KKday Singapore Summer Sale is here! ☀️ Plan your unforgettable family trip with KKday and enjoy up to 50% OFF ✨ kid-friendly activities and attractions from now till 12 August 2022. Singapore has many interesting and fun attractions for you and your little ones to have a good time together! The Singapore Zoo, Singapore Night Safari, River Wonders, Singapore Jurong Bird Park and Forest Play on Sentosa Island are all awaiting your arrival! ? Plan your journey ahead and book your tickets now ✈️. Click here to know more!
 

Social and Professional Issues

Social and Professional Issues
Pq1-pq2-Pxam
Mq1-Mq2-Mxam
Fq1-Fq2-Fxam

The course aims to provide an in-depth understanding and analysis of the importance of ethics as it applies to the use of Information Technology. Topics include professional ethics in computing, computer and internet crime, privacy, intellectual property and ethics of IT organizations.


Question text

As the social network grows, it tends to lose the nuances of a local system. So in order to maintain the qualities of network properties, one must take note of the size.

Select one:
 

Question text

It enables an individual to capture life's best moments with thier phone’s camera or any other camera, and convert them into works of art.

Question text

It is threatening behavior or unwanted advances directed at an adult using the Internet or other forms of online and electronic communications

Select one:

Question text

Which of the following is a purpose of a social networking web site?
I. Breakdown the barriers of distance and time
II. Bridge cultural differences
III. Create an online community
IV. Social Interaction

Select one:

Question text

It is the harassment, torment, humiliation, or threatening of one minor by another minor or group of minors via the Internet or cell phone

Select one:

Question text

It has been linked to depression, self-injurious behaviors, sleep disturbances, increased alcohol and tobacco use, and obesity

Question text

The short text messages in Twitter are called 

Question text

It is a messaging social platform that enables a user to chat with friends by using pictures

Question text

Its goal is to create a buzz about a product or idea that spreads wide and fast

Question text

It is the data left behind by users of electronic media

Question text

Human Nature can result to a bias environment that AIs might learn from.

Select one:
 

Question text

AIs are software programs that are vulnerable to attack just like all software

Select one:
 

Question text

Which statement is true about Artificial Intelligence?
I. Artificial intelligence studies concentrate on a limited number of areas
II. Artificial intelligence is bounded to the potential of solving real life problems

Select one:

Question text

 The human errors in coding can be sometimes referred to as 

Question text

AIs are able to automating parts of people‘s jobs and it wont affect the employment rate in a company

Select one:
 

Question text

Determining customer behavior and preferences.

Select one:

Question text

An AI can achieve its goal without going through consequences

Select one:
 

Question text

AIs have the capacity to perform better than the world best experts at many tasks already and are making the world healthier

Select one:

Question text

Humans are not perfect; they are emotional, biased, easily manipulated and easily bored beings. Machines, however, don‘t have any of these problems.

Select one:

Question text

The data that the AI technology is using to train and learn mostly coveres all the aspect of human behavior

Select one:
 

Question text

Match the words to the given choices:

computer programs

 

reckless alteration

 

shapes and colors

 

unauthorized ways

 

reckless hindering

 

creative works

 

reclusion and isolation

 

inventions

 

adaptations

 

unauthorized access

 

Question text

Match the following words to the given choices

Preventing of unauthorized disclosure of information

 

Encryption and Authentication

 

Digital Signature

 

Witness Protection

 

Sensors, Security Lighting and Natural Trees

 

Coded Messages

 

Secret-key Encryption

 

E-mail Fraud

 

No Identity

 

Rootkit

 

Question text

It is a system created by and for human beings usually in public deliberations like a council of elders or representatives in national legislatures.


Select one:

Question text

Legal acts conform to what an individual believes to be the right thing to do.


Select one:
 

Question text

For formal education to be effective in teaching and enforcing the pillars of professionalism it must be _________


Select one:

Question text

The two kinds of rules of conduct; Directives which involves the macroethical level and Social policies that involves the microethical level.


Select one:
 

Question text

Which is true about Morality?


Select one:

Question text

It is when ethical reasoning remained the same even with the evolution of ethical discipline.

Select one:

Question text

The moral concept of whistle-blowing is good when the activities involved pose serious danger and harm to human life

Select one:
 

Question text

With the relationship between the provider and receiver of the service/product present, a power play may sometimes be in favor of the provider not the receiver

Select one:
 

Question text

It is the core of human dignity and autonomy

Question text

It comes from an enforceable part of the moral code that differs with each society and culture.

Question text

Individuals whose data are mined can become identified with or linked to certain newly created groups.

