socpro moto
  • 1. What is the main purpose of the Philippine Data Privacy Act of 2012?
A) To control internet usage
B) To eliminate all data sharing
C) To balance innovation and data protection
  • 2. Which organization enforces RA 10173?
A) Department of Justice
B) Department of Information Technology
C) National Privacy Commission (NPC)
  • 3. What principle means data subjects must know how their data is used?
A) Proportionality
B) Transparency
C) Accountability
  • 4. What principle requires collecting only necessary data?
A) Integrity
B) Transparency
C) Proportionality
  • 5. Which is NOT a right of data subjects?
A) Right to sell data
B) Right to object
C) Right to access data
D) Right to erase data
  • 6. What is a possible penalty for violating the law?
A) No consequence
B) Warning only
C) Imprisonment and fines
  • 7. GDPR applies mainly to which region
A) America
B) Asia
C) Europe
  • 8. Which law includes criminal liability explicitly?
A) GDPR
B) RA 10173
C) Both
  • 9. What is the GDPR’s maximum penalty?
A) ₱1 million
B) 4% of global revenue
C) 10% of income
  • 10. What was a key issue in the PhilHealth ransomware attack?
A) Strong security
B) No data affected
C) Delayed breach response
  • 11. refers to creations of the mind such as inventions, literary and artistic works, designs, symbols, names, and images.
A) Patent
B) Trademark
C) IP
  • 12. Protection for original works of authorship, such as books, music, movies, software, and artworks.
A) Copyright
B) Patent
C) Trademark
  • 13. Protects confidential business information, such as formulas, practices, or processes that give a competitive advantage.
A) Patent
B) Trade Secrets
C) Trademark
  • 14. Protects logos, names, symbols, and other identifiers used in commerce to distinguish goods or services.
A) Trademark
B) Trade Secrets
C) Copyright
  • 15. Exclusive rights granted for inventions or innovations that are novel, non-obvious, and useful.
A) Patent
B) Trade Secrets
C) Patent
  • 16. What does copyright protect?
A) Logos only
B) Original works like books, music, and films
C) Business secrets
  • 17. Which of the following is NOT a type of IP right?
A) Salary
B) Patent
C) Trademark
D) Copyright
  • 18. How long does copyright usually last?
A) 10 years
B) Life of the author + 70 years
C) 20 years
  • 19. Legal protection given to the creators of "original works of authorship.“
A) Copyright
B) Trademark
C) Patent
  • 20. Unintentionally failing to credit a source or incorrectly citing it.
A) Paraphrasing Plagiarism
B) Direct Plagiarism
C) Accidental Plagiarism
  • 21. What is self-plagiarism?
A) Writing new content
B) Copying others’ work
C) Reusing your own work without disclosure
  • 22. For new varieties of plants that are asexual reproduction.
A) Design Patents
B) Utility Patents
C) Plant Patents
  • 23. For new and useful inventions (machines, processes, compositions).
A) Design Patents
B) Plant Patents
C) Utility Patents
  • 24. For new and original ornamental designs.
A) Design Patents
B) Plant Patents
C) Utility Patents
  • 25. What is required for a patent?
A) Government approval only
B) Expensive materials
C) Novelty, non-obviousness, usefulness
  • 26. What is DRM (Digital Rights Management)?
A) A software company
B) A tool to prevent unauthorized copying
C) A legal case
  • 27. The act of using someone else’s work, ideas, or intellectual property without permission or proper attribution.
A) Patent
B) Plagiarism
C) Copyright
  • 28. Copying someone’s work word for word.
A) Direct Plagiarism
B) Accidental Plagiarism
C) Paraphrasing Plagiarism
  • 29. Rewriting someone else’s ideas without proper attribution.
A) Self-Plagiarism
B) Accidental Plagiarism
C) Paraphrasing Plagiarism
  • 30. Always give credit to the original creator when using their work.
A) Copyright
B) Owner
C) Citing Sources
  • 31. What is piracy?
A) Buying software
B) Legal sharing
C) Illegal distribution of digital content
  • 32. Which tool can detect plagiarism?
A) Chrome
B) Excel
C) Turnitin
  • 33. Which company is known for enforcing software IP rights?
A) Google
B) Microsoft
C) Netflix
  • 34. Distributing unlicensed copies of software.
A) Copyright
B) Software Piracy
C) Music Piracy
  • 35. Official registration provides legal protection and the ability to enforce rights.
A) Digital Watermarking and DRM
B) Registering Copyrights, Patents, and Trademarks
C) Using Non-Disclosure Agreements (NDAs)
  • 36. Regularly check for unauthorized use of your work online and take necessary legal steps to enforce your rights.
A) Digital Watermarking and DRM
B) Using Non-Disclosure Agreements (NDAs)
C) Monitor and Enforce Your Rights
  • 37. Use technology to protect digital works from unauthorized copying or distribution.
