Sei sulla pagina 1di 6

TRUE OR FALSE

1) The Deliver components of ECM present information from the Manage, Store,
and Preserve components.

2) The introduction of computer viruses is also categorized as hacking.

3) Enterprise Component Management is a formalized means of organizing and


storing an organization's documents.

4) The DTI is one of the implement agencies of the E-Commerce Law.

5) Another term for hacking is cracking.

6) Store involves the converting of information from paper documents into an


electronic format through scanning.

7) The e-Commerce Law recognizes the data messages as evidence in court.

8) Piracy can cost you P5M or 10 years of imprisonment.

9) Online shopping is the process of buying goods and services from merchants
who sell on the Internet.

10) Instant messaging is a bit more private than a typical chat room.

11) Store involves the long-term, safe storage and back-up of static, unchanging
information.

12) IM is consists of sending real-time messages to another Internet user.

13) The R.A. 8792 is also known as the e-Commerce Act of 2000.

14) Deliver connects the other components of ECM.

15) The e-Commerce is the buying and selling of products or services over the
electronic systems.

16) The maximum imprisonment for piracy is 3 years.

17) The minimum imprisonment for hacking is 6 months.

18) We have 6 components of ECM.

19) The maximum imprisonment for hacking is 6 years.

20) Piracy is the unauthorized dissemination, importation, use, removal,


alteration of files/documents.
KEY TO CORRECTION
1. TRUE
2. TRUE
3. FALSE
4. TRUE
5. TRUE
6. FALSE
7. TRUE
8. FALSE
9. TRUE
10. TRUE
11. FALSE
12. TRUE
13. TRUE
14. FALSE
15. TRUE
16. FALSE
17. TRUE
18. FALSE
19. FALSE
20. TRUE

Multiple choices:

1. C
2. B
3. A
4. D
5. A
6. C
7. B
8. D
9. A
10. D
11. B
12. D
13. D
14. D
15. C
16. D
17. C
18. D
19. D
20. B
Multiple choices:
1. R.A 8792 was signed into last?
A. June 14, 2001
B. June 24, 2000
C. June 14, 2000
D. June 24, 2001

2. All existing laws such as the Consumer Act of the Philippines also apply to e-
commerce transactions.
A. Sec 32
B. Sec 33
C. Sec 34
D. Sec 35

3. Mandates the government to have the capability to do e-commerce within


years or before June 19, 2002.
A. 2
B. 1
C. 4
D. 3

4. Refers to unauthorized access including the introduction of computer viruses.


A. Stealing
B. Hacking
C. Cracking
D. Both B and C

5. What is the short title of RA 8792?


A. “Electronic Commerce Act”
B. "Electronic Commerce Law"
C. “Electronic Commerce Act of 2000"
D. “Electronic Commerce Law of 2000"

6. How many part and chapter does the RA 8792 have?


A. 3 parts and 5 chapters
B. 4 parts and 4 chapters
C. 5 parts and 3 chapters
D. None of the above
7. LEGAL RECOGNITION OF ELECTRONIC WRITING OR DOCUMENT AND DATA
MESSAGES
A. Chapter 1
B. Chapter 2
C. Chapter 3
D. Chapter 4

8. Refers to a secret code which secures and defends sensitive information.


A. Electronic Password
B. Electronic Code
C. Electronic security
D. Electronic Key

9. Which of the following describes e‐commerce?


A. Doing business electronically
B. Doing business
C. Sale of goods
D. All of the above

10. Which of the following is part of the four main types for e‐commerce?
A. B2B
B. B2C
C. C2B
D. All of the above

11. Which segment do eBay, Amazon.com belong?


A. B2Bs
B. B2Cs
C. C2Bs
D. C2Cs

12. Digital products are best suited for B2C e‐commerce because they:
A. Are commodity like products?
B. Can be mass‐customized and personalized
C. Can be delivered at the time of purchase
D. All of the above
13. What is the name given to an interactive business providing a centralized
market where many buyers and suppliers can come together for e‐commerce or
commerce‐related activities?
A. Direct marketplace
B. B2B
C. B2C
D. Electronic marketplace

14. What punishment is given to crimes like hacking or cracking under the E-
Commerce Law?
A. Imprisonment only
B. Fines only
C. No penalties
D. Imprisonment and fines

15. Achieving marketing objectives through the use of any electronic communication
technology refers to
A. E-business
B. E-commerce
C. E-marketing
D. Internet Marketing

16. Which of the following describes E-Commerce?


A. Buying products from each other
B. Buying services from each other
C. Selling services from each other
D. All of the above

17. Which of the following is not considered to be one of the three phases of e-
commerce?
A. Innovation
B. Consolidation
C. Preservation
D. Reinvention

18. The idealistic market envisioned at the outset of the development of e-


commerce is called a ______.
A. Bailey market
B. Baxter market
C. Bergman market
D. Bertrand market
19. Which of the following would be legally recognized pursuant to the Uniform
Electronic Commerce Act?
A. purchasing an item from a web site with your credit card by clicking through a
series of dialogue boxes
B. programming your shopping bot (an automated electronic device) to purchase
an item from a web site with your credit card
C. ordering an item online through another person’s shopping bot
D. all of the above

20. Which of the following is used to verify the identity of the person purporting
to provide an electronic signature?
A. file formatting
B. a digital certificate
C. a court order
D. information security

Potrebbero piacerti anche