Select one:
 

Question text

Which of the following does not describe the word ethics?

Select one:

Question text

If the codes of conduct focuses on rules and guidelines, autonomy focuses on 

Question text

It is the application of data mining techniques to discover patterns from the Web

Question text

The decision-making process is developed that individuals tend to execute automatically without thinking about the steps that go through. The step that involves others in brainstorming is __________.

Select one:

Question text

A provider of service should first inquire the customer before an action of service should be done. This statement shows _______.


Select one:

Question text

This is another term for large commercial databases

Question text

It takes part in building character traits in people.

Question text

In order for professions and trades to uphold essential requirements, integrity, commitment, and professional codes of conduct must be met.

Select one:
 

Question text

Ethical decision making is the process of making a decision which may result in one or more moral conflicts while ethical reasoning is when ethical principles is integrated in the reasoning process

Select one:
 

Question text

It is when an action is right if the consequences of that action are favorable to all except the actor

Select one:

Question text

It involves the indirect gathering of personal information through an analysis of implicit patterns discoverable in data.


Select one:

Question text

This theory states that ethical statements cannot be proven and are really only statements about how someone feels.

Question text

Even with long years of experience, skills based on shallow knowledge of the field could be damaging to the profession

Select one:
 

Question text

Determinative Laws fixes ways of acting in accordance with natural law.
Select one:
 

Question text

The danger with information matching is that everyone knows who will use the built profiles from the matched information and where it will be used

Select one:
 

Question text

Professional Codes of Conduct addresses the following except:


Select one:

Question text

It is an interpretation is done based on a system that uses a process of argumentation consisting of a mixture of inductions and deductions

Question text

The primary purpose of professional code of ethics is to promote the public image of the profession by specifying and enforcing the ethical behavior expected from its members

Select one:
 

Question text

Harassment is a form of discrimination and it mainly involves making decisions that negatively affect an individual.

Select one:
 

Question text

A man who did something to help others but it is against his will is not considered good. This is an example of _________.

Select one:

Question text

Ethics is defined as a field of inquiry whose subject is human actions and these human actions are called .

Question text

One of the contributing factors in the cause of violations is when consumers lack the knowledge of how what they consider a little bit of information can turn into a big invasion of privacy

Select one:
 

Question text

Rules that guides individual actions such as not taking the possessions of others are called .

Question text

Which is not true about the word profession?


Select one:

Question text

It is an unwritten law that holds our rights of self-preservation

Question text

As humans tend to follow a life script, an individual's reaction to certain rules of conduct is always intentional.


Select one:
 

Question text

Morality is enforced by the authority that enacted them and security forces

Select one:
 

Question text

Under what condition can data collections become an invasion of privacy?


Select one:

Question text

There are different strands of information to be protected, which does not belong to a group:


Select one:

Question text

Listening in to other people's conversations is an example of what privacy violation?


Select one:

Question text

According to this theory actions are judged according on the results. For example, a person kills one person to prevent the deaths of others.


Select one:

Question text

It is when laws are used to resolve interpersonal conflicts in a society.

Select one:

Question text

Which is true about Licensing Authorities.

I.  Before a license is issued an individual must be tested.

II. Violation of the rules from the licensing authority may lead to recalling of the license

III. After the test, the licensing authority may deny issuing the license


Select one:

Question text

It is an invasion of privacy by wrongful entry, seizing, or acquiring possession of the property of others

Question text

It is developed over a period of time based on either the religion or culture of the indigenous people in the area.


Select one:

Question text

These are guidelines that state the dos and dont's of a professional that protects individual members and their image.


Select one:

Question text

Showing an act of kindness in exchange to an equal act of kindness is an example what culture-free moral codes?

Question text

It is a human cognitive process of looking for ways to generate or affirm a proposition

Question text

It is an act of seeking public attention to what is considered an illegal or mismanaged act

Question text

If the codes of conduct focuses on rules and guidelines, autonomy focuses on 

Question text

It is the core of human dignity and autonomy

Question text

Individuals whose data are mined cannot be identified with or linked to certain newly created groups.

Select one:
 

Question text

It is an invasion of privacy by wrongful entry, seizing, or acquiring possession of the property of others

Question text

Under what condition can data collections become an invasion of privacy?


Select one:

Question text

One of the contributing factors in the cause of violations is when consumers lack the ethics of how what they consider a little bit of information can turn into a big invasion of privacy

Select one:
 

Question text

It involves the indirect gathering of personal information through an analysis of implicit patterns discoverable in data.


