You are on page 1of 2

Yllana Bay View College

Balangasan District Pagadian City


“The Builder of Future Leaders”

Second Preliminary Examination in Crime. Elec. 3(Cybercrime)

Directions: Read and understand the test. Write your answer in your booklet. Any forms of alterations,
erasures and tearing of booklet will be considered as wrong. Use black pen in answering the questions.

Test I. Fill in the blanks.


Declaration of Policy. — The State recognizes the1________role of information and 2_______industries such
as content3______, telecommunications,4_______ electronic 5 _______, and data processing, in the nation’s
overall 6______ and 7_______ development. The State also recognizes the 8______ of providing an
9________conducive to the development,10 _______, and rational 11_______ and 12 ______ of information
and 13 _______ technology (ICT) to attain free,14_____, and intelligible access to 15 ______ and/or
16 _______ of information; and the need to protect and 17______ the integrity of 18 ______, computer and
communications 19 _______, networks, and 20 ______, and the 21 ________, integrity, and 22 _________ of
information and 23 _____ stored therein, from all forms of 24_____, 25_____, and26 ______ 27_______ by
making punishable under the 28 ___ such conduct or 29 _______. In this light, the 30_____shall adopt
sufficient 31____ to effectively prevent and 32_____ such offenses by facilitating their detection, 33_______,
and prosecution at both the domestic and 34_______ levels, and by providing arrangements for fast and
35______ international 36______.
Cybersex. — The willful 37_______, maintenance, control, or 38 _______, directly or indirectly, of any
lascivious exhibition of sexual 39_______or sexual activity, with the aid of a computer 40._______, for favor or
consideration
Test II. Multiple choice. (2pts)
1. Any person found guilty of any of the punishable acts enumerated in Sections 4(a) and 4(b) of this Act
shall be punished with imprisonment of.
a. Reclusion Perpetua c. Prision Mayor
b. Arresto Mayor d. Arresto Menor
2. Any person found guilty of any of the punishable acts enumerated in Section 5 shall be punished with
imprisonment of.
a. 1 degree higher c. 2 degree lower
b. 1 degree lower d. 2 degree higher
3. The Cybercrime Investigation and Coordinating Center shall be headed by.
a. President c. Director
b. Executive chief d. Executive Director
4. Any person found guilty of any of the punishable acts enumerated in Section 4(c)(3) shall be punished with
imprisonment of arresto mayor or a fine of.
a. Php 50,000.00 c. not exceeding to php 50,000.00
b. At least php 50,000.00 d. more than php 50,000.00
5. Refers to a representation of information, knowledge, facts, concepts, or instructions which are being
prepared, processed or stored or have been prepared, processed or stored in a formalized manner and
which are intended for use in a computer system.
a. Computer data c. Computer information
b. Database d. Data
6. Refers to any representation of facts, information, or concepts in a form suitable for processing in a
computer system including a program suitable to cause a computer system to perform a function and
includes electronic documents and/or electronic data messages whether stored in local computer systems
or online.
a. Computer data c. Computer information
b. Database d. Data
7. The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic
document, or electronic data message, without right, including the introduction or transmission of
viruses.
a. Data Interference c. Illegal Interference
b. Computer Interference d. Without Right
8. The intentional alteration or reckless hindering or interference with the functioning of a computer or
computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing
computer data or program, electronic document, or electronic data message, without right or authority,
including the introduction or transmission of viruses.
a. Data Interference c. Illegal Interference
b. Computer Interference d. Without Right
9. The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive
others from registering the same.
a. Cyber Squatting c. Cybercrime
b. Cybersecurity d. Cyber
10. The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying
information belonging to another, whether natural or juridical, without right.
a. Computer-related Identity Theft c. Computer-related Fraud
b. Computer-related Forgery d. Computer-related Libel

Test III. Simple Recall. (2pts)


1. Refers to the collection of tools, policies, risk management approaches, actions, training, best practices,
assurance and technologies that can be used to protect the cyber environment and organization and
user’s assets.
2. Refers to listening to, recording, monitoring or surveillance of the content of communications, including
procuring of the content of data, either directly, through access and use of a computer system or
indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the
communication is occurring.
3. Refers to the transmission of information through ICT media, including voice, video and other forms of
data.
4. Refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making
use of any resources of a computer system or communication network.
5. Refers to the computer systems, and/or networks, whether physical or virtual, and/or the computer
programs, computer data and/or traffic data so vital to this country that the incapacity or destruction of
or interference with such system and assets would have a debilitating impact on security, national or
economic security, national public health and safety, or any combination of those matters.
6. Refers to any computer data other than the content of the communication including, but not limited to,
the communication’s origin, destination, route, time, date, size, duration, or type of underlying service.
7. Refers to any information contained in the form of computer data or any other form that is held by a
service provider, relating to subscribers of its services other than traffic or content data.
8. The interception made by technical means without right of any non-public transmission of computer
data to, from, or within a computer system including electromagnetic emissions from a computer system
carrying such computer data.
9. The use, production, sale, procurement, importation, distribution, or otherwise making available, without
right.
10. The act of knowingly using computer data which is the product of computer-related forgery as defined
herein, for the purpose of perpetuating a fraudulent or dishonest design.
Test IV. Essay (Brief and Concise)
1. What is RA 9775? Elaborate your answer. (10 pts)
2. What is Cybercrime Prevention Act of 2012? Support your answer. (10 pts)

May God will always be with you!

MaamCrisel

You might also like