Thursday, August 4, 2022

Social and Professional Issues

 ITE6202 Social and Professional Issues


Even with long years of experience, skills based on shallow knowledge of the field could be damaging to the profession

True

A man who did something to help others but it is against his will is not considered good. This is an example of _________.

Deontology

Ethical decision making is the process of making a decision which may result in one or more moral conflicts while ethical reasoning is when ethical principles is integrated in the reasoning process

True

Professional Codes of Conduct addresses the following except:

Confidentiality and Commitment

It is when laws are used to resolve interpersonal conflicts in a society.

Conflict Resolution

Morality is enforced by the authority that enacted them and security forces

False

Which is true about Licensing Authorities.

 

I. Before a license is issued an individual must be tested.

II. Violation of the rules from the licensing authority may lead to recalling of the license

III. After the test, the licensing authority may deny issuing the license

 

I & II

 

I. Before a license is issued an individual must be tested.

II. Violation of the rules from the licensing authority may lead to recalling of the license

The danger with information matching is that everyone knows who will use the built profiles from the matched information and where it will be used

False

One of the contributing factors in the cause of violations is when consumers lack the knowledge of how what they consider a little bit of information can turn into a big invasion of privacy

True

This theory states that ethical statements cannot be proven and are really only statements about how someone feels.

emotivism

Which is not true about the word profession?

Since the beginning, there is an emphasis on intellectual capabilities for membership in a group as it is deemed important

Legal acts conform to what an individual believes to be the right thing to do.

False

Ethics is defined as a field of inquiry whose subject is human actions and these human actions are called

human conduct

It is developed over a period of time based on either the religion or culture of the indigenous people in the area.

Community Code

According to this theory actions are judged according on the results. For example, a person kills one person to prevent the deaths of others.

Consequentialism

Rules that guides individual actions such as not taking the possessions of others are called

directives

Under what condition can data collections become an invasion of privacy?

when information is used for unauthorized purposes

It is the core of human dignity and autonomy

privacy

It is the application of data mining techniques to discover patterns from the Web

web mining

It comes from an enforceable part of the moral code that differs with each society and culture.

conventional law

A provider of service should first inquire the customer before an action of service should be done. This statement shows _______.

Autonomy

There are different strands of information to be protected, which does not belong to a group:

Employment Information

The decision-making process is developed that individuals tend to execute automatically without thinking about the steps that go through. The step that involves others in brainstorming is __________.

Identify Alternatives

The two kinds of rules of conduct; Directives which involves the macroethical level and Social policies that involves the microethical level.

False

It is a human cognitive process of looking for ways to generate or affirm a proposition

reasoning

This is another term for large commercial databases

data  warehouse

It is when an action is right if the consequences of that action are favorable to all except the actor

Altruism

Determinative Laws fixes ways of acting in accordance with natural law.

True

It is when ethical reasoning remained the same even with the evolution of ethical discipline.

Emotivism

Which of the following does not describe the word ethics?

widely shared social conventions about right and wrong

Listening in to other people's conversations is an example of what privacy violation?

Interception of Information

Which is true about Morality?

It prevents harm and suffering, a moral system aims at promoting human flourishing

Harassment is a form of discrimination and it mainly involves making decisions that negatively affect an individual

False

It is an invasion of privacy by wrongful entry, seizing, or acquiring possession of the property of others

intrusion

As humans tend to follow a life script, an individual's reaction to certain rules of conduct is always intentional.

False

Individuals whose data are mined can become identified with or linked to certain newly created groups.

True

These are guidelines that state the dos and dont's of a professional that protects individual members and their image.

Professional Code

Showing an act of kindness in exchange to an equal act of kindness is an example what culturefree moral codes?

the bronze rule

In order for professions and trades to uphold essential requirements, integrity, commitment, and professional codes of conduct must be met.

False

It is an act of seeking public attention to what is considered an illegal or mismanaged act

whistle-blowing

It is an interpretation is done based on a system that uses a process of argumentation consisting of a mixture of inductions and deductions

Ethical theories

With the relationship between the provider and receiver of the service/product present, a power play may sometimes be in favor of the provider not the receiver

True

The primary purpose of professional code of ethics is to promote the public image of the profession by specifying and enforcing the ethical behavior expected from its members

False

For formal education to be effective in teaching and enforcing the pillars of professionalism it must be _________

Incremental

It is a system created by and for human beings usually in public deliberations like a council of elders or representatives in national legislatures.