Select one:

Question text

It is the application of data mining techniques to discover patterns from the Web

Question text

There are different strands of information to be protected, which does not belong to a group:


Select one:

Question text

The danger with information matching is that no one knows who will use the built profiles from the matched information and where it will be used

Select one:
 

Question text

Morality is enforced by the authority that enacted them and security forces

Select one:
 

Question text

As morality is a survival script humans follow daily, it became a general trait that is flexible with different backgrounds.


Select one:
 

Question text

Impartial moral rules are ideally designed to apply equitably to all participants in the system.


Select one:
 

Question text

As humans tend to follow a life script, an individual's reaction to certain rules of conduct is always intentional.


Select one:
 

Question text

Since morality is culturally based, individuals are bound to live within the guidelines the society lives with.

Select one:
 

Question text

Legal acts conform to what an individual believes to be the right thing to do.


Select one:
 

Question text

The two kinds of rules of conduct; Directives which involves the macroethical level and Social policies that involves the microethical level.


Select one:
 

Question text

Time and place influence the context of morality.


Select one:
 

Question text

Determinative Laws fixes ways of acting in accordance with natural law.
Select one:
 

Question text

Believing in human life implies on the belief that life has a purpose and this applies to everyone, whether one believes in a superior deity or an atheist.


Select one:
 

Question text

These are set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge

Question text

Which is not true about an Insider Threat.


Select one:

Question text

One is not known by any name including pseudo names.

Question text

The alteration of information may be caused by the disclosure of personal information

Select one:
 

Question text

They use hacking to achieve a political or social goal.

Question text

Which of the following does not belong to the group?


Select one:

Question text

Which does not belong to the group:


Select one:

Question text

It includes the integrity, confidentiality, and availability of information at the servers

Question text

Individuals found guilty of child pornography violated _____________.

Select one:

Question text

A patent must not be obvious to the general public

Select one:
 

Question text

Which does not belong to the group?


Select one:

Question text

It is hardware or software used to isolate the sensitive portions of an information system facility from the outside world and limit the potential damage that can be done by a malicious intruder

Select one:
 

Question text

A patent claim can be cancelled if it adheres to the public order.

Select one:
 

Question text

Which among the following has the longest imprisonment charge

Select one:

Question text

It is the acquisition of a domain name on the Internet in bad faith or with the intent to profit, mislead, destroy one’s reputation or deprive others from registering the same domain name.


Select one:

Question text

It is a type of offense when an individual accesses the whole or part of a computer system without permission or right

Question text

Worms are programs where malicious code is hidden inside a seemingly harmless program

Select one:
 

Question text

Which is not a characteristic of an intellectual object:

Select one:

Question text

They launch computer-based attacks against other computers or networks in an attempt to intimidate or coerce a government in order to advance certain political or social objectives

Question text

Penetration can be done with or without the use of the internet

Select one:
 

Question text

If intimidation and fear of reprisals is present,  is good because useful information may be revealed.

Question text

Which among the following has the shortest imprisonment charge.


Select one:

Question text

It is a right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work.

Question text

Match the words to the given choices:

reckless hindering

 

reckless alteration

 

unauthorized access

 

creative works

 

unauthorized ways

 

shapes and colors

 

adaptations

 

reclusion and isolation

 

computer programs

 

inventions

 

Question text

All of the statements are true about the first requirement of a Patent Work except:


Select one:

Question text

Shapes cannot be registered as trademarks if the shapes are not necessitated by technical factors

Select one:
 

Question text

This penalty will cause an accused to be imprisoned for two to four decades.

Select one:

Question text

Republic Act No. 8293 is also known as the .

Question text

One of the advantages of anonymity is that disputes could be solved if information from individuals’ party to these disputes can reveal the necessary information

Select one:
 

Question text

Which does not belong to the group:


Select one:

Question text

The increasing level of familiarity in human actions, may it be good or bad is called _______.


Select one:

Question text

A set of legal rights which result from intellectual activity in the industrial, scientific, literary, and artistic fields is called .

Question text

When two persons have jointly made an invention, the right to the patent shall belong to _______.


Select one:

Question text

Frauds are sometimes a form of collaboration between an employee and a non-employee

Select one:
 

Question text

Both the sender and the receiver each have a pair of keys, one public and one private.

Question text

Maintaining the status quo by preventing the unauthorized modification of files is an example of .

Question text

Dramatizations, translations, and adaptations of musicals are example of .

Question text

The owner of a patent has no right to prevent third parties from using the patented product if it has been put on the market by the owner of the product

Select one:
 

Question text

These individuals test the limitations of information systems out of intellectual curiosity

Select one:

Question text

Instilling fear and doubt and compromising the integrity of the data can lead to