Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1) Mr. Ollitsac has received a very hateful and offensive e-mail from an office colleague. If Mr. Ollitsac were to use the e-mail to file

1) Mr. Ollitsac has received a very hateful and offensive e-mail from an office colleague. If Mr. Ollitsac were to use the e-mail to file a case. What Republic Act will be used?

a. R.A. 8484

b. R.A. 8792

c. R.A. 9995

d. R.A. 10175

2) A manager and supervisor are talking about the operations of the business on a phone office network. An office staff walked in and picked another phone on the same network. If the office staff records the conversation what is the punishable act?

a. Data Interference

b. Illegal Access

c. Illegal Interception

d. System Interference

3) Ms. Angela found an unsigned credit card and used it to buy a very expensive bag. What punishable act did she do?

a. R.A. 8484

b. R.A. 8792

c. R.A. 9995

d. R.A. 10175P

4) Which of the following are TRUE elements of libel? i. Purpose is to profit, mislead, destroy reputation ii. Deprive others from registering the same. iii. Publication of a charge iv. Identity of the person defamed

a. I and III

b. II and III

c. II and IV

d. III and IV

5) It refers to software programs and malware components developed to take over a computer's resources and use them for cryptocurrency mining without a user's explicit permission.

a. Illegal Interception

b.Cryptohacking

c. Cryptojacking

d. Cryptokiting

6) What type of cybercrime is described when there is acquisition of domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from the registering the same?

a. Computer-related forgery

b. Cyber-squatting

c. Computer-related fraud

d. Cybersex

7) Keyloggers are used to record computer user keystrokes to steal passwords and other sensitive information, what type of cybercrime is violated in using such program?

a. Data Interference

b. System Interference

c. Illegal Access

d. Misuse of Device

8) Which of the following statement/s is/are TRUE about the jurisdiction of RA 10175? i. Any violation committed by a Filipino national regardless of the place of commission. ii. Any of the elements was committed within the Philippines or committed with the use of any computer system wholly or partly situated in the country. iii. When by such commission any damage is caused to a natural or juridical person who, at the time the offense was committed, was in the Philippines. iv. The liability imposed on the juridical person shall be without prejudice to the criminal liability of the natural person who has committed the offense.

a. I only

b. I and II

c. I, II and III

d. I, II, III and IV

9) Which of the following offenses are not punishable under Section 5 of RA 10175? i. Child pornography ii. Online libel iii. Illegal Access iv. Data Interference

a. I only

b. I and II

c. I, II and III

d. I, II, III and IV

10) Martin had registered two domain names that contain words identical to Dream Works and he claimed that the said websites are used as educational websites that provides English language training but later he was selling the rights to Dream Works. Evidence presented in court showed that Martin never used the disputed domain names. The court then concluded that it was a cybersquatting case. Which of the following instances were committed that made the act punishable? i. The acquisition of a domain name over the internet in bad faith. ii. Purpose is to profit, mislead, destroy reputation, and deprive others from registering the same. iii. Acquired without right or with intellectual property interests in it. iv. Identical or in any way similar with the name of a person other than the registrant.*

a. I only

b. I and II

c. I, II and III

d. I, II, III and IV

11) Which of the follow information can be classified as a personal information?*

a. Your being a catholic

b. Your being a student of Saint Louis University.

c. Your SLU id number.

d. Your sexual preference.

12) Which of the following information can be classified as a sensitive personal information?*

a. Your name.

b. Your being a fan of BTS.

c. Your Age.

d. Your weight.

13) Carlo and Reyna are couples. Out of suspicion that Carlo is flirting with another girl, Reyna asked for the Facebook username and password of Carlo so that she can ascertain that Carlo has no other woman. Carlo refused to give his username and password to Reyna. Other than Carlo, Carlo's sister also knows his brother's Facebook username and password. Carlo's sister is Reyna' best friend. Reyna imposed that if Carlo still refuses to give her his Facebook credential, she would break up with him. Lawfully speaking, can Reyna imposed that Carlo give her his Facebook username and password?*

a. No, because Carlo still enjoys a right to privacy over his Facebook account even if they are a couple.

b. No, because they are not married yet so they are still entitled to privacy over their social media accounts.

c. Yes, because by going into a relationship with Reyna, Carlo waives his right to privacy over his Facebook account.

d. Yes, because it is the right of Reyna to ascertain that Carlo doesn't have any other woman.

14) Continuation from previous question. What if Carlo's sister gave Reyna Carlo's Facebook username and password without his consent? Can Carlo sue her sister for breach of privacy?*

a. No, because as a rule siblings are not allowed to sure each other.

b. No, because Carlo's sister doesn't know it's a crime to give to other people his brother's Facebook username and password.

c. Yes. Since Carlo did not give his consent to her sister to give to other people his facebook username and password, he still enjoys privacy over his account

d. None of the above.

