Vous êtes sur la page 1sur 3

SCORE /50

JOSE RIZAL UNIVERSITY

Name: Subject/Section:
I.

Day/Time: rofessor:

!"#$%N . C&'T"S

MATCHING TYPE: Choose the correct answer from the table above, write your answer in the answer sheet provided. f. private key encryption system g. click-stream data h. data quality i. freedom of information act ". use limitation k. privacy act l. security safeguards m. get data n. individual participation o. accountability p. childrens online privacy q. cryptography r. collaborative filtering s. demographic filtering t. post data u. European com. Directive of 1998 v. advance surveillance . public key encryption !. spamming y. rules-based

a. carnivore b. openness principle c. purpose specification d. collection limitation e. encryption 1.

#ersonal data should not be used for other than the specified purpose ithout the consent of the individual or by authority of la . $ %. Data principles should e!ist and a &data controller' should be identified. ( ). *imit the collection of personal data. +ll such data must be obtained by la ful and fair means ith the sub"ects consent and kno ledge. D ,. #ersonal data should be accurate- complete- current- and relevant to the purpose for hich they are used. . /. #ersonal data should be protected against unauthori0ed access- modificationor disclosure. * 1. +n individual should have the right to revie his2her data- to challenge the correctness of the data- and to have incorrect data changed. 3 4. 5he purpose for hich personal data is collected should be specified and that purpose should not be changed. 6 8. + &data controller' should be responsible for ensuring that the above principles are met. 7 9. 7ffers consumer recommendations based on the types of products purchased by other individuals ho bought the same product as another customer. 8 19. :s another for of personali0ation soft are that augments click-stream data and user-supplied data ith demographic information associated ith use ;ip codes to make product suggestions. < 11. #ersonali0ation soft are uses business rules tied to customer-provided preference information or online behavior to determine the most appropriate page vie s and product information to display. = 1%. :s the sending of copies of the same e-mail message to a large number of people in an attempt to cause those people to read a message they migh other ise choose not to receive. > 1). +n e-mail version of a telephone iretap. + 1,. #assed in 1911 and amended in 194,- provides the public ith the means to gain access to certain government records. :

Under:

MELJUN P. CORTES

1/3

1/.

*imits ho the ?< government collects- maintains- uses- and disseminates personal information. @ 11. 5his la states that eb sites that cater to children must offer comprehensive privacy policies on their sites- notify their parents or guardians about their data collection practices from children under 1) years old. # 14. :s an international organi0ation consisting of )9 members countries. :ts goal is to set policies and make agreements in areas here multilateral agreement is necessary to individual countries to make progress in a global economy. ? 18. ?ses a single key to both encode and decode messages. A 19. :s the process of converting an original electronic message into a form that can be understood by the intended recipients. E %9. :s the data entered into blank fields on an affiliated Beb pages hen a consumer signs up for a service. 5 II. IDENTIFICATION: :dentify the correct ans er of the follo ing statements. C1 pt.D
1. %. ). ,. /. 1. 4. 8. 9. 19. 11. 1%. 1). 1,. 1/. 11. 14. 18. 19. %9. Defined as a piece of information used in a business that represents something of economic value- is generally unkno n to public. :s a grant of a property right to the inventorCsD and is issued by the ?nited <tates #atent and 5rademark 7ffice C?<#57D. 7bscene speech and EEEE are t o types of speech that are particularly relevant to information technology. :s anything that enables a consumer to differentiate one companys products from anothers. :s the process of breaking something do n in order to understand itbuild a copy of it- or improve it. :s the gathering of legally obtainable information that ill help a company gain an advantage over its rivals. :s one of the most important rights for free people every here. :s data that reveals or is collected. :s a language translator that converts computer program statements e!pressed in a source language into machine language that the computer can e!ecute. :s the science of encoding messages so that only the sender and the intended receiver can understand them. :s slander is an oral defamatory statementG EEE is a ritten defamatory statement. + te!t file that a Beb site puts on your hard drive so that it can remember something about you at a later time. 8equire employees to not ork for any competitors for a period of timeperhaps one to t o years. 7ne potential solution to consumer privacy concerns hich shields users from sites that dont provide the level of privacy protection they desire. 6onsists of privacy over the medium of the :nternet. <peech that is merely annoying- critical- demeaning- or offensive en"oys protection under the Airst +mendment. @eystork-logging soft are do nloaded to users computer ithout consent- operates even if an infected computer is not connected to the :nternet. 8equires employees to refrain from revealing company trade secrets. 6hips placed in many devices to precisely locate users. :s term used to describe orks of mind that are distinct and that are &o ned' or created by a single entity.

5rade secret patent defamation trademark 8everse engineering 6ompetitive intelligence Areedm of e!p Fet data compiler cryptography libel cookies 3on-compete agreements #)p platform for prv pref :nternt privcy Defamation and hate spch spy are 3ondisclosure clause gps :ntellectual property

Under:

MELJUN P. CORTES

2/3

III. 1.

ESSAY: C/ pts.D Bhat does the term &intellectual property' encompass and companies so concerned about protecting itH hy are

%.

5he internet is the most effective communications technology eve ever had. :ts inevitable that its going to make it difficult to enforce copyright. Discuss.

Name: Subject/Section:
:. 1. %. ). ,. /. ::. 1. %. ). ,. /. Iatching 5ype 1. 4. 8. 9. 19. :dentification 1. 4. 8. 9. 19. 11. 1%. 1). 1,. 1/. 11. 1%. 1). 1,. 1/.

Day/Time: rofessor:
11. 14. 18. 19. %9.

Score:

11. 14. 18. 19. %9.

Under:

MELJUN P. CORTES

3/3