Conventional Law

If the codes of conduct focuses on rules and guidelines, autonomy focuses on

power balance

It is an unwritten law that holds our rights of self-preservation

natural law

The moral concept of whistle-blowing is good when the activities involved pose serious danger and harm to human life

True

It involves the indirect gathering of personal information through an analysis of implicit patterns discoverable in data.

Data Mining

It takes part in building character traits in people.

morality

Individuals whose data are mined cannot be identified with or linked to certain newly created groups.

False

The danger with information matching is that no one knows who will use the built profiles from the matched information and where it will be used

True

One of the contributing factors in the cause of violations is when consumers lack the ethics of how what they consider a little bit of information can turn into a big invasion of privacy

False

Frauds are sometimes a form of collaboration between an employee and a non-employee

True

It is a type of offense when an individual accesses the whole or part of a computer system without permission or right

illegal access

Which is not a characteristic of an intellectual object:

It is easily owned

The owner of a patent has no right to prevent third parties from using the patented product if it has been put on the market by the owner of the product

True

It is a right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work

copyright

Maintaining the status quo by preventing the unauthorized modification of files is an example of

integrity

Match the words to the given choices:

reclusion and isolation

Psychological Effects

unauthorized ways

Cyberpiracy

reckless hindering

System Interference

shapes and colors

Trademark

reckless alteration

Data Interference

creative works

Copyright

inventions

Patents

unauthorized access

Cybertrespass

computer programs

Original w orks

adaptations

Derivative w orks

All of the statements are true about the first requirement of a Patent Work except:

It must serve a basic purpose

Dramatizations, translations, and adaptations of musicals are example of

derivative works

This penalty will cause an accused to be imprisoned for two to four decades.

reclusion perpetua

A set of legal rights which result from intellectual activity in the industrial, scientific, literary, and artistic fields is called

intellectual property

In Spear-phishing, con artists send legitimate looking e-mails urging the recipient to take action to avoid a negative consequence or to receive a reward.

False

Shapes cannot be registered as trademarks if the shapes are not necessitated by technical factors

True

A patent must not be obvious to the general public

False

It includes the integrity, confidentiality, and availability of information at the servers

information security

Individuals found guilty of child pornography violated _____________.

Anti-Child Pornography Act of 2009

If intimidation and fear of reprisals is present, __________ is good because useful information may be revealed

anonymity

When two persons have jointly made an invention, the right to the patent shall belong to _______.

Both of them

Which of the following does not belong to the group?

Collective marks

Republic Act No. 8293 is also known as the __________

intellectual property code of the Philippines

One of the advantages of anonymity is that disputes could be solved if information from individuals’ party to these disputes can reveal the necessary information

False

They launch computer-based attacks against other computers or networks in an attempt to intimidate or coerce a government in order to advance certain political or social objectives

cyberterrorist

It is hardware or software used to isolate the sensitive portions of an information system facility from the outside world and limit the potential damage that can be done by a malicious intruder

fireworks

Worms are programs where malicious code is hidden inside a seemingly harmless program

False

A patent claim can be cancelled if it adheres to the public order.

False

The alteration of information may be caused by the disclosure of personal information

False

These individuals test the limitations of information systems out of intellectual curiosity

Hackers

These are set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge

rootkit

Which among the following has the shortest imprisonment charge.

arresto mayor

Which is not true about an Insider Threat.

The only suspects are employees

Which does not belong to the group?

Works of Applied Art

Which does not belong to the group:

Denial of Service

Instilling fear and doubt and compromising the integrity of the data can lead to

extortion

Which does not belong to the group:

Scarcity

One is not known by any name including pseudo names.

anonymity

It is the acquisition of a domain name on the Internet in bad faith or with the intent to profit, mislead, destroy one’s reputation or deprive others from registering the same domain name.

Cybersquatting

Which among the following has the longest imprisonment charge

reclusion perpetua

They use hacking to achieve a political or social goal.

hacktivists

The increasing level of familiarity in human actions, may it be good or bad is called _______.