15) It is the right to be indemnified for any damages sustained due to inaccurate, incomplete, outdated, false, unlawfully obtained, or unauthorized use of personal data.*

a. Right to Erasure or Blockings

b. Right to Damages

c. Right to Access

d. Right to Portability

16) It is the right to suspend, withdraw, or order the blocking, removal, or destruction of his or her personal information from the personal information controller's filing system.*

a. Right to Erasure or Blockings

b. Right to Damages

c. Right to Access

d. Right to Portability

17) Longzi is having a suspicion that his neighbour, Vaxia, is a drug dealer so he installed a cctv camera in his property facing the property of Vaxia so that he could potentially catch in the camera footage from the cctv any malicious and illegal acts by Vaxia. Is the privacy of Vaxia breached?*

a.Yes, Longzi's action constitutes a breach in privacy since by his act, Longzi is peeping inquisitively into Vaxia's property.

b. Yes, because Vaxia doesn't know that he is being monitored.

c. No, because Longzi is just being assertive and he put the cctv camera in his property.

d. No, because he has the right to do whatever he wants as long as he does it within the perimeter of his property.

18) Continuation from previous question. If Longzi catches Vaxia dealing drugs thru the footage in the cctv, can Longzi use the footage as evidence against Vaxia?

a. Yes, since it proves Longzi's suspicion that Vaxia is a drug dealer.

b. Yes, because the footage is caught in Longzi's cctv which is located within his property.

c. No. because the footage was illegally obtained.

d. No, because the setting of the video is within Vaxia's property.

19) _________, under exceptions to processing sensitive personal information, is waived when it is necessary to protect life and health of another.*

a. Privacy

b. Consent

c. Right

d. Information

20) Under the principle of transparency, the data subject must be knowledgeable about the following except:*

a. The kind of personal data collected.

b. How the personal data will be collected.

c. When the data will be collected.

d. Why the data will be collected.

22) Mary and Jane have a joint authorship for their book "Cooking 101". Mary passed away before Jane. The term for their copyright will end when?*

a. Lifetime of Mary + 50 years

b. Lifetime of Jane + 50 years

c. Lifetime of Jane + 25 years

d. 50 years from the date of the publication of their book

23) Which of the following is not plagiarism ?

a. Passing off the work of another as one's own.

b. Repeating an idea expressed by someone else, and not giving credit.

c. Quoting material categorized as "common works" without permission.

d. The intent and deliberate and conscious effort to steal another person's work.

24) Which of the following statements is not true to the specified Terms of Copyright Protection?*

a. Applied works of art are protected for 25 years from the date of making.

b. For broadcast, the work has protection for 20 years from the date the broadcast took place.

c. When it comes to Anonymous or Pseudonym works, if the creator remains unknown and the work is published, the work is protected for a lifetime, plus another 50 years after death.

d. Single work authors have protection for a lifetime, plus 50 years more after the author's death.

25) The following are true to the definition of Copyright except one.*

a. Copyright laws are particular with the rights that creators have over their literary works.

b. Copyright laws cover artistic works of creators.

c. The legal concept of copyright laws is that the creator is given rights to the work for an unlimited time period.

d. The creator has exclusive rights to his or her literary and artistic work.

26) In the Certificate of Copyright Registration and Deposit, which among the information are enlisted? i. Name of the copyright owner ii. Year of its first publication iii. In copies produced after the creator's death, the year of such death iv. Deposited Amount*

a. I, II, and III

b. I, III, and IV

c. II, III, and IV

d. I, II, and IV

27) What are the Copyrightable works on this list? i. Drawings ii. Idea iii. News Article iv. Periodicals

a. I, II, and III

b. I, III, and IV

c. II, III, and IV

d. I, II, and IV

28) Which of the following is/are true about Trademark? i. It is represented graphically. ii. It may include shapes and/or combination of colors. iii. It is capable of distinguishing the goods or services of one entity from those of the others.*

a. I and II only

b. I and III only

c. II and III only

d. I, II and III

29) A candidate in the election was using a famous international song by Lady Gaga as his campaign Jingle, which he changed the lyrics, was it a copyright infringement?*

a. No

b. Yes

c. The situation cannot be categorized under copyright law.

d. Insufficient information for it to be said as a copyright infringement.

28) Which of the following is NOT an economic right of the owner of a copyright?*

a. Right of Appropriation

b. Right to Public Display

c. Right to Rental

d. Right of Reproduction

30) The law on fair use was created to allow all of the following EXCEPT:*

a. Commentary

b. Derivative works

c. News reporting

d. Parody

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Modern Systems Analysis And Design

Authors: Joseph Valacich, Joey George

8th Edition

0134204921, 978-0134204925

Students also viewed these Law questions