ThatQuiz Test Library Take this test now
SOCPRO
Contributed by: Vergonio
  • 1. What is the main principle of utilitarianism?
A) Follow moral duties regardless of consequences
B) Act according to personal virtue
C) Follow religious principles strictly
D) Maximize happiness and minimize suffering
  • 2. A scientist discovers a cure for a deadly disease but needs to test it on 100 people without their knowledge to confirm its effectiveness. If successful, it could save millions. What would a utilitarian do?
A) Delay the test until everyone consents, even if it means more deaths
B) Reject the testing because it violates informed consent
C) Approve the testing, because saving millions outweighs harming 100 people
D) Conduct the test but only on prisoners
  • 3. Which of the following is an example of utilitarian reasoning?
A) A soldier follows orders regardless of personal beliefs
B) A doctor saves five patients by using the organs of one healthy person
C) A judge follows the law even if it leads to an unfair result
D) A student refuses to cheat because honesty is a virtue
  • 4. Who is the most famous proponent of utilitarianism?
A) John Stuart Mill
B) Immanuel Kant
C) Aristotle
D) David Hume
  • 5. According to Kant’s categorical imperative, how should people act?
A) By following whatever society deems acceptable
B) According to universal moral laws that apply to everyone
C) By maximizing their own personal benefit
D) Based on what brings the most pleasure
  • 6. Which ethical theory focuses on duty and rules?
A) Moral Relativism
B) Utilitarianism
C) Virtue Ethics
D) Deontology
  • 7. You find a wallet on the street with $500 and an ID inside. You really need the money to pay rent. What would a deontologist likely do?
A) Keep it, but try to pay it forward later
B) Return it because honesty is a moral duty
C) Keep the money because no one will know
D) Donate the money to charity instead
  • 8. Which ethical theory prioritizes the greatest good for the greatest number?
A) Moral Relativism
B) Virtue Ethics
C) Deontology
D) Utilitarianism
  • 9. Your best friend asks you to lie to their partner to cover up their cheating. If you refuse, your friend may end the friendship. What would a virtue ethicist likely do?
A) Tell the partner directly to stop the deception
B) Lie now, but encourage your friend to confess later
C) Refuse, because honesty and loyalty should be upheld
D) Lie to protect the friendship
  • 10. Which ethical theory is concerned with developing good character traits?
A) Moral Relativism
B) Deontology
C) Virtue Ethics
D) Utilitarianism
  • 11. Who is the most famous philosopher associated with virtue ethics?
A) Kant
B) Mill
C) Aristotle
D) Locke
  • 12. According to Aristotle, what is the ultimate goal of human life?
A) Following strict moral laws
B) Eudaimonia (flourishing and well-being)
C) Maximizing pleasure
D) Power
  • 13. What philosopher is most associated with deontology?
A) Aristotle
B) Thomas Hobbes
C) Immanuel Kant
D) John Stuart Mill
  • 14. A doctor is treating a terminally ill patient who is in severe pain. The patient begs for assisted euthanasia, but it is illegal in their country. What would a deontologist do?
A) Assist the patient to relieve suffering
B) Refuse, because following the law is a moral duty
C) Let the family decide
D) Consider the patient's wishes and weigh the emotional impact
  • 15. Which of the following is an example of virtue ethics?
A) A soldier obeys orders even when they seem unethical
B) A politician lies because it will make people happier
C) A person practices honesty because it is part of being a good person
D) A scientist falsifies data to get ahead in their career
  • 16. Which of the following is an example of a deontological approach to ethics?
A) A company lies to increase profits but later donates to charity
B) A person tells the truth, even when it has negative consequences
C) Someone helps others only if it benefits them personally
D) A doctor saves five patients by sacrificing one healthy patient
  • 17. Who should be responsible for the unintended consequences of technology?
A) All of the above
B) The government through regulations
C) The developers who create the technology
D) The users who adopt the technology
  • 18. What is the primary ethical concern when balancing innovation and responsibility?
A) Making technology as profitable as possible
B) Slowing down technological progress
C) Preventing competition in the market
D) Ensuring fairness and preventing harm
  • 19. Who should be held accountable if an AI system causes harm?
A) The users who operate it
B) The AI itself
C) No one, since AI decisions are unpredictable
D) The company that designed it
  • 20. Is it ethical to replace human workers with AI if it increases efficiency?
A) No, because it puts people out of jobs
B) Yes, because efficiency benefits the economy
C) AI should never replace humans
D) Only if there are programs to retrain displaced workers
  • 21. Should social media platforms be responsible for fact-checking content?
A) Yes, to prevent the spread of misinformation
B) Only if they are forced to by the government
C) No, because users should fact-check themselves
D) No, because it limits free speech
  • 22. Should ethical hacking be encouraged to improve cybersecurity?
A) No, because hacking is always illegal
B) Only if the hacker is government-approved
C) No, because companies should secure their systems without outside help
D) Yes, to find vulnerabilities before criminals do
  • 23. What is the main ethical issue with facial recognition technology?
