
PhilNits

Quiz
•
Computers
•
Professional Development
•
Hard
Charity Chinalpan
Used 1+ times
FREE Resource
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the organization that is established by selecting personnel from related departments, who have the required skills and experiences, to perform system development?
Divisional organization
Project organization
Matrix organization
Functional organization
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Among the actions involving a commercially available book of landscape pictures without obtaining the author’s permission, which of the following is illegal under the Copyright Act?
Taking a photograph of the same object as a photograph you like
Cutting out a photograph from the book and putting it on the wall of your room
Placing and publishing a photograph from the book on your Web page
Describing comments about the photograph book in your blog
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is the most appropriate description concerning the use of a single-licensed software package purchased for one PC or a computer at a company?
Since the program purchased for a PC is owned by the company, it can be freely copied to other PCs in the company.
The purchased program can be installed on a LAN server and downloaded into multiple PCs connected to the server.
When the purchased program is upgraded to a new version, the unnecessary old version can be used for personal purposes outside the company.
When a computer manufactured by Company A is replaced with another manufactured by Company B, the program can be altered without the permission of the copyright holder within the extent necessary for the replacement.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following describes the characteristics of the QR code in the figure shown below?
It is the code developed for use in IC tags and can be used for noncontact-based merchandise management.
It is a kind of two-dimensional bar code and can record much information, including alphanumeric characters, Kanji characters, etc.
It contains only about 10 bytes of information and is used for encryption of commercial product codes.
It compresses and symbolizes an image and is used for communication of information.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Company X, which is “a business operator handling personal information,” held a seminar for individual customers to promote the sales of their products, which included a questionnaire for the participants at the end. The questionnaire sheet stated that the purpose for obtaining personal information was to offer information about future products; the company asked for the customer’s name, address, telephone number, and whether or not they wanted the information.
Which of the following actions by Company X is illegal in light of the Act on the Protection of Personal Information?
A list of customers was created from the collected questionnaires, and direct mails were sent to the customers who wanted information about products.
The collected questionnaires and the customer list created after the seminar were stored in a locker with a key, except when they were necessary.
The collected questionnaires and the customer list created after the seminar were stored in a locker with a key, except when they were necessary.
A customer who had wanted information about products contacted Company X to change the address, so Company X changed the customer list after verifying the identity of the customer and the desire to receive further information.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following explains the Labor Standards Act?
A law that regulates minimum standards for labor conditions, such as working hours, breaks, and vacations
A law about businesses that dispatches workers with the required skills to companies
A law enacted to improve the welfare of part-time workers
A law that guarantees minimum wages for the stability of lives and the improvement in manpower quality
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is considered unauthorized access under the Act on the Prohibition of Unauthorized Computer Access?
Having access to a shared server and copying a software package illegally without permission
Having access to a computer via the Internet by using other people’s passwords
Posting accessible information that libels others on the Internet
Having access to a website with obscene pictures
Create a free account and access millions of resources
Similar Resources on Wayground
50 questions
RUTS Technology

Quiz
•
9th Grade - Professio...
50 questions
CCNA Day 4

Quiz
•
Professional Development
48 questions
Business Letters

Quiz
•
10th Grade - Professi...
45 questions
Security+ Incident Response and Computer Forensics

Quiz
•
Professional Development
50 questions
Security+ Authentication Design Concepts

Quiz
•
Professional Development
55 questions
Linux Test Prep 2

Quiz
•
8th Grade - Professio...
47 questions
Getting Started with Docker and Dockerfile

Quiz
•
Professional Development
46 questions
A+ 1101 Study Quiz 1

Quiz
•
Professional Development
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade