

These individuals test the limitations of information systems out of intellectual curiosity

  • Crackers
  • Industrial Spies
  • Hackers
  • Insiders

A provider of service should first inquire the customer before an action of service should be done. This statement shows _______.

  • Commitment
  • Autonomy
  • Integrity
  • Responsibility

It is a human cognitive process of looking for ways to generate or affirm a proposition

  • Reasoning

AIs have the capacity to perform better than the world best experts at many tasks already and are making the world healthier

  • Cheap
  • Safety
  • Performance
  • Prediction

shapes and colors

  • Trademark

It is when laws are used to resolve interpersonal conflicts in a society.

  • Conflict Resolution
  • Conflict Laws
  • Enforcement Laws
  • Enforcement Codes

Republic Act No. 8293 is also known as the __.

  • Intellectual Property Code of the Philippines

Even with long years of experience, skills based on shallow knowledge of the field could be damaging to the profession

  • True
  • False

A patent must not be obvious to the general public

  • True
  • False

Ethical decision making is the process of making a decision which may result in one or more moral conflicts while ethical reasoning is when ethical principles is integrated in the reasoning process

  • True
  • False

Ethics is defined as a field of inquiry whose subject is human actions and these human actions are called __.

  • human conduct

It includes the integrity, confidentiality, and availability of information at the servers

  • Information security

Which is true about Licensing Authorities.

  • I & III
  • I & II
  • III & II
  • I, II, & III

Which among the following has the shortest imprisonment charge.

  • prision mayor
  • prision minor
  • reclusion perpetua
  • arresto mayor

This is another term for large commercial databases

  • data warehouse

Sensors, Security Lighting and Natural Trees

  • Physical Security Barriers

There are different strands of information to be protected, which does not belong to a group:

  • Employment Information
  • Financial Information
  • Medical Information
  • Personal Information

Individuals whose data are mined cannot be identified with or linked to certain newly created groups.

  • True
  • False

E-mail Fraud

  • Phishing

The danger with information matching is that no one knows who will use the built profiles from the matched information and where it will be used

  • True
  • False

computer programs

  • Original works

They launch computer-based attacks against other computers or networks in an attempt to intimidate or coerce a government in order to advance certain political or social objectives

  • cyberterrorist

It is an unwritten law that holds our rights of self-preservation

  • natural law

If the codes of conduct focuses on rules and guidelines, autonomy focuses on __.

  • whistle-blowing

It is the core of human dignity and autonomy

  • privacy

It enables an individual to capture life's best moments with thier phone’s camera or any other camera, and convert them into works of art.

  • instagram

Coded Messages

  • Cryptography

As morality is a survival script humans follow daily, it became a general trait that is flexible with different backgrounds.

  • True
  • False

Witness Protection

  • Pseudo identity

Shapes cannot be registered as trademarks if the shapes are not necessitated by technical factors

  • True
  • False

Determinative Laws fixes ways of acting in accordance with natural law.

  • True
  • False

It is the acquisition of a domain name on the Internet in bad faith or with the intent to profit, mislead, destroy one’s reputation or deprive others from registering the same domain name.

  • Data Interference
  • Misuse of Devices
  • Cybersquatting
  • System Interference

It is an invasion of privacy by wrongful entry, seizing, or acquiring possession of the property of others

  • intrusion

It can cause harm by failing to uphold standards of accuracy.

  • misrepresentations

It is a right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work.

  • copyright

It is a mediation of interaction through an electronic medium between humans and humans as well as between humans and machines

  • virtualization

Determining customer behavior and preferences.

  • Safety
  • Cheap
  • Performance
  • Prediction

Which is not true about the word profession?

  • It a specific set of skills or a mastery of knowledge in a particular field.
  • It was once related with religious life.
  • In the early times there is little distinction between manual and intellectual groups.
  • Since the beginning, there is an emphasis on intellectual capabilities for membership in a group as it is deemed important

The two kinds of rules of conduct; Directives which involves the macroethical level and Social policies that involves the microethical level.

  • True
  • False

One of the advantages of anonymity is that disputes could be solved if information from individuals’ party to these disputes can reveal the necessary information

  • True
  • False

adaptations

  • Derivative works

inventions

  • Patents

No Identity

  • Anonymity

Preventing of unauthorized disclosure of information

  • Confidentiality

Which of the following does not belong to the group?

  • Musical compositions
  • Collective marks
  • Industrial Design
  • Sermons

AIs are able to automating parts of people‘s jobs and it wont affect the employment rate in a company

  • True
  • False

Secret-key Encryption

  • Symmetric encryption

The moral concept of whistle-blowing is good when the activities involved pose serious danger and harm to human life

  • True
  • False

Digital Signature

  • Authentication

The short text messages in Twitter are called __.

  • tweets

It is threatening behavior or unwanted advances directed at an adult using the Internet or other forms of online and electronic communications

  • Pornography
  • Cyberbullying
  • Online Predator
  • Cyberstalking

The decision-making process is developed that individuals tend to execute automatically without thinking about the steps that go through. The step that involves others in brainstorming is __________.

  • Identify Alternatives
  • Evaluating Alternatives
  • Developing Alternatives
  • Implement Decisions

It is when ethical reasoning remained the same even with the evolution of ethical discipline.

  • Deontology
  • Relativism
  • Utilitarianism
  • Emotivism

As the social network grows, it tends to lose the nuances of a local system. So in order to maintain the qualities of network properties, one must take note of the size.

  • True
  • False

Which of the following is not true about blogs?

  • They function as online diaries
  • Communicate with one another through e-messaging services that include video
  • Blogs can be maintained by either individuals or organizations
  • Blogs are a type of forums

Frauds are sometimes a form of collaboration between an employee and a non-employee

  • True
  • False

Individuals whose data are mined can become identified with or linked to certain newly created groups.

  • True
  • False

Its goal is to create a buzz about a product or idea that spreads wide and fast

  • viral marketing
Comments