socpro moto
  • 1. What is the main purpose of the Philippine Data Privacy Act of 2012?
A) To eliminate all data sharing
B) To balance innovation and data protection
C) To control internet usage
  • 2. Which organization enforces RA 10173?
A) National Privacy Commission (NPC)
B) Department of Justice
C) Department of Information Technology
  • 3. What principle means data subjects must know how their data is used?
A) Accountability
B) Proportionality
C) Transparency
  • 4. What principle requires collecting only necessary data?
A) Proportionality
B) Transparency
C) Integrity
  • 5. Which is NOT a right of data subjects?
A) Right to access data
B) Right to erase data
C) Right to sell data
D) Right to object
  • 6. What is a possible penalty for violating the law?
A) Imprisonment and fines
B) Warning only
C) No consequence
  • 7. GDPR applies mainly to which region
A) Europe
B) Asia
C) America
  • 8. Which law includes criminal liability explicitly?
A) RA 10173
B) GDPR
C) Both
  • 9. What is the GDPR’s maximum penalty?
A) 10% of income
B) 4% of global revenue
C) ₱1 million
  • 10. What was a key issue in the PhilHealth ransomware attack?
A) Delayed breach response
B) No data affected
C) Strong security
  • 11. refers to creations of the mind such as inventions, literary and artistic works, designs, symbols, names, and images.
A) Trademark
B) Patent
C) IP
  • 12. Protection for original works of authorship, such as books, music, movies, software, and artworks.
A) Copyright
B) Trademark
C) Patent
  • 13. Protects confidential business information, such as formulas, practices, or processes that give a competitive advantage.
A) Trade Secrets
B) Trademark
C) Patent
  • 14. Protects logos, names, symbols, and other identifiers used in commerce to distinguish goods or services.
A) Trademark
B) Copyright
C) Trade Secrets
  • 15. Exclusive rights granted for inventions or innovations that are novel, non-obvious, and useful.
A) Trade Secrets
B) Patent
C) Patent
  • 16. What does copyright protect?
A) Logos only
B) Original works like books, music, and films
C) Business secrets
  • 17. Which of the following is NOT a type of IP right?
A) Patent
B) Copyright
C) Trademark
D) Salary
  • 18. How long does copyright usually last?
A) 10 years
B) 20 years
C) Life of the author + 70 years
  • 19. Legal protection given to the creators of "original works of authorship.“
A) Patent
B) Trademark
C) Copyright
  • 20. Unintentionally failing to credit a source or incorrectly citing it.
A) Paraphrasing Plagiarism
B) Accidental Plagiarism
C) Direct Plagiarism
  • 21. What is self-plagiarism?
A) Reusing your own work without disclosure
B) Writing new content
C) Copying others’ work
  • 22. For new varieties of plants that are asexual reproduction.
A) Utility Patents
B) Design Patents
C) Plant Patents
  • 23. For new and useful inventions (machines, processes, compositions).
A) Plant Patents
B) Design Patents
C) Utility Patents
  • 24. For new and original ornamental designs.
A) Design Patents
B) Plant Patents
C) Utility Patents
  • 25. What is required for a patent?
A) Expensive materials
B) Government approval only
C) Novelty, non-obviousness, usefulness
  • 26. What is DRM (Digital Rights Management)?
A) A legal case
B) A tool to prevent unauthorized copying
C) A software company
  • 27. The act of using someone else’s work, ideas, or intellectual property without permission or proper attribution.
A) Plagiarism
B) Patent
C) Copyright
  • 28. Copying someone’s work word for word.
A) Accidental Plagiarism
B) Direct Plagiarism
C) Paraphrasing Plagiarism
  • 29. Rewriting someone else’s ideas without proper attribution.
A) Paraphrasing Plagiarism
B) Accidental Plagiarism
C) Self-Plagiarism
  • 30. Always give credit to the original creator when using their work.
A) Citing Sources
B) Owner
C) Copyright
  • 31. What is piracy?
A) Legal sharing
B) Buying software
C) Illegal distribution of digital content
  • 32. Which tool can detect plagiarism?
A) Turnitin
B) Chrome
C) Excel
  • 33. Which company is known for enforcing software IP rights?
A) Netflix
B) Google
C) Microsoft
  • 34. Distributing unlicensed copies of software.
A) Music Piracy
B) Copyright
C) Software Piracy
  • 35. Official registration provides legal protection and the ability to enforce rights.
A) Digital Watermarking and DRM
B) Using Non-Disclosure Agreements (NDAs)
C) Registering Copyrights, Patents, and Trademarks
  • 36. Regularly check for unauthorized use of your work online and take necessary legal steps to enforce your rights.
A) Using Non-Disclosure Agreements (NDAs)
B) Monitor and Enforce Your Rights
C) Digital Watermarking and DRM
  • 37. Use technology to protect digital works from unauthorized copying or distribution.
A) Monitor and Enforce Your Rights
B) Registering Copyrights, Patents, and Trademarks
C) Digital Watermarking and DRM
  • 38. When sharing sensitive business information, use NDAs to protect trade secrets and proprietary ideas.
A) Monitor and Enforce Your Rights
B) Registering Copyrights, Patents, and Trademarks
C) Using Non-Disclosure Agreements (NDAs)
  • 39. Which thought best reflects the importance of intellectual property?
A) “Only large companies benefit from intellectual property protection.”
B) “Intellectual property should be protected, respected, and promoted to support innovation.”
C) “Creative works should be freely used by anyone without giving credit.”
  • 40. What are cyber laws?
A) Laws governing the legal use of technology and the internet
B) Laws about business only
C) Laws about transportation
  • 41. Which of the following is regulated by cyber laws in the Philippines?
A) Farming activities
B) Weather patterns
C) Online behavior
  • 42. Which law focuses on cybercrimes like hacking and online libel?
A) RA 10175
B) RA 9995
C) RA 10173
  • 43. What does the Data Privacy Act of 2012 (RA 10173) protect?
A) Wildlife
B) Buildings
C) Personal information
  • 44. Which law legalizes online contracts and electronic signatures?
A) RA 10175
B) RA 8792
C) RA 10173
  • 45. What does RA 9995 criminalize?
A) Sharing private content without consent
B) Creating websites
C) Protecting papers
  • 46. What is ethical hacking?
A) Hacking for money
B) Illegal hacking
C) Authorized hacking to find system weaknesses
  • 47. What is another term for ethical hackers?
A) White hat
B) Grey hat
C) Black hat
  • 48. Which type of hacker is considered criminal?
A) Black hat
B) Grey hat
C) White hat
  • 49. Which hacker may break laws but without harmful intent?
A) Grey hat
B) Black hat
C) White hat
  • 50. Which skill is important for an ethical hacker?
A) Programming
B) Counting
C) Talking
  • 51. Which tool is commonly used in ethical hacking?
A) Painting
B) Microsoft Word
C) Nmap
  • 52. Which is a digital right in the Philippines?
A) Right to privacy
B) Right to own land
C) Right to travel abroad
  • 53. How many years of imprisonment can cybercrime reach?
A) Up to 12 years
B) 5 years
C) 20 years
  • 54. Which certification is for ethical hackers?
A) NCLEX
B) TOEFL
C) CEH
  • 55. What happened in the Comelec Data Breach (2016)?
A) Data of voters was leaked
B) Voting machines failed
C) Sumayaw si Toni Fowler
  • 56. What does “data minimization” mean?
A) Collect all data
B) Collect only necessary data
C) Share all data
  • 57. What is the “Right to Access”?
A) Use any data
B) Request personal data from organizations
C) Block websites
  • 58. What is the “Right to be Forgotten”?
A) Hide identity
B) Delete personal data
C) Change password
  • 59. Be clear with users about data collection practices and give them control over their data.
A) Data Minimization
B) Data Encryption
C) Transparency
  • 60. Why is privacy important in computing?
A) It protects valuable personal data
B) It reduces electricity use
C) It makes computers faster
  • 61. What can happen if personal data is misused?
A) Better security
B) Identity theft
C) More storage
  • 62. IT and CS professionals are considered:
A) Data hackers
B) Data users
C) Data stewards
  • 63. Which of the following is personal data?
A) School subject
B) Name and address
C) Weather report
  • 64. When was GDPR enacted?
A) 2015
B) 2012
C) 2018
  • 65. A consequentialist theory that suggests actions are right if they promote the greatest happiness for the greatest number of people.
A) Utilitarianism
B) Virtue Ethics
C) Deontology
  • 66. Focuses on the character and virtues of the individual rather than on specific actions or rules.
A) Virtue Ethics
B) Deontology
C) Utilitarianism
  • 67. Argues that actions are morally right if they follow a set of rules, regardless of the consequences.
A) Virtue Ethics
B) Deontology
C) Utilitarianism
  • 68. A non-consequentialist theory founded by
A) Aristotle
B) Immanuel Kant
C) Jeremy Bentham and John Stuart Mill
  • 69. Virtue Ethics was developed by
A) Aristotle
B) Immanuel Kant
C) Jeremy Bentham and John Stuart Mill.
  • 70. Utilitarianism was created by
A) Jeremy Bentham and John Stuart Mill
B) Aristotle
C) Immanuel Kant
  • 71. focuses on outcomes and the greatest good for the greatest number.
A) Deontology
B) Utilitarianism
C) Virtue Ethics
  • 72. emphasizes duty and following moral rules regardless of consequences.
A) Virtue Ethics
B) Utilitarianism
C) Deontology
  • 73. emphasizes character and personal development toward flourishing.
A) Virtue Ethics
B) Deontology
C) Utilitarianism
Created with That Quiz — where a math practice test is always one click away.