A) Act according to personal virtue B) Follow religious principles strictly C) Maximize happiness and minimize suffering D) Follow moral duties regardless of consequences
A) Delay the test until everyone consents, even if it means more deaths B) Reject the testing because it violates informed consent C) Conduct the test but only on prisoners D) Approve the testing, because saving millions outweighs harming 100 people
A) A soldier follows orders regardless of personal beliefs B) A doctor saves five patients by using the organs of one healthy person C) A student refuses to cheat because honesty is a virtue D) A judge follows the law even if it leads to an unfair result
A) David Hume B) Aristotle C) Immanuel Kant D) John Stuart Mill
A) By maximizing their own personal benefit B) According to universal moral laws that apply to everyone C) By following whatever society deems acceptable D) Based on what brings the most pleasure
A) Deontology B) Moral Relativism C) Utilitarianism D) Virtue Ethics
A) Donate the money to charity instead B) Keep the money because no one will know C) Return it because honesty is a moral duty D) Keep it, but try to pay it forward later
A) Utilitarianism B) Virtue Ethics C) Deontology D) Moral Relativism
A) Tell the partner directly to stop the deception B) Lie to protect the friendship C) Lie now, but encourage your friend to confess later D) Refuse, because honesty and loyalty should be upheld
A) Virtue Ethics B) Deontology C) Utilitarianism D) Moral Relativism
A) Locke B) Kant C) Mill D) Aristotle
A) Eudaimonia (flourishing and well-being) B) Following strict moral laws C) Power D) Maximizing pleasure
A) Thomas Hobbes B) John Stuart Mill C) Immanuel Kant D) Aristotle
A) Assist the patient to relieve suffering B) Let the family decide C) Refuse, because following the law is a moral duty D) Consider the patient's wishes and weigh the emotional impact
A) A scientist falsifies data to get ahead in their career B) A soldier obeys orders even when they seem unethical C) A politician lies because it will make people happier D) A person practices honesty because it is part of being a good person
A) A person tells the truth, even when it has negative consequences B) A company lies to increase profits but later donates to charity C) A doctor saves five patients by sacrificing one healthy patient D) Someone helps others only if it benefits them personally
A) All of the above B) The government through regulations C) The developers who create the technology D) The users who adopt the technology
A) Slowing down technological progress B) Making technology as profitable as possible C) Preventing competition in the market D) Ensuring fairness and preventing harm
A) No one, since AI decisions are unpredictable B) The company that designed it C) The users who operate it D) The AI itself
A) Only if there are programs to retrain displaced workers B) Yes, because efficiency benefits the economy C) AI should never replace humans D) No, because it puts people out of jobs
A) No, because it limits free speech B) Only if they are forced to by the government C) Yes, to prevent the spread of misinformation D) No, because users should fact-check themselves
A) Only if the hacker is government-approved B) No, because companies should secure their systems without outside help C) Yes, to find vulnerabilities before criminals do D) No, because hacking is always illegal
A) There are no ethical issues with facial recognition B) It can invade privacy and lead to government surveillance C) It is useful for security and should be widely adopted D) It helps identify criminals more efficiently
A) None, as data collection is always unethical B) Only what is necessary for their services C) As much as they want if users consent D) Everything, since data is valuable for business growth
A) Yes, as long as the data is used responsibly B) Yes, if it helps national security C) No, because it violates privacy rights D) Only if citizens are informed and give consent
A) Yes, if they are more accurate than humans B) Only if the AI has been extensively tested and proven reliable C) No, because ethical responsibility should remain with humans D) It depends on the situation
A) AI bias can be eliminated with more data B) AI can reinforce existing societal inequalities C) Bias in AI is not an ethical concern D) AI can never be biased because it is based on data
A) Users get better content recommendations B) It only affects entertainment content, not news C) It can promote misinformation and divisive content D) Algorithms are neutral and have no ethical concerns
A) Governments should own social media platforms to control content B) Yes, to prevent harmful content from spreading C) No, because it may limit free speech D) Only for specific types of content (e.g., hate speech)
A) RA8792 B) RA10173 C) RA10844 D) RA 10175
A) Anti-Cybercrime law B) Cybercrime prevention act of 2012 C) Data Privacy act of 2012 D) E-commerce act
A) RA8792 B) RA10175 C) RA9995 D) RA10173
A) Penalizes hacking activities B) Regulates online commerce C) Protects minors online D) Provides guidelines on cyberbullying
A) Red Teaming B) Black hat hacking C) Penetration fraud D) White hat hacking
A) DICT B) NBI - Cybercrime division C) DOJ - Office of Cybercrime D) DOST
