You are on page 1of 4

1.

It is the taking, with intent to gain, of a motor vehicle belonging to another without the latter's
consent, or by means of violence against or intimidation of persons, or by using force upon things.  
a. theft B. robbery C. cattle-rustling d. carnapping
2.It refers to any representation through publication, exhibition, cinematography, indecent shows,
information technology, or whatever means, of a person engaged in real or simulated explicit sexual
activities or any representation of the sexual parts of a person for primarily sexual purposes.
a. photography B. pornography C. lithography d. calligraphy
3.It is the taking, with intent to gain, of a motor vehicle belonging to another without the latter's
consent, or by means of violence against or intimidation of persons, or by using force upon things.  
a. theft B . robbery C. cattle-rustling d. carnapping
4.Sapetula took away the vehicle of Archie, a 2015 Sarao Jeepney rare model, without the latter's
consent. What crime was committed by Aderis?
a. theft B. qualified theft c. carnapping d. robbery
5.It is an Act Defining the Crime of Child Pornography, Prescribing Penalties Therefor and for Other
Purposes.
 a. RA 9775 b. RA 9505 c. RA 8551 d. RA 7610
6.The study of major crimes and the application of special investigative techniques in its resolution
defines
a. Criminal Investigation
b. Special Crime Investigation
c. Special Investigation
d. None of them
7.The recognition, identification, comparison and evaluation of physical evidence by the application of
natural sciences is called:
a. Instrumentation b. Information c. Criminalistics d. Investigation
8.What law defined certain rights of persons arrested, detained or under custodial investigation as well
as the duties of the investigator?
a. RA 6975 b. RA 7783 c. RA 7438 d.RA 7638
9.What law requires the procurement of working permit for minors to avoid any child exploitation and
child abuse in any form?
a. RA 9231 b. RA 7438 c. RA 9208 d. RA 8358
10.The Anti-Rape Law 1997 is known as
a. RA 7610 b.RA 8358 c.RA 8505 d.RA 8353
11.In a sexual assault case, whom would you identify as potential sources for elimination or reference
samples in DNA testing?
a. Victim
b. Victim’s recent consensual partners
c. The victim and the victim’s recent consensual partners
d. None of the above choices are correct.
12.Whom would you identify as potential sources for elimination or reference samples in a residential
burglary?
a. Everyone who had lawful access to the crime scene.
b. All the family members and neighbors
c. Police detectives, technicians and dispatcher.
d. 1None of the above answers are correct

13.What is the purpose of the chain of custody of evidence?


a. To establish a list of people who have entered the crime scene.
b. To establish the identities of those people who have had physical possession of the evidence.
c. To show that correct police protocol and procedure were followed.
d. To determine correct evidence collection and storage procedures.
14.Who was the college student who created the love bug?
a. Onel De Vera
b. Onel Dela Torre
c. Onel De Guzman
d. Onel De Venecia
15.The following are considered cybercrimes except
a. Software piracy
b. safe cracking
c. Hacking
d. Phising
16.What is the LOCARD principle?
a. There is no duplication in nature
b. no absolute truth
c. Every contact leaves a trace
d. principle of permanency
17.Any person who, with intent to gain, shall take any personal property belonging to another by means of violence or
intimidation of any person, or by using force upon anything
a. estafa c. grave coercion
b. Robbery d. Theft

18.In the Philippines, breaking and entering into house or building with felonious intent is known as
a. Burglary c. Larceny
b. Robbery d. Theft
19.Which among the following is estafa?
a. Unlawful taking of personal property
a. The property must be personal property and cannot refer to real property.
c. Taking of personal property must be unlawful; if given in trust
d. none of the above

20. Rape is committed by a man who shall have carnal knowledge of a woman under any of the following
circumstances, except?
a. Through force, threat or intimidation;
b. When the offended party is deprived of reason or is unconscious;
c. By means of fraudulent machination or grave abuse of authority:
d. When the victim conceded in having sexual intercourse with the offender
21. Which among the following does not constitute trafficking acts?
a.     Recruit, transport, transfer, harbor provide or receive a person by any means,              
b.     Introduce or match a Filipina for profit to a foreigner under pretext of marriage                 
c.      Offer or contract a marriage, real or simulated    
d. With intent to gain