Moral Decay

Penetration can be done with or without the use of the internet

True

Both the sender and the receiver each have a pair of keys, one public and one private.

asymmetric encryption

Match the following words to the given choices

E-mail Fraud

Phishing

Digital Signature

Authentication

Preventing of unauthorized disclosure of information

Confidentiality

Encryption and Authentication

Information security

Rootkit

Exploits

Sensors, Security Lighting and Natural Trees

Physical Security Barriers

Secret-key Encryption

Symmetric encryption

No Identity

Anonymity

Coded Messages

Cryptography

Witness Protection

Pseudo identity

It is a three dimensional interactive computer generated environment that incorporates a first person perspective

virtual reality

AIs have the capacity to perform better than the world best experts at many tasks already and are making the world healthier

Performance

Determining customer behavior and preferences.

Prediction

Which of the following is not true about blogs?

Communicate with one another through e-messaging services that include video

The short text messages in Twitter are called

tweets

It is a Website that contains an online personal journal with reflections, comments, and often hyperlinks provided by the writer

blog

It can cause harm by failing to uphold standards of accuracy.

misrepresentations

Humans are not perfect; they are emotional, biased, easily manipulated and easily bored beings. Machines, however, don‘t have any of these problems.

Safety

It has been linked to depression, self-injurious behaviors, sleep disturbances, increased alcohol and tobacco use, and obesity

internet addiction

Which statement is true about Artificial Intelligence?

 

I. Artificial intelligence studies concentrate on a limited number of areas

II. Artificial intelligence is bounded to the potential of solving real life problems

Both Statements are True

Which of the following is a purpose of a social networking web site?

I. Breakdown the barriers of distance and time

 II. Bridge cultural differences

III. Create an online community

IV. Social Interaction

All of the Above

As the social network grows, it tends to lose the nuances of a local system. So in order to maintain the qualities of network properties, one must take note of the size.

True

The human errors in coding can be sometimes referred to as

bugs

It is a mediation of interaction through an electronic medium between humans and humans as well as between humans and machines

virtualization

It is the harassment, torment, humiliation, or threatening of one minor by another minor or group of minors via the Internet or cell phone

Cyberbullying

Its goal is to create a buzz about a product or idea that spreads wide and fast

viral marketing

Since morality is culturally based, individuals are bound to live within the guidelines the society lives with.

True

Republic Act No. 8293 is also known as the

Intellectual

It enables an individual to capture life's best moments with thier phone’s camera or any other camera, and convert them into works of art.

instagram

It is a messaging social platform that enables a user to chat with friends by using pictures

snapchat

Human Nature can result to a bias environment that AIs might learn from.

True

It is the data left behind by users of electronic media

sleep deprivation

It is threatening behavior or unwanted advances directed at an adult using the Internet or other forms of online and electronic communications

Cyberstalking

AIs are software programs that are vulnerable to attack just like all software

True

An AI can achieve its goal without going through consequences

True

AIs are able to automating parts of people‘s jobs and it wont affect the employment rate in a company

False

The data that the AI technology is using to train and learn mostly coveres all the aspect of human behavior

False

4 comments:

