0% found this document useful (0 votes)
117 views1 page

Batangas State University Jplpc-Malvar

This document appears to be a midterm exam for a course called System Management and Administration. It provides information about the exam such as the name of the student, course/section, date, and score. It also includes the vision and mission statements of the Batangas State University in the Philippines where the exam is being administered. The exam contains multiple choice and true/false questions testing knowledge of topics like business ethics, computer crimes, hacking, and software piracy. Test takers are instructed to carefully comprehend each item and adhere to honesty by not cheating or copying answers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
117 views1 page

Batangas State University Jplpc-Malvar

This document appears to be a midterm exam for a course called System Management and Administration. It provides information about the exam such as the name of the student, course/section, date, and score. It also includes the vision and mission statements of the Batangas State University in the Philippines where the exam is being administered. The exam contains multiple choice and true/false questions testing knowledge of topics like business ethics, computer crimes, hacking, and software piracy. Test takers are instructed to carefully comprehend each item and adhere to honesty by not cheating or copying answers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Republic of the Philippines

BATANGAS STATE UNIVERSITY JPLPC-Malvar


Malvar, Batangas
Tel. Nos.: (043) 778-2170/ (043) 406-0830 loc.___
Website Address: http://www.batstate-u.edu.ph

Midterm Examination in IT 311


System Management and Administration
SET A_

NAME: DATE: SCORE: RATING:


COURSE / SECTION: SR CODE: ______
80 %

UNIVERSITY VISION:
A globally recognized institution of higher learning that develops competent and
morally upright citizens who are active participants in nation building and responsive to the
challenges of the 21st century.
UNIVERSITY MISSION:
Batangas State University is committed to the holistic development of productive
citizens by providing a conducive learning environment for the generation, dissemination, and
utilization of knowledge through innovative education, multidisciplinary research
collaborations, and community partnership that would nurture the spirit of nationhood and
help fuel national economy for sustainable development.

GENERAL DIRECTIONS: Comprehend and analyse carefully each item of the test. Adhere to
the rules of honesty to be guided accordingly. Any form of dishonesty such as cheating, copying
and talking to seatmates during the test will automatically invalidate your answers.
ERASURE/OVERWRITING will invalidate your answer.

I. Multiple Choice: Encircle the letter of the correct answer (25pts)

1. Is concerned with the numerous ethical questions that managers must confront as part of their
daily business decision making.
A. Business Ethics C. Business Process
B. Business Function D. Business Security
2. Is caused by the criminal or irresponsible actions of individuals who are taking advantage of
the widespread use and vulnerability of computers and the Internet and other networks.
A. Computer Crime C. Cyber-Theft
B. Cyber Crime D. Cyberterrorism
3. Is the obsessive use of computers or the unauthorized access and use of networked computer
systems.
A. Cracking C. Cyber-Theft
B. Hacking D. Cyberterrorism
4. A program that unknown to the user, contains instructions that exploit a known vulnerability
in some software.
A. Back Doors C. Denial of Service
B. Computer Crime D. Trojan Horse
5. Is the leveraging of an organizations or government’s computer and information, particularly
via the Internet, to cause physical, real-world harm or severe disruption of infrastructure.
A. Computer Crime C. Cyber-Theft
B. Cyber Crime D. Cyberterrorism
6. Using the Internet to display or transmit trade secrets.
A. Hacking C. Moonlighting
B. Leisure Use of the Internet D. Transmission of Confidential Data.
7. Unauthorized copying of software.
A. Software Cracking C. Software Piracy

Page 1 of 4

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy