Define me
Guess what?
Name it!
Examples
Guess who?
100

considered relevant truths which have been validated and identified.

What are Facts?

100

2 Types of Resources

What are Physical and Conceptual Resources?

100

PM

What is Private Message?

100

Give 1 social media used for means of venting out in public

Facebook

Twitter

Instagram

Snapchat

Reddit


Etc.

100

Telco company that conducted a study in 2016, global internet traffic will reach 1.1 zettabytes per year and in 2019, global traffic is expected to reach 2 zettabytes per year. 

What is Cisco?

200

Number of distinct types of intangible assets for which a set of exclusive rights are recognized.

What is Intellectual Property?

200

What are strategies in Information Economics?

What are Browsing Reviews, Branding, Reputation?

200

NDA

What is Non-disclosure agreements?

200

Example of Near-field communications (NFC)

Samsung pay, apple pay, and google pay, shopee pay, gcash, paymaya, etc.

200

Who presented Information Control in this presentation?

Si Kenneth ata.

300

It is the unauthorized copying or distribution of copyrighted software. It can be done through copying, downloading, sharing, selling, or installing multiple copies of software onto personal or work computers.

What is Software piracy?
300

Give atleast 2 Intellectual Property Rights.

  1. Copyright & related rights

  2. Trademarks & service marks

  3. Geographic indications

  4. Industrial design

  5. Patents

  6. Layout designs (topographies) of Integrated Circuits (ICs_

  7. Protection of undisclosed information

300

DVD

What is Digital Versatile Disc?

300

Example of browsing reviews. (Strategies in Information Economics)

Product Images in online platforms, movie trailers, video advertisements

300

Four identified issues of by A*** T*****r under Information Control

Who is Adam Thierer?

400

It is a subset of a security breach that actually leads to accidental or unlawful destruction, loss alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed.

What is Personal Data Breach?

400

Information, as a resource, has four characteristics, namely.

Give 1 characteristic.

  1. Zero marginal cost

  2. Non-rivalrous

  3. Non-exlusive

  4. No transparency 

400

NFC

What is Near Field communications?

400

Gone are the days where the only means of long-distance communication is through SMS or emails for mobile phones and computers respectively.

Give examples that increase communication methods. 

Other means of communication are through mobile apps such as Viber, Messenger, and Discord where people can send private messages (PM) or direct messages (DM)  

400

Under reputation, give the Top 1 movie in the Philippines and its lead actors.

Hello, Love, Goodbye.

Who is Kathryn Bernardo and Alden Richards?

500

It is used to describe the processes by which the author or publisher of a work exerts his or her rights to control what the purchaser of his or her work is entitled to do.

What is Digital rights management?

500
Give the four (4) identified issues by Adam Theirer.

What are Convergence, Scale, Volume, and Unprecedented Individual empowerment?

500

EULA

What is  End-User License Agreement (EULA)?

500

Give examples to the following:

1. Encryption

2. Serial Keys

1. ATM PIN

2. Product key in Windows OS

500

The President of the Republic of the Philippines who signed Republic Act No. 10173, also known as Data Privacy Act of 2012.

Who is Former President Benigno Aquino III?

M
e
n
u