Sie sind auf Seite 1von 1

Republic of the Philippines

BATANGAS STATE UNIVERSITY JPLPC-Malvar


Malvar, Batangas
Tel. Nos.: (043) 778-2170/ (043) 406-0830 loc.___
Website Address: http://www.batstate-u.edu.ph

Midterm Examination in IT 311


System Management and Administration
SET A_

NAME: DATE: SCORE: RATING:


COURSE / SECTION: SR CODE: ______
80 %

UNIVERSITY VISION:
A globally recognized institution of higher learning that develops competent and
morally upright citizens who are active participants in nation building and responsive to the
challenges of the 21st century.
UNIVERSITY MISSION:
Batangas State University is committed to the holistic development of productive
citizens by providing a conducive learning environment for the generation, dissemination, and
utilization of knowledge through innovative education, multidisciplinary research
collaborations, and community partnership that would nurture the spirit of nationhood and
help fuel national economy for sustainable development.

GENERAL DIRECTIONS: Comprehend and analyse carefully each item of the test. Adhere to
the rules of honesty to be guided accordingly. Any form of dishonesty such as cheating, copying
and talking to seatmates during the test will automatically invalidate your answers.
ERASURE/OVERWRITING will invalidate your answer.

I. Multiple Choice: Encircle the letter of the correct answer (25pts)

1. Is concerned with the numerous ethical questions that managers must confront as part of their
daily business decision making.
A. Business Ethics C. Business Process
B. Business Function D. Business Security
2. Is caused by the criminal or irresponsible actions of individuals who are taking advantage of
the widespread use and vulnerability of computers and the Internet and other networks.
A. Computer Crime C. Cyber-Theft
B. Cyber Crime D. Cyberterrorism
3. Is the obsessive use of computers or the unauthorized access and use of networked computer
systems.
A. Cracking C. Cyber-Theft
B. Hacking D. Cyberterrorism
4. A program that unknown to the user, contains instructions that exploit a known vulnerability
in some software.
A. Back Doors C. Denial of Service
B. Computer Crime D. Trojan Horse
5. Is the leveraging of an organizations or government’s computer and information, particularly
via the Internet, to cause physical, real-world harm or severe disruption of infrastructure.
A. Computer Crime C. Cyber-Theft
B. Cyber Crime D. Cyberterrorism
6. Using the Internet to display or transmit trade secrets.
A. Hacking C. Moonlighting
B. Leisure Use of the Internet D. Transmission of Confidential Data.
7. Unauthorized copying of software.
A. Software Cracking C. Software Piracy

Page 1 of 4

Das könnte Ihnen auch gefallen