Beruflich Dokumente
Kultur Dokumente
UNIVERSITY VISION:
A globally recognized institution of higher learning that develops competent and
morally upright citizens who are active participants in nation building and responsive to the
challenges of the 21st century.
UNIVERSITY MISSION:
Batangas State University is committed to the holistic development of productive
citizens by providing a conducive learning environment for the generation, dissemination, and
utilization of knowledge through innovative education, multidisciplinary research
collaborations, and community partnership that would nurture the spirit of nationhood and
help fuel national economy for sustainable development.
GENERAL DIRECTIONS: Comprehend and analyse carefully each item of the test. Adhere to
the rules of honesty to be guided accordingly. Any form of dishonesty such as cheating, copying
and talking to seatmates during the test will automatically invalidate your answers.
ERASURE/OVERWRITING will invalidate your answer.
1. Is concerned with the numerous ethical questions that managers must confront as part of their
daily business decision making.
A. Business Ethics C. Business Process
B. Business Function D. Business Security
2. Is caused by the criminal or irresponsible actions of individuals who are taking advantage of
the widespread use and vulnerability of computers and the Internet and other networks.
A. Computer Crime C. Cyber-Theft
B. Cyber Crime D. Cyberterrorism
3. Is the obsessive use of computers or the unauthorized access and use of networked computer
systems.
A. Cracking C. Cyber-Theft
B. Hacking D. Cyberterrorism
4. A program that unknown to the user, contains instructions that exploit a known vulnerability
in some software.
A. Back Doors C. Denial of Service
B. Computer Crime D. Trojan Horse
5. Is the leveraging of an organizations or government’s computer and information, particularly
via the Internet, to cause physical, real-world harm or severe disruption of infrastructure.
A. Computer Crime C. Cyber-Theft
B. Cyber Crime D. Cyberterrorism
6. Using the Internet to display or transmit trade secrets.
A. Hacking C. Moonlighting
B. Leisure Use of the Internet D. Transmission of Confidential Data.
7. Unauthorized copying of software.
A. Software Cracking C. Software Piracy
Page 1 of 4