A) A written consent from the system owner B) A signed non-disclosure agreement C) No requirement needed D) A court order
A) Fine only B) Life imprisonment C) Deportation D) 6 months to 6 years imprisonment and/or fine
A) to bypass cybersecurity systems B) to spread virus legally C) To steal data anonymously D) To identify and fix security vulnerabilities
A) Theft B) Hacking C) Murder D) Fraud via physical documents
A) Testing your own system for vulnerabilities B) Disclosing vulnerabilities to an organization you hacked without consent C) Scanning networks with written permission D) Reporting a security flaw you discovered accidentally
A) John the Ripper B) Wireshark C) Nessus D) Nmap
A) Unauthorized access B) Cybersex C) Data interference D) Cyberterrorism
A) Libel B) Cybersex C) Identity Theft D) Software piracy
A) Red-hat B) White-hat C) Grey-hat D) Black-hat
A) Blue-hat B) White-hat C) Grey-hat D) Black-hat
A) Online libel B) Cyberstalking C) Hacking into a server D) Cyberbullying
A) The HR Manager B) The CEO C) The Data Protection Officer (DPO) D) The Compliance Officer
A) A photograph of a public sculpture B) A fan-made film based on a copyrighted movie C) A new invention D) A direct copy of a novel
A) Linking to an external website B) Using a copyrighted image in a blog without credit or license C) Creating your own version of a song D) Quoting a paragraph from a book in a review
A) A pharmaceutical process B) A mathematical formula C) A chemical compound D) A mechanical invention
A) A license to use any copyrighted content B) Using copyrighted content if it’s under 30 seconds C) Reproducing a full work as long as it’s not sold D) Limited use of copyrighted work for purposes like commentary, criticism, or education
A) Not if it's under 100 words B) Yes, because the ideas are not original C) No, because the wording is different D) Only if the article was copyrighted
A) Trade secrets B) Inventions and processes C) Industrial designs D) Artistic works
A) A new drug formula B) An invention for a new machine C) A novel or a movie script D) A company logo
A) Register with the government B) Nothing — it exists automatically when the work is created C) Hire a lawyer D) Submit a request to the UN
A) 70 years after the author’s death B) Forever C) 10 years D) 50 years from publication
A) A government-issued copyright B) A sign, logo, or phrase that identifies a brand or company C) An exclusive right to make and sell an invention D) A registered legal document
A) To protect creative works and inventions B) To increase product prices C) To control global markets D) To limit free speech
A) Hiring a freelance writer B) Publishing someone else’s work with permission C) Quoting a source with proper citation D) Using another person's work without credit or acknowledgment
A) Patent infringement B) Trademark dilution C) Plagiarism D) Fair use
A) To enforce cybersecurity policies for governments B) To allow companies to share data more freely C) To make internet access easier for European citizens D) To protect the personal data and privacy of individuals
A) Data scientists and analysts B) Customer service agents C) Sales representatives D) Graphic designers
A) Legitimate interests B) Contractual necessity C) Explicit consent D) Both A and C
A) Right to object to automated decision-making B) Right to data portability C) Right to access data D) Right to compensation without legal process
A) A user’s favorite color B) A company’s name C) A list of movie genres D) An IP address
A) Asking users for consent before collecting data B) Selling user data without informing them C) Encrypting personal information D) Encrypting personal information
A) AI systems require private data B) The data is too expensive C) Public data has copyright D) The data may have been posted without meaningful consent
A) Purpose limitation B) Data monetization C) Data minimization D) Accountability
A) Be forgotten (have their data erased) B) Prevent companies from using encryption C) Monitor company data servers D) Automatically block all marketing
A) Data redundancy B) Lack of data portability C) System optimization D) Inadequate transparency and consent
A) Archiving old data in compressed formats B) Collecting only data that is adequate, relevant, and limited to what's necessary C) Removing duplicate user entries D) Deleting user accounts after inactivity
A) Collecting only the data needed for a specific purpose B) Collecting as much data as possible for future use C) Selling anonymized data without informing users D) Making consent forms hard to read
A) Data anonymization is illegal B) Anonymized data must be destroyed after 1 year C) Anonymized data can't be stored long term D) Poor anonymization may allow re-identification
A) A verbal agreement recorded during a phone call B) A vague statement hidden in the Terms & Conditions C) Automatically opting in users to data collection D) Users knowingly agreeing to data use with clear information
A) As soon as the company completes an internal investigation B) Within 30 days C) Only if over 1,000 users are affected D) 72 hours
A) Government Data Privacy Regulation B) General Data Protection Regulation C) General Digital Protection Rules D) Global Data Privacy Regulation |