A) Monitor and Enforce Your Rights
B) Registering Copyrights, Patents, and Trademarks
C) Digital Watermarking and DRM
  • 38. When sharing sensitive business information, use NDAs to protect trade secrets and proprietary ideas.
A) Monitor and Enforce Your Rights
B) Using Non-Disclosure Agreements (NDAs)
C) Registering Copyrights, Patents, and Trademarks
  • 39. Which thought best reflects the importance of intellectual property?
A) “Only large companies benefit from intellectual property protection.”
B) “Intellectual property should be protected, respected, and promoted to support innovation.”
C) “Creative works should be freely used by anyone without giving credit.”
  • 40. What are cyber laws?
A) Laws about business only
B) Laws governing the legal use of technology and the internet
C) Laws about transportation
  • 41. Which of the following is regulated by cyber laws in the Philippines?
A) Farming activities
B) Online behavior
C) Weather patterns
  • 42. Which law focuses on cybercrimes like hacking and online libel?
A) RA 10175
B) RA 10173
C) RA 9995
  • 43. What does the Data Privacy Act of 2012 (RA 10173) protect?
A) Wildlife
B) Buildings
C) Personal information
  • 44. Which law legalizes online contracts and electronic signatures?
A) RA 8792
B) RA 10173
C) RA 10175
  • 45. What does RA 9995 criminalize?
A) Creating websites
B) Sharing private content without consent
C) Protecting papers
  • 46. What is ethical hacking?
A) Authorized hacking to find system weaknesses
B) Hacking for money
C) Illegal hacking
  • 47. What is another term for ethical hackers?
A) Grey hat
B) White hat
C) Black hat
  • 48. Which type of hacker is considered criminal?
A) Black hat
B) White hat
C) Grey hat
  • 49. Which hacker may break laws but without harmful intent?
A) White hat
B) Grey hat
C) Black hat
  • 50. Which skill is important for an ethical hacker?
A) Programming
B) Counting
C) Talking
  • 51. Which tool is commonly used in ethical hacking?
A) Nmap
B) Painting
C) Microsoft Word
  • 52. Which is a digital right in the Philippines?
A) Right to own land
B) Right to travel abroad
C) Right to privacy
  • 53. How many years of imprisonment can cybercrime reach?
A) 20 years
B) 5 years
C) Up to 12 years
  • 54. Which certification is for ethical hackers?
A) TOEFL
B) CEH
C) NCLEX
  • 55. What happened in the Comelec Data Breach (2016)?
A) Sumayaw si Toni Fowler
B) Voting machines failed
C) Data of voters was leaked
  • 56. What does “data minimization” mean?
A) Share all data
B) Collect only necessary data
C) Collect all data
  • 57. What is the “Right to Access”?
A) Block websites
B) Request personal data from organizations
C) Use any data
  • 58. What is the “Right to be Forgotten”?
A) Change password
B) Hide identity
C) Delete personal data
  • 59. Be clear with users about data collection practices and give them control over their data.
A) Data Encryption
B) Transparency
C) Data Minimization
  • 60. Why is privacy important in computing?
A) It reduces electricity use
B) It protects valuable personal data
C) It makes computers faster
  • 61. What can happen if personal data is misused?
A) More storage
B) Identity theft
C) Better security
  • 62. IT and CS professionals are considered:
A) Data hackers
B) Data users
C) Data stewards
  • 63. Which of the following is personal data?
A) Weather report
B) School subject
C) Name and address
  • 64. When was GDPR enacted?
A) 2012
B) 2015
C) 2018
  • 65. A consequentialist theory that suggests actions are right if they promote the greatest happiness for the greatest number of people.
A) Utilitarianism
B) Deontology
C) Virtue Ethics
  • 66. Focuses on the character and virtues of the individual rather than on specific actions or rules.
A) Deontology
B) Virtue Ethics
C) Utilitarianism
  • 67. Argues that actions are morally right if they follow a set of rules, regardless of the consequences.
A) Deontology
B) Utilitarianism
C) Virtue Ethics
  • 68. A non-consequentialist theory founded by
A) Jeremy Bentham and John Stuart Mill
B) Aristotle
C) Immanuel Kant
  • 69. Virtue Ethics was developed by
A) Immanuel Kant
B) Aristotle
C) Jeremy Bentham and John Stuart Mill.
  • 70. Utilitarianism was created by
A) Jeremy Bentham and John Stuart Mill
B) Aristotle
C) Immanuel Kant
  • 71. focuses on outcomes and the greatest good for the greatest number.
A) Utilitarianism
B) Virtue Ethics
C) Deontology
  • 72. emphasizes duty and following moral rules regardless of consequences.
A) Virtue Ethics
B) Deontology
C) Utilitarianism
  • 73. emphasizes character and personal development toward flourishing.
A) Deontology
B) Virtue Ethics
C) Utilitarianism
Created with That Quiz — where a math practice test is always one click away.