A) It can invade privacy and lead to government surveillance
B) It is useful for security and should be widely adopted
C) It helps identify criminals more efficiently
D) There are no ethical issues with facial recognition
  • 24. How much personal data should companies be allowed to collect?
A) None, as data collection is always unethical
B) Everything, since data is valuable for business growth
C) Only what is necessary for their services
D) As much as they want if users consent
  • 25. Is it ethical for governments to use mass surveillance to prevent crime?
A) No, because it violates privacy rights
B) Only if citizens are informed and give consent
C) Yes, as long as the data is used responsibly
D) Yes, if it helps national security
  • 26. Should AI systems be allowed to make life-or-death decisions (e.g., autonomous weapons, medical AI)?
A) No, because ethical responsibility should remain with humans
B) Yes, if they are more accurate than humans
C) Only if the AI has been extensively tested and proven reliable
D) It depends on the situation
  • 27. What is a major ethical concern about AI bias?
A) AI can reinforce existing societal inequalities
B) AI bias can be eliminated with more data
C) AI can never be biased because it is based on data
D) Bias in AI is not an ethical concern
  • 28. What ethical issue arises from social media algorithms prioritizing engagement?
A) It only affects entertainment content, not news
B) It can promote misinformation and divisive content
C) Algorithms are neutral and have no ethical concerns
D) Users get better content recommendations
  • 29. Should governments regulate social media content?
A) Only for specific types of content (e.g., hate speech)
B) Yes, to prevent harmful content from spreading
C) Governments should own social media platforms to control content
D) No, because it may limit free speech
  • 30. What is the primary law governing cybercrimes in the Philippines?
A) RA8792
B) RA10173
C) RA10844
D) RA 10175
  • 31. What does RA10175 stand for?
A) E-commerce act
B) Cybercrime prevention act of 2012
C) Anti-Cybercrime law
D) Data Privacy act of 2012
  • 32. Which law in the Philippines governs the protection of personal data?
A) RA9995
B) RA8792
C) RA10175
D) RA10173
  • 33. What is the significance of "RA 8792"?
A) Penalizes hacking activities
B) Protects minors online
C) Regulates online commerce
D) Provides guidelines on cyberbullying
  • 34. Ethical hacking is also known as:
A) Penetration fraud
B) White hat hacking
C) Red Teaming
D) Black hat hacking
  • 35. Which government agency is primarily responsible for implementing cybercrime laws in the Philippines?
A) DOJ - Office of Cybercrime
B) NBI - Cybercrime division
C) DOST
D) DICT
  • 36. What must ethical hackers obtain before performing any penetration testing?
A) A written consent from the system owner
B) A court order
C) A signed non-disclosure agreement
D) No requirement needed
  • 37. What is the penalty for cyber libel under RA 10175?
A) Life imprisonment
B) 6 months to 6 years imprisonment and/or fine
C) Fine only
D) Deportation
  • 38. What is the main goal of ethical hacking?
A) to spread virus legally
B) to bypass cybersecurity systems
C) To identify and fix security vulnerabilities
D) To steal data anonymously
  • 39. In RA 10175, which of the following can be considered a "cyber-dependent crime"?
A) Hacking
B) Fraud via physical documents
C) Murder
D) Theft
  • 40. Which of these activities is ILLEGAL even with the intention of helping?
A) Reporting a security flaw you discovered accidentally
B) Disclosing vulnerabilities to an organization you hacked without consent
C) Testing your own system for vulnerabilities
D) Scanning networks with written permission
  • 41. Which ethical hacking tool is used for packet sniffing?
A) John the Ripper
B) Nmap
C) Wireshark
D) Nessus
  • 42. Which of the following is an example of a cyber offense under the "content-related offenses" category in RA 10175?
A) Data interference
B) Cyberterrorism
C) Unauthorized access
D) Cybersex
  • 43. Which of the following is NOT considered a cybercrime under RA10175?
A) Libel
B) Software piracy
C) Cybersex
D) Identity Theft
  • 44. Which of these types of hackers breaks into systems for malicious reasons?
A) Black-hat
B) Grey-hat
C) White-hat
D) Red-hat
  • 45. What type of hacker falls between legal and illegal activities, often acting without permission but not with malicious intent?
A) White-hat
B) Blue-hat
C) Black-hat
D) Grey-hat
  • 46. Which of the following is a technical form of cybercrime?
A) Hacking into a server
B) Cyberbullying
C) Cyberstalking
D) Online libel
  • 47. Under RA 10173 (Data Privacy Act), who is responsible for securing personal information in a company?
A) The Data Protection Officer (DPO)
B) The CEO
C) The Compliance Officer
D) The HR Manager
  • 48. Which of these qualifies as a derivative work?
A) A direct copy of a novel
B) A new invention
C) A photograph of a public sculpture
D) A fan-made film based on a copyrighted movie
  • 49. Which of these actions is MOST likely to infringe copyright?
A) Using a copyrighted image in a blog without credit or license
B) Quoting a paragraph from a book in a review
C) Linking to an external website
D) Creating your own version of a song
  • 50. Which of the following CANNOT be patented?
