A) Maximize happiness and minimize suffering B) Follow moral duties regardless of consequences C) Act according to personal virtue D) Follow religious principles strictly
A) Conduct the test but only on prisoners B) Approve the testing, because saving millions outweighs harming 100 people C) Reject the testing because it violates informed consent D) Delay the test until everyone consents, even if it means more deaths
A) A soldier follows orders regardless of personal beliefs B) A student refuses to cheat because honesty is a virtue C) A judge follows the law even if it leads to an unfair result D) A doctor saves five patients by using the organs of one healthy person
A) Aristotle B) Immanuel Kant C) David Hume D) John Stuart Mill
A) By maximizing their own personal benefit B) Based on what brings the most pleasure C) According to universal moral laws that apply to everyone D) By following whatever society deems acceptable
A) Deontology B) Moral Relativism C) Utilitarianism D) Virtue Ethics
A) Keep the money because no one will know B) Keep it, but try to pay it forward later C) Donate the money to charity instead D) Return it because honesty is a moral duty
A) Moral Relativism B) Virtue Ethics C) Deontology D) Utilitarianism
A) Lie to protect the friendship B) Lie now, but encourage your friend to confess later C) Refuse, because honesty and loyalty should be upheld D) Tell the partner directly to stop the deception
A) Virtue Ethics B) Deontology C) Moral Relativism D) Utilitarianism
A) Mill B) Locke C) Kant D) Aristotle
A) Maximizing pleasure B) Eudaimonia (flourishing and well-being) C) Power D) Following strict moral laws
A) John Stuart Mill B) Aristotle C) Immanuel Kant D) Thomas Hobbes
A) Refuse, because following the law is a moral duty B) Consider the patient's wishes and weigh the emotional impact C) Let the family decide D) Assist the patient to relieve suffering
A) A person practices honesty because it is part of being a good person B) A scientist falsifies data to get ahead in their career C) A politician lies because it will make people happier D) A soldier obeys orders even when they seem unethical
A) A company lies to increase profits but later donates to charity B) Someone helps others only if it benefits them personally C) A person tells the truth, even when it has negative consequences D) A doctor saves five patients by sacrificing one healthy patient
A) The government through regulations B) The users who adopt the technology C) The developers who create the technology D) All of the above
A) Preventing competition in the market B) Ensuring fairness and preventing harm C) Making technology as profitable as possible D) Slowing down technological progress
A) The AI itself B) The users who operate it C) No one, since AI decisions are unpredictable D) The company that designed it
A) Yes, because efficiency benefits the economy B) AI should never replace humans C) Only if there are programs to retrain displaced workers D) No, because it puts people out of jobs
A) Only if they are forced to by the government B) No, because it limits free speech C) No, because users should fact-check themselves D) Yes, to prevent the spread of misinformation
A) No, because companies should secure their systems without outside help B) Only if the hacker is government-approved C) No, because hacking is always illegal D) Yes, to find vulnerabilities before criminals do
A) It helps identify criminals more efficiently B) It can invade privacy and lead to government surveillance C) It is useful for security and should be widely adopted D) There are no ethical issues with facial recognition
A) None, as data collection is always unethical B) Everything, since data is valuable for business growth C) Only what is necessary for their services D) As much as they want if users consent
A) No, because it violates privacy rights B) Yes, if it helps national security C) Yes, as long as the data is used responsibly D) Only if citizens are informed and give consent
A) Yes, if they are more accurate than humans B) Only if the AI has been extensively tested and proven reliable C) No, because ethical responsibility should remain with humans D) It depends on the situation
A) AI can reinforce existing societal inequalities B) AI bias can be eliminated with more data C) AI can never be biased because it is based on data D) Bias in AI is not an ethical concern
A) It can promote misinformation and divisive content B) Users get better content recommendations C) Algorithms are neutral and have no ethical concerns D) It only affects entertainment content, not news
A) Yes, to prevent harmful content from spreading B) Only for specific types of content (e.g., hate speech) C) Governments should own social media platforms to control content D) No, because it may limit free speech
A) RA10173 B) RA 10175 C) RA10844 D) RA8792
A) E-commerce act B) Anti-Cybercrime law C) Data Privacy act of 2012 D) Cybercrime prevention act of 2012
A) RA8792 B) RA10173 C) RA9995 D) RA10175
A) Provides guidelines on cyberbullying B) Protects minors online C) Penalizes hacking activities D) Regulates online commerce
A) Black hat hacking B) Penetration fraud C) Red Teaming D) White hat hacking
A) DOJ - Office of Cybercrime B) NBI - Cybercrime division C) DOST D) DICT