22. In money laundering law Covered transaction involves transaction in total amount in excess of P500,000 within 1
banking month
a. True b. false
23. Which among the following physical evidence is not a relevant in the crime of robbery
a. toolmarks
b. Footprints
c. Fingerprints on areas of break; Closets (prints may be found in door and jambs); Door knobs; Dressers;
Pieces of furniture; Bottles and glasses; Walls; Tools; and Desks.
d. Semen
24. The following are the elements of kidnapping except?
a. The offender is a private individual;
b. He kidnaps or detains another, or by any means deprives the latter of his liberty;
c. The act of detention and kidnapping must be legal
d. The purpose of kidnapping is to extort ransom from the victim or any other person
25. Which among the following is not an objective of kidnap for ransom investigation?
a. To ensure public safety
b. To preserve life;
c. To ensure prompt and safe return of the victim
d. none of them
26. Which among the following are not pointers to consider in kidnap for ransom?
a. Remember that kidnap for ransom gang must be treated as witty, experienced and dangerous armed
criminals.
b. Any slightest mistake on the part of the police would mean death of the victim
c. Initiate secrecy discipline not only on the victim’s family but also within the police.
d. Consider to give the demand of the kidnappers.
27. Which among the following is not considered as qualified trafficking:
(a) When the trafficked person is a child;
(b) When the adoption is effected through Republic Act No. 8043, otherwise known as the "Inter-
Country Adoption Act of 1995" and said adoption is for the purpose of prostitution, pornography, sexual
exploitation, forced labor, slavery, involuntary servitude or debt bondage;
(c) When the crime is committed by a single person
d. all of them

MODIFIED TRUE OR FALSE


1.In robbery with with force upon things the use of force here must refer to the force employed upon the person in
order to gain entrance into a building or a house
2.In robbery with violence or intimidation upon person, Violence or intimidation must be against the thing of the
offended party.
3.In robbery, the taking is done either with the use of violence or force upon things; whereas in theft, the taking is
done simply without the force of the owner.
4.In the crime of rape the subsequent valid marriage between the offender and the offended party shall aggravate the
criminal action or the penalty impose
5. In kidnapping, detention shall have lasted for more than three 2 days

6. In kidnapping, detention is the money demanded as a condition for the release of a person being deprived of his
liberty or any other person, even if none of the circumstances above is present, kidnapping or serious illegal
detention was committed.
7. Trafficking in Person refers to the recruitment, transportation, transfer or harboring, or receipt of persons with or
without the victim's consent or knowledge, within or across national borders by means of threat or use of force
8.. It is deemed committed in large scale if committed against three (3) or more persons, individually or as a group.
9. An Act Prohibiting the Employment of Children Below 15 Years of Age in Public and Private Undertakings is RA
7658
10. Under the AMLA, money laundering is “a crime whereby the proceeds of an lawful activity are transacted,
thereby making them appear to have originated from legitimate sources

IDENTIFICATION
1. It is the practice of converting illegal money to a legal one
2. It is the stage of money laundering where money launderers are are the most vulnerable to being caught
3.It is the stage of money laundering which is considered to be the most complex and often entails international
movements of fund.
4. It is the stage in money laundering where the money is returned to the criminal from what seem to be legitimate
5.It is also known as structuring in the stage of money laundering
6. is the deliberate evasion of environmental laws and regulations by individuals and companies in the pursuit of
“personal interest and benefit.” Where these activities involve movements across national boundaries, or impacts
upon the world as a whole,
7. It is referred to as commercial crimes and known also as “white collar crimes”. It is any act characterized by fraud,
concealment, or a violation of trust and are not dependent upon the application or threat of physical force or violence.
8. All crimes performed or resorted to by abuse of electronic media with the purpose of influencing the functioning of
computer or computer system. A criminal activity in which computers or networks are a target, tool or incidental to the
commission of a crime.
9. The Anti-Cyber Crime Law of 2012.
10. The unauthorized access into or interference in a computer system in order to corrupt, alter, steal, or destroy
using a computer or other similar information and communication devices.
ENUMERATION
1. Enumerate at least 2 purposes of trafficking in person
2. What are the 2 fold aims of AMLA?
3. What are the 3 scope of application of cyber crime
4. What is the purpose of placement in money laundering?
5. What is the purpose of layering in money laundering?
6. What is the purpose of integration in money laundering?

You might also like