  1. Question 1
    Correct
    Mark 1.00 out of 1.00
    Question 2
    Correct
    Mark 1.00 out of 1.00
    Intellectual objects characteristics that are a product or manifestation or expressions of ideas such as literary/ creative works and
    inventions.
    a. No scarcity
    b. Legal claim
    c. Non-exclusionary
    d. Non-tangible
    Your answer is correct.
    A type of Penetrration attack where an insiders are a major source of computer crimes because they do not need a great deal of
    knowledge about the victim computer system. Insiders are not necessarily employees; they can also be consultants and contractors.
    a. Criminal Groups
    b. Hackers
    c. Hacktivists and Cyberterrorists
    d. Insider Threat
    Your answer is correct.
    Question 3
    Correct
    Mark 1.00 out of 1.00
    Question 4
    Correct
    Mark 1.00 out of 1.00
    Question 5
    Correct
    Mark 1.00 out of 1.00
    It is a string of usually six or more to verify a user to an information system facility, usually digital system.
    a. Information security
    b. Passwords
    c. Physical security
    d. Firewalls
    Your answer is correct.
    A set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge.
    a. Distributed denial-of-service attack (DDoS)
    b. Phishing
    c. Rootkit
    d. E-mail spam
    Your answer is correct.
    A process whereby the system gathers and builds up information about the user to assure that the user is genuine.
    a. Asymmetric encryption
    b. Symmetric encryption
    c. Authentication
    d. Passwords
    Your answer is correct.
    Question 6
    Incorrect
    Mark 0.00 out of 1.00
    Question 7
    Correct
    Mark 1.00 out of 1.00
    Question 8
    Correct
    Mark 1.00 out of 1.00
    It is hardware or software used to isolate the sensitive portions of an information system facility from the outside world and limit the
    potential damage that can be done by a malicious intruder.
    a. Physical security
    b. Passwords
    c. Firewalls
    d. Information security
    Your answer is incorrect.
    Are motivated by the potential for monetary gain and hack into corporate computers to steal, often by transferring money from one
    account to another to another.
    a. Insider Threat
    b. Hackers
    c. Hacktivism
    d. Cybercriminals
    Your answer is correct.
    The access to the whole or any part of a computer system without right.
    a. Illegal Access
    b. Data Interference
    c. System Interference
    d. Illegal Interception
    Your answer is correct.
    Question 9
    Correct
    Mark 1.00 out of 1.00
    Question 10
    Correct
    Mark 1.00 out of 1.00
    Question 11
    Incorrect
    Mark 0.00 out of 1.00
    A category of Cybercrime using cybertechnology to gain unauthorized access.
    a. Cyberpiracy
    b. Cybervandalism
    c. Cybertrespass
    d. Computer crime
    Your answer is correct.
    A method that protects the communications channel from sniffers — programs written for and installed on the communication
    channels to eavesdrop on network traffic, examining all traffic on selected network segments.
    a. Cryptography
    b. Firewalls
    c. Passwords
    d. Encryption
    Your answer is correct.
    Anonymous servers where identifying information is not forwarded in packet headers.
    a. Pseudonymous Servers
    b. Full Anonymity Servers
    c. Anonymity
    d. Pseudo identity
    Your answer is incorrect.
    Question 12
    Correct
    Mark 1.00 out of 1.00
    Question 13
    Correct
    Mark 1.00 out of 1.00
    Question 14
    Correct
    Mark 1.00 out of 1.00
    A combination of the words hacking and activism, is hacking to achieve a political or social goal.
    a. Insider Threat
    b. Hackers
    c. Hacktivism
    d. Criminal Groups
    Your answer is correct.
    It is concerned with securing computer networks—i.e., from privately owned computer networks to the Internet itself — against
    various kinds of attacks.
    a. Network Security
    b. Symmetric encryption
    c. Asymmetric encryption
    d. Authentication
    Your answer is correct.
    The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data
    message, without right, including the introduction or transmission of viruses.
    a. System Interference
    b. Illegal Access
    c. Illegal Interception
    d. Data Interference
    Your answer is correct.