A) A written consent from the system owner B) A court order C) A signed non-disclosure agreement D) No requirement needed
A) Deportation B) Fine only C) 6 months to 6 years imprisonment and/or fine D) Life imprisonment
A) to bypass cybersecurity systems B) To identify and fix security vulnerabilities C) To steal data anonymously D) to spread virus legally
A) Hacking B) Theft C) Murder D) Fraud via physical documents
A) Disclosing vulnerabilities to an organization you hacked without consent B) Testing your own system for vulnerabilities C) Scanning networks with written permission D) Reporting a security flaw you discovered accidentally
A) John the Ripper B) Nmap C) Nessus D) Wireshark
A) Unauthorized access B) Cybersex C) Data interference D) Cyberterrorism
A) Cybersex B) Software piracy C) Libel D) Identity Theft
A) Red-hat B) Black-hat C) White-hat D) Grey-hat
A) White-hat B) Black-hat C) Grey-hat D) Blue-hat
A) Online libel B) Cyberstalking C) Hacking into a server D) Cyberbullying
A) The CEO B) The Data Protection Officer (DPO) C) The Compliance Officer D) The HR Manager
A) A new invention B) A direct copy of a novel C) A photograph of a public sculpture D) A fan-made film based on a copyrighted movie
A) Quoting a paragraph from a book in a review B) Linking to an external website C) Using a copyrighted image in a blog without credit or license D) Creating your own version of a song
A) A chemical compound B) A pharmaceutical process C) A mechanical invention D) A mathematical formula
A) Reproducing a full work as long as it’s not sold B) Using copyrighted content if it’s under 30 seconds C) Limited use of copyrighted work for purposes like commentary, criticism, or education D) A license to use any copyrighted content
A) Not if it's under 100 words B) Yes, because the ideas are not original C) No, because the wording is different D) Only if the article was copyrighted
A) Trade secrets B) Artistic works C) Industrial designs D) Inventions and processes
A) A novel or a movie script B) An invention for a new machine C) A new drug formula D) A company logo
A) Register with the government B) Hire a lawyer C) Submit a request to the UN D) Nothing — it exists automatically when the work is created
A) 10 years B) 70 years after the author’s death C) 50 years from publication D) Forever
A) An exclusive right to make and sell an invention B) A government-issued copyright C) A sign, logo, or phrase that identifies a brand or company D) A registered legal document
A) To control global markets B) To protect creative works and inventions C) To limit free speech D) To increase product prices
A) Publishing someone else’s work with permission B) Hiring a freelance writer C) Quoting a source with proper citation D) Using another person's work without credit or acknowledgment
A) Fair use B) Patent infringement C) Plagiarism D) Trademark dilution
A) To enforce cybersecurity policies for governments B) To allow companies to share data more freely C) To protect the personal data and privacy of individuals D) To make internet access easier for European citizens
A) Customer service agents B) Sales representatives C) Data scientists and analysts D) Graphic designers
A) Explicit consent B) Contractual necessity C) Both A and C D) Legitimate interests
A) Right to object to automated decision-making B) Right to access data C) Right to data portability D) Right to compensation without legal process
A) A company’s name B) A list of movie genres C) A user’s favorite color D) An IP address
A) Encrypting personal information B) Asking users for consent before collecting data C) Encrypting personal information D) Selling user data without informing them
A) Public data has copyright B) The data may have been posted without meaningful consent C) AI systems require private data D) The data is too expensive
A) Data monetization B) Accountability C) Data minimization D) Purpose limitation
A) Be forgotten (have their data erased) B) Prevent companies from using encryption C) Automatically block all marketing D) Monitor company data servers
A) Lack of data portability B) System optimization C) Data redundancy D) Inadequate transparency and consent
A) Archiving old data in compressed formats B) Collecting only data that is adequate, relevant, and limited to what's necessary C) Removing duplicate user entries D) Deleting user accounts after inactivity
A) Collecting only the data needed for a specific purpose B) Selling anonymized data without informing users C) Collecting as much data as possible for future use D) Making consent forms hard to read
A) Poor anonymization may allow re-identification B) Anonymized data must be destroyed after 1 year C) Data anonymization is illegal D) Anonymized data can't be stored long term
A) Users knowingly agreeing to data use with clear information B) Automatically opting in users to data collection C) A vague statement hidden in the Terms & Conditions D) A verbal agreement recorded during a phone call
A) As soon as the company completes an internal investigation B) 72 hours C) Within 30 days D) Only if over 1,000 users are affected
A) Global Data Privacy Regulation B) General Data Protection Regulation C) Government Data Privacy Regulation D) General Digital Protection Rules |