A) A chemical compound
B) A mechanical invention
C) A mathematical formula
D) A pharmaceutical process
  • 51. What is fair use in copyright law?
A) Limited use of copyrighted work for purposes like commentary, criticism, or education
B) Using copyrighted content if it’s under 30 seconds
C) Reproducing a full work as long as it’s not sold
D) A license to use any copyrighted content
  • 52. A student paraphrases an article without citation. Is that plagiarism?
A) Yes, because the ideas are not original
B) No, because the wording is different
C) Not if it's under 100 words
D) Only if the article was copyrighted
  • 53. What does a patent protect?
A) Artistic works
B) Inventions and processes
C) Trade secrets
D) Industrial designs
  • 54. Which of the following is protected by copyright?
A) A new drug formula
B) A company logo
C) A novel or a movie script
D) An invention for a new machine
  • 55. What do you need to do to receive copyright protection?
A) Hire a lawyer
B) Nothing — it exists automatically when the work is created
C) Submit a request to the UN
D) Register with the government
  • 56. How long does copyright protection typically last for an individual’s original work?
A) Forever
B) 70 years after the author’s death
C) 10 years
D) 50 years from publication
  • 57. Which of the following best defines a trademark?
A) An exclusive right to make and sell an invention
B) A government-issued copyright
C) A registered legal document
D) A sign, logo, or phrase that identifies a brand or company
  • 58. What is the main purpose of intellectual property (IP) laws?
A) To increase product prices
B) To limit free speech
C) To protect creative works and inventions
D) To control global markets
  • 59. What is considered plagiarism?
A) Quoting a source with proper citation
B) Hiring a freelance writer
C) Publishing someone else’s work with permission
D) Using another person's work without credit or acknowledgment
  • 60. Copying code from a website without attribution is an example of:
A) Trademark dilution
B) Plagiarism
C) Fair use
D) Patent infringement
  • 61. What is the main purpose of GDPR?
A) To make internet access easier for European citizens
B) To allow companies to share data more freely
C) To protect the personal data and privacy of individuals
D) To enforce cybersecurity policies for governments
  • 62. Which profession has a special responsibility to ensure ethical data usage?
A) Customer service agents
B) Graphic designers
C) Data scientists and analysts
D) Sales representatives
  • 63. Which legal basis under GDPR does not require user consent for processing personal data?
A) Explicit consent
B) Contractual necessity
C) Legitimate interests
D) Both A and C
  • 64. Which of the following is NOT a right granted by GDPR?
A) Right to data portability
B) Right to object to automated decision-making
C) Right to access data
D) Right to compensation without legal process
  • 65. Which of the following is considered personal data under GDPR?
A) An IP address
B) A list of movie genres
C) A company’s name
D) A user’s favorite color
  • 66. Which of these actions would likely violate ethical standards in data collection?
A) Selling user data without informing them
B) Encrypting personal information
C) Asking users for consent before collecting data
D) Encrypting personal information
  • 67. What’s the ethical dilemma in using publicly available data for AI training?
A) AI systems require private data
B) The data may have been posted without meaningful consent
C) Public data has copyright
D) The data is too expensive
  • 68. Which principle is NOT one of the core principles of GDPR?
A) Data monetization
B) Accountability
C) Data minimization
D) Purpose limitation
  • 69. Under GDPR, individuals have the right to:
A) Monitor company data servers
B) Automatically block all marketing
C) Be forgotten (have their data erased)
D) Prevent companies from using encryption
  • 70. A mobile app collects precise location data and uses it for targeted advertising. What ethical issue is MOST relevant here?
A) Lack of data portability
B) Data redundancy
C) System optimization
D) Inadequate transparency and consent
  • 71. Under GDPR, what is data minimization?
A) Deleting user accounts after inactivity
B) Archiving old data in compressed formats
C) Collecting only data that is adequate, relevant, and limited to what's necessary
D) Removing duplicate user entries
  • 72. Which of the following is an ethical approach to handling user data?
A) Selling anonymized data without informing users
B) Making consent forms hard to read
C) Collecting only the data needed for a specific purpose
D) Collecting as much data as possible for future use
  • 73. A company anonymizes user data and shares it. What’s a key GDPR risk they may still face?
A) Anonymized data can't be stored long term
B) Data anonymization is illegal
C) Anonymized data must be destroyed after 1 year
D) Poor anonymization may allow re-identification
  • 74. What is informed consent in data privacy?
A) A vague statement hidden in the Terms & Conditions
B) A verbal agreement recorded during a phone call
C) Automatically opting in users to data collection
D) Users knowingly agreeing to data use with clear information
  • 75. How soon must a data breach be reported under GDPR?
A) 72 hours
B) Within 30 days
C) As soon as the company completes an internal investigation
D) Only if over 1,000 users are affected
  • 76. What does GDPR stand for?
A) General Digital Protection Rules
B) Global Data Privacy Regulation
C) General Data Protection Regulation
D) Government Data Privacy Regulation
Created with That Quiz — where a math practice test is always one click away.