    ReplyDelete
    Replies
    1. Question 15
      Correct
      Mark 1.00 out of 1.00
      Question 16
      Correct
      Mark 1.00 out of 1.00
      Question 17
      Correct
      Mark 1.00 out of 1.00
      The acquisition of a domain name on the Internet in bad faith or with the intent to profit, mislead, destroy one’s reputation or deprive
      others from registering the same domain name.
      a. Cybersquatting
      b. Misuse of Devices
      c. Illegal Access
      d. System Interference
      Your answer is correct.
      Intellectual objects characteristics that is an act or instance of excluding; the state of being excluded.
      a. Non-exclusionary
      b. Non-tangible
      c. Legal claim
      d. No scarcity
      Your answer is correct.
      Defined as the state of being nameless, having no identity.
      a. Untraceable identity
      b. Anonymity
      c. Pseudo identity
      d. Pseudonymous
      Your answer is correct.
      Question 18
      Correct
      Mark 1.00 out of 1.00
      Question 19
      Correct
      Mark 1.00 out of 1.00
      Question 20
      Correct
      Mark 1.00 out of 1.00
      An individual is identified by a certain pseudonym, code, or number; like that of a writer.
      a. Anonymity
      b. Pseudo identity
      c. Pseudonymous
      d. Untraceable identity
      Your answer is correct.
      A set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge.
      a. Rootkit
      b. E-mail spam
      c. Distributed denial-of-service attack (DDoS)
      d. Phishing
      Your answer is correct.
      Broadly describes tangible things such as ideas, inventions, technologies, artworks, music and literature, and others that one can claim
      ownership to.
      a. Trade Marks
      b. Intellectual Property
      c. Patent
      d. Intellectual Property
      Your answer is correct.
      Question 21
      Incorrect
      Mark 0.00 out of 1.00
      Question 22
      Correct
      Mark 1.00 out of 1.00
      The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting,
      transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic
      data message, without right or authority, including the introduction or transmission of viruses.
      a. Illegal Access
      b. Illegal Interception
      c. Data Interference
      d. System Interference
      Your answer is incorrect.
      A large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their
      owners.
      a. Worm
      b. Viruses
      c. Botnet
      d. Trojan horse
      Your answer is correct.
      Question 23
      Correct
      Mark 1.00 out of 1.00
      Question 24
      Incorrect
      Mark 0.00 out of 1.00
      Question 25
      Correct
      Mark 1.00 out of 1.00
      Intellectual objects characteristics that defines that one cannot own an idea in the same sense that one can own a physical object;
      ideas themselves are not the kinds of things for which governments are willing to grant ownership rights to individuals.
      a. Non-tangible
      b. No scarcity
      c. Non-exclusionary
      d. Legal claim
      Your answer is correct.
      They penetrate a computer system for a number of reasons and uses a variety of techniques. Using the skills they have, they download
      attack scripts and protocols from the Internet and launch them against victim sites.
      a. Hacktivism
      b. Cybercriminals
      c. Insider Threat
      d. Hackers
      Your answer is incorrect.
      The science of writing and reading coded messages, forms the basis for all secure transmission.
      a. Cryptography
      b. Encryption
      c. Passwords
      d. Firewalls
      Your answer is correct.
      Question 26
      Correct
      Mark 1.00 out of 1.00
      Question 27
      Correct
      Mark 1.00 out of 1.00
      Question 28
      Correct
      Mark 1.00 out of 1.00
      The exclusive right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the
      work.
      a. Patent
      b. Intellectual Property
      c. Trade Marks
      d. Copyright
      Your answer is correct.
      This type of attacks are for mundane reasons that may involve business, social or personal issues.
      a. The Hacker’s Ethics
      b. Vendetta
      c. Hacktivism
      d. Joke/Hoax
      Your answer is correct.
      A program in which malicious code is hidden inside a seemingly harmless program.
      a. Worm
      b. Trojan horse
      c. Botnet
      d. Viruses
      Your answer is correct.

      Delete
    2. Question 29
      Correct
      Mark 1.00 out of 1.00
      Question 30
      Correct
      Mark 1.00 out of 1.00
      Question 31
      Correct
      Mark 1.00 out of 1.00
      There are many causes that lead to political activism, but all these causes are
      grouped under one burner and it is called _______.
      a. Hacktivism
      b. The Hacker’s Ethics
      c. Joke/Hoax
      d. Vendetta
      Your answer is correct.
      It involves prevention of access to information by encryption, authentication, and other means.
      a. Physical security
      b. Pseudonymous Servers
      c. Information security
      d. Full Anonymity Servers
      Your answer is correct.
      Intellectual objects characteristics that can be easily reproduced.
      a. No scarcity
      b. Legal claim
      c. Non-exclusionary
      d. Non-tangible
      Your answer is correct.
      Question 32
      Correct
      Mark 1.00 out of 1.00
      Question 33
      Correct
      Mark 1.00 out of 1.00
      Question 34
      Correct
      Mark 1.00 out of 1.00
      Anonymous servers where it puts pseudonym in forwarded packet headers, keeping the real identity behind a pseudonym, but being
      able to receive and forward all packets sent to the pseudonym to the real server.
      a. Full Anonymity Servers
      b. Pseudonymous Servers
      c. Anonymity
      d. Pseudo identity
      Your answer is correct.
      Is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
      a. Rootkit
      b. Phishing
      c. Distributed denial-of-service attack (DDoS)
      d. E-mail spam
      Your answer is correct.
      A piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually
      undesirable manner.
      a. Viruses
      b. Worm
      c. Trojan horse
      d. Botnet
      Your answer is correct.
      Question 35
      Correct
      Mark 1.00 out of 1.00
      Question 36
      Correct
      Mark 1.00 out of 1.00
      Question 37
      Correct
      Mark 1.00 out of 1.00
      Unlike the copyright that protects expressions, _________ protect inventions or discoveries.
      a. Trade Marks
      b. Patent
      c. Intellectual Property
      d. Copyright
      Your answer is correct.
      Often referred to as the secret-key encryption, it uses a common key and the same cryptographic algorithm to scramble and
      unscramble the message.
      a. Passwords
      b. Firewalls
      c. Asymmetric encryption
      d. Symmetric encryption
      Your answer is correct.
      This is a collection of motives that make up the hacker character. If any ofthese beliefs is violated, a hacker will have a motive.
      a. Hacktivism
      b. Vendetta
      c. Joke/Hoax
      d. The Hacker’s Ethics
      Your answer is correct.
      Question 38
      Correct
      Mark 1.00 out of 1.00
      Question 39
      Correct
      Mark 1.00 out of 1.00
      The use, production, sale, procurement, importation, distribution, or otherwise making available, without right.
      a. Illegal Access
      b. System Interference
      c. Illegal Interception
      d. Misuse of Devices
      Your answer is correct.
      A crime like any other crime, except that in this case the illegal act must involve a computer system either as an object of a crime, an
      instrument used to commit a crime, or a repository of evidence related to a crime.
      a. Cybersquatting
      b. System Interference
      c. Misuse of Devices
      d. Computer crime
      Your answer is correct.
      Question 40
      Correct
      Mark 1.00 out of 1.00
      Question 41
      Correct
      Mark 1.00 out of 1.00
      Question 42
      Correct
      Mark 1.00 out of 1.00
      The interception made by technical means without right of any non-public transmission of computer data to, from, or within a
      computer system includingelectromagnetic emissions from a computer system carrying such computer data.
      a. Illegal Access
      b. Illegal Interception
      c. Data Interference
      d. System Interference
      Your answer is correct.
      It involves the prevention of access to physical facilitates like computer systems.
      a. Pseudonymous Servers
      b. Physical security
      c. Full Anonymity Servers
      d. Information security
      Your answer is correct.
      One in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data
      and other small tasks.
      a. Rootkit
      b. E-mail spam
      c. Phishing
      d. Distributed denial-of-service attack (DDoS)
      Your answer is correct.

