30 Items Quiz - IT4R7
30 Items Quiz - IT4R7
30 Items Quiz - IT4R7
IT4R7
30 ITEMS QUIZ
1. What is the main point of Westin’s theory of privacy? a) Privacy is about total isolation.
b) Privacy is the control of access to one’s self or group.
c) Privacy allows emotional release.
d) Privacy is about making boundaries between the self and the outside world.
3. In Petronio’s Communication Privacy Management (CPM) theory, privacy management is seen as: a) Something that cannot be
controlled.
b) A communicative process involving negotiation and regulation.
c) A permanent boundary that doesn’t change.
d) A need to be anonymous at all times.
4. Which of the following is NOT one of the four states of privacy in Westin’s theory? a) Solitude
b) Intimacy
c) Exposure
d) Anonymity
5. Altman’s theory of privacy emphasizes the importance of: a) Emotional release from social interaction.
b) Flexibility and balance between social engagement and isolation.
c) Complete withdrawal from social life.
d) Limiting communication to a small, intimate group.
6. Which of the following best describes privacy rights? a) The right to keep all information secret.
b) The right to control access to one's body, personal spaces, and information.
c) The right to completely isolate oneself from society.
d) The right to share all information publicly.
8. What does the Fourth Amendment in the U.S. Constitution protect? a) Freedom of speech
b) Protection against unreasonable searches and seizures
c) The right to a fair trial
d) The right to bear arms
9. Which amendment implies privacy rights by protecting individuals from self-incrimination? a) First Amendment
b) Fifth Amendment
c) Ninth Amendment
d) Fourteenth Amendment
10. What is the significance of the case Griswold v. Connecticut (1965) in privacy law? a) It allowed the government to access personal
data for surveillance purposes.
b) It recognized a constitutional right to privacy, especially in marital relations.
c) It declared that privacy is not protected under the U.S. Constitution.
d) It ruled that privacy only applies in commercial contexts.
11. What is the primary goal of encryption technology in privacy protection? a) To limit internet access
b) To hide user identity from websites
c) To convert data into a code to prevent unauthorized access
d) To increase download speeds
SPI
IT4R7
30 ITEMS QUIZ
12. Which law was passed in the Philippines to protect personal data in both the private and government sectors? a) Data Protection
Directive
b) COPPA
c) Republic Act No. 10173
d) The Basic Law
13. What does the term "differential privacy" refer to? a) A process where data is anonymized to prevent individual identification.
b) The total deletion of all personal data from a system.
c) A method for tracking user activity online.
d) A legal term that limits privacy protection to minors.
14. Which of the following describes "telemetry" as a privacy violation? a) The illegal listening to phone conversations
b) The unauthorized duplication of a user’s personal data
c) The collection of user data and metrics from software without consent
d) The encryption of data in transit over networks
15. What is the purpose of the Children’s Online Privacy Protection Act (COPPA)? a) To ensure that companies provide free services to
minors
b) To limit the collection of personal information from minors under 13
c) To make all websites child-friendly
d) To ban minors from using social media platforms
27. What is the penalty for trademark infringement under R.A. 8293?
A. A fine of ₱10,000
B. Imprisonment of 1 year
C. A fine between ₱50,000 and ₱200,000
D. Imprisonment of 10 years