ThatQuiz Test Library Take this test now
socpro moto
Contributed by: Roan
  • 1. What is the main purpose of the Philippine Data Privacy Act of 2012?
A) To control internet usage
B) To eliminate all data sharing
C) To balance innovation and data protection
  • 2. Which organization enforces RA 10173?
A) National Privacy Commission (NPC)
B) Department of Information Technology
C) Department of Justice
  • 3. What principle means data subjects must know how their data is used?
A) Accountability
B) Transparency
C) Proportionality
  • 4. What principle requires collecting only necessary data?
A) Proportionality
B) Transparency
C) Integrity
  • 5. Which is NOT a right of data subjects?
A) Right to erase data
B) Right to object
C) Right to sell data
D) Right to access data
  • 6. What is a possible penalty for violating the law?
A) Imprisonment and fines
B) No consequence
C) Warning only
  • 7. GDPR applies mainly to which region
A) America
B) Asia
C) Europe
  • 8. Which law includes criminal liability explicitly?
A) Both
B) RA 10173
C) GDPR
  • 9. What is the GDPR’s maximum penalty?
A) ₱1 million
B) 10% of income
C) 4% of global revenue
  • 10. What was a key issue in the PhilHealth ransomware attack?
A) Delayed breach response
B) No data affected
C) Strong security
  • 11. refers to creations of the mind such as inventions, literary and artistic works, designs, symbols, names, and images.
A) IP
B) Patent
C) Trademark
  • 12. Protection for original works of authorship, such as books, music, movies, software, and artworks.
A) Patent
B) Trademark
C) Copyright
  • 13. Protects confidential business information, such as formulas, practices, or processes that give a competitive advantage.
A) Trademark
B) Trade Secrets
C) Patent
  • 14. Protects logos, names, symbols, and other identifiers used in commerce to distinguish goods or services.
A) Trademark
B) Copyright
C) Trade Secrets
  • 15. Exclusive rights granted for inventions or innovations that are novel, non-obvious, and useful.
A) Trade Secrets
B) Patent
C) Patent
  • 16. What does copyright protect?
A) Original works like books, music, and films
B) Business secrets
C) Logos only
  • 17. Which of the following is NOT a type of IP right?
A) Salary
B) Patent
C) Copyright
D) Trademark
  • 18. How long does copyright usually last?
A) Life of the author + 70 years
B) 20 years
C) 10 years
  • 19. Legal protection given to the creators of "original works of authorship.“
A) Patent
B) Copyright
C) Trademark
  • 20. Unintentionally failing to credit a source or incorrectly citing it.
A) Paraphrasing Plagiarism
B) Direct Plagiarism
C) Accidental Plagiarism
  • 21. What is self-plagiarism?
A) Reusing your own work without disclosure
B) Writing new content
C) Copying others’ work
  • 22. For new varieties of plants that are asexual reproduction.
A) Design Patents
B) Utility Patents
C) Plant Patents
  • 23. For new and useful inventions (machines, processes, compositions).
A) Utility Patents
B) Plant Patents
C) Design Patents
  • 24. For new and original ornamental designs.
A) Utility Patents
B) Plant Patents
C) Design Patents
  • 25. What is required for a patent?
A) Expensive materials
B) Government approval only
C) Novelty, non-obviousness, usefulness
  • 26. What is DRM (Digital Rights Management)?
A) A legal case
B) A software company
C) A tool to prevent unauthorized copying
  • 27. The act of using someone else’s work, ideas, or intellectual property without permission or proper attribution.
A) Patent
B) Copyright
C) Plagiarism
  • 28. Copying someone’s work word for word.
A) Direct Plagiarism
B) Accidental Plagiarism
C) Paraphrasing Plagiarism
  • 29. Rewriting someone else’s ideas without proper attribution.
A) Self-Plagiarism
B) Accidental Plagiarism
C) Paraphrasing Plagiarism
  • 30. Always give credit to the original creator when using their work.
A) Copyright
B) Citing Sources
C) Owner
  • 31. What is piracy?
A) Buying software
B) Illegal distribution of digital content
C) Legal sharing
  • 32. Which tool can detect plagiarism?
A) Turnitin
B) Chrome
C) Excel
  • 33. Which company is known for enforcing software IP rights?
A) Google
B) Netflix
C) Microsoft
  • 34. Distributing unlicensed copies of software.
A) Music Piracy
B) Copyright
C) Software Piracy
  • 35. Official registration provides legal protection and the ability to enforce rights.
A) Using Non-Disclosure Agreements (NDAs)
B) Registering Copyrights, Patents, and Trademarks
C) Digital Watermarking and DRM
  • 36. Regularly check for unauthorized use of your work online and take necessary legal steps to enforce your rights.
A) Monitor and Enforce Your Rights
B) Using Non-Disclosure Agreements (NDAs)
C) Digital Watermarking and DRM
  • 37. Use technology to protect digital works from unauthorized copying or distribution.
A) Monitor and Enforce Your Rights
B) Registering Copyrights, Patents, and Trademarks
C) Digital Watermarking and DRM
  • 38. When sharing sensitive business information, use NDAs to protect trade secrets and proprietary ideas.
A) Monitor and Enforce Your Rights
B) Using Non-Disclosure Agreements (NDAs)
C) Registering Copyrights, Patents, and Trademarks
  • 39. Which thought best reflects the importance of intellectual property?
A) “Creative works should be freely used by anyone without giving credit.”
B) “Only large companies benefit from intellectual property protection.”
C) “Intellectual property should be protected, respected, and promoted to support innovation.”
  • 40. What are cyber laws?
A) Laws about transportation
B) Laws about business only
C) Laws governing the legal use of technology and the internet
  • 41. Which of the following is regulated by cyber laws in the Philippines?
A) Online behavior
B) Farming activities
C) Weather patterns
  • 42. Which law focuses on cybercrimes like hacking and online libel?
A) RA 10175
B) RA 9995
C) RA 10173
  • 43. What does the Data Privacy Act of 2012 (RA 10173) protect?
A) Wildlife
B) Personal information
C) Buildings
  • 44. Which law legalizes online contracts and electronic signatures?
A) RA 10175
B) RA 8792
C) RA 10173
  • 45. What does RA 9995 criminalize?
A) Sharing private content without consent
B) Protecting papers
C) Creating websites
  • 46. What is ethical hacking?
A) Illegal hacking
B) Authorized hacking to find system weaknesses
C) Hacking for money
  • 47. What is another term for ethical hackers?
A) Grey hat
B) Black hat
C) White hat
  • 48. Which type of hacker is considered criminal?
A) White hat
B) Black hat
C) Grey hat
  • 49. Which hacker may break laws but without harmful intent?
A) Black hat
B) Grey hat
C) White hat
  • 50. Which skill is important for an ethical hacker?
A) Programming
B) Counting
C) Talking
  • 51. Which tool is commonly used in ethical hacking?
A) Painting
B) Microsoft Word
C) Nmap
  • 52. Which is a digital right in the Philippines?
A) Right to own land
B) Right to travel abroad
C) Right to privacy
  • 53. How many years of imprisonment can cybercrime reach?
A) 20 years
B) Up to 12 years
C) 5 years
  • 54. Which certification is for ethical hackers?
A) TOEFL
B) CEH
C) NCLEX
  • 55. What happened in the Comelec Data Breach (2016)?
A) Voting machines failed
B) Data of voters was leaked
C) Sumayaw si Toni Fowler
  • 56. What does “data minimization” mean?
A) Collect only necessary data
B) Share all data
C) Collect all data
  • 57. What is the “Right to Access”?
A) Use any data
B) Block websites
C) Request personal data from organizations
  • 58. What is the “Right to be Forgotten”?
A) Delete personal data
B) Change password
C) Hide identity
  • 59. Be clear with users about data collection practices and give them control over their data.
A) Data Minimization
B) Transparency
C) Data Encryption
  • 60. Why is privacy important in computing?
A) It protects valuable personal data
B) It reduces electricity use
C) It makes computers faster
  • 61. What can happen if personal data is misused?
A) Identity theft
B) More storage
C) Better security
  • 62. IT and CS professionals are considered:
A) Data stewards
B) Data hackers
C) Data users
  • 63. Which of the following is personal data?
A) Weather report
B) School subject
C) Name and address
  • 64. When was GDPR enacted?
A) 2012
B) 2018
C) 2015
  • 65. A consequentialist theory that suggests actions are right if they promote the greatest happiness for the greatest number of people.
A) Virtue Ethics
B) Deontology
C) Utilitarianism
  • 66. Focuses on the character and virtues of the individual rather than on specific actions or rules.
A) Utilitarianism
B) Virtue Ethics
C) Deontology
  • 67. Argues that actions are morally right if they follow a set of rules, regardless of the consequences.
A) Utilitarianism
B) Deontology
C) Virtue Ethics
  • 68. A non-consequentialist theory founded by
A) Aristotle
B) Immanuel Kant
C) Jeremy Bentham and John Stuart Mill
  • 69. Virtue Ethics was developed by
A) Immanuel Kant
B) Aristotle
C) Jeremy Bentham and John Stuart Mill.
  • 70. Utilitarianism was created by
A) Aristotle
B) Jeremy Bentham and John Stuart Mill
C) Immanuel Kant
  • 71. focuses on outcomes and the greatest good for the greatest number.
A) Utilitarianism
B) Deontology
C) Virtue Ethics
  • 72. emphasizes duty and following moral rules regardless of consequences.
A) Deontology
B) Utilitarianism
C) Virtue Ethics
  • 73. emphasizes character and personal development toward flourishing.
A) Virtue Ethics
B) Utilitarianism
C) Deontology
Created with That Quiz — where a math practice test is always one click away.