      Delete
    3. Question 43
      Correct
      Mark 1.00 out of 1.00
      Question 44
      Incorrect
      Mark 0.00 out of 1.00
      Question 45
      Incorrect
      Mark 0.00 out of 1.00
      A harmful program that resides in the active memory of the computer and duplicates itself.
      a. Viruses
      b. Worm
      c. Botnet
      d. Trojan horse
      Your answer is correct.
      A category of Cybercrime using cyber technology in unauthorized ways
      a. Cybervandalism
      b. Cyberpiracy
      c. Cybertrespass
      d. Computer crime
      Your answer is incorrect.
      A Social and Ethical Consequences that may lead to individual reclusion and increasing isolation.
      a. Psychological Effects
      b. Trust
      c. Moral decay
      d. Loss of privacy
      Your answer is incorrect.
      Question 46
      Incorrect
      Mark 0.00 out of 1.00
      Question 47
      Correct
      Mark 1.00 out of 1.00
      Question 48
      Correct
      Mark 1.00 out of 1.00
      A category of Cybercrime using cyber technology to unleash one or more programs.
      a. Cyberpiracy
      b. Cyber vandalism
      c. Computer crime
      d. Cybertrespass
      Your answer is incorrect.
      It uses two different keys, a public key known by all and a private key known by only the sender and the receiver. Both the sender and
      the receiver each have a pair of these keys, one public and one private. It is commonly known as public-key encryption.
      a. Symmetric encryption
      b. Asymmetric encryption
      c. Passwords
      d. Firewalls
      Your answer is correct.
      It is not only about obtaining information; it is also about instilling fear and doubt and compromising the integrity of the data, which
      leads to extortion.
      a. Terrorism/Extortion
      b. Hacktivism
      c. Joke/Hoax
      d. The Hacker’s Ethics
      Your answer is correct.
      Question 49
      Correct
      Mark 1.00 out of 1.00
      Question 50
      Correct
      Mark 1.00 out of 1.00
      Are warnings that are actually scare alerts started by one or more malicious persons and are passed on by innocent users who think
      that they are helping the community by spreading the warning.
      a. Joke/Hoax
      b. Hacktivism
      c. Vendetta
      d. The Hacker’s Ethics
      Your answer is correct.
      This are driven by the selfishness of individuals who are not satisfied with what they have and are always wanting more, mostly
      financially.
      a. Terrorism/Extortion
      b. Personal Gain/Fame/Fun
      c. The Hacker’s Ethics
      d. Joke/Hoax
      Your answer is correct.

      Delete