You are on page 1of 3

1. Refers to a physical unit of equipment that contains a computer or microcontroller.

Today, myriad devices are digital including a smartphone, tablet, and smartwatch.
2. It is the most essential component for the normal functioning of any system – to store
data, perform calculations, do complex operations, etc.
3. These digital devices are actually very similar to personal computers. However, they
commonly contain a larger storage capacity, higher processing power and larger amount
of memory.
4. It is also known as temporary or volatile storage.
5. . It is also known as flash memory and is considered non-volatile memory.
6. These are computer chips, or groups of chips, that do the thinking (the massive number
of binary calculations) of the computer necessary to run all programs.
7. It is also known as The Cybercrime Prevention Act of 2012.
8. What type of eavesdropping attack that occurs when a malicious actor inserts himself as
a relay/proxy into a communication session between people or systems?
9. It is the intentional or reckless alteration, damaging, deletion or deterioration of
computer data, electronic document, or electronic data message, without right, including
the introduction or transmission of viruses.
10. Hacking is considered as what cybercrime offense?
11. It shall have jurisdiction over any violation of the provisions of Republic Act no. 10175
including any violation committed by a Filipino national regardless of the place of
commission.
12. It is an order in writing issued in the name of the People of the Philippines, signed by a
judge, upon application of law enforcement authorities, authorizing the latter to search
the particular place for items to be seized and/or examined.
13. It is a warrant issued when a computer device or system is previously seized by another
lawful method, such as a warrantless arrest.
14. It is designated as the central authority in all matters related to international mutual
assistance and extradition.
15. NBI and PNP cybercrime unit or division shall have the following powers and functions
except ONE.
16. It is the willful engagement, maintenance, control, or operation, directly or indirectly, of
any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer
system, for favor or consideration.
17.  Refers to the intentional acquisition, use, misuse, transfer, possession, alteration or
deletion of identifying information belonging to another, whether natural or juridical,
without right
18. The Illicit copying of computer program or data files or wiretapping to obtain data in a
network is considered as what cybercrime offense?
19. It is the acquisition of a domain name over the internet in bad faith to profit, mislead,
destroy reputation, and deprive others from registering the same.
20. In online libel, the provision is only apply to the original author of the post and not to
others who simply receive the post and react to it.
21. .What is Aiding or Abetting in the Commission of Cybercrime?....
22. Who are the Law Enforcement Authorities that shall be responsible for the efficient and
effective law enforcement of the provisions of the Republic Act no. 10175?
23. What should the NBI and PNP organized and should be manned by special Investigators
to exclusively handle cases involving violations of the act?
24. Any person who willfully attempts to commit any of the offenses enumerated in the Act
shall be liable for?
25. The Buying of a password of computer system of banks are liable for?
26. Hanzo and Nana are selling hacking programs like Low Orbit Ion Cannon (LOIC), which
they will be liable for?
27. Online romance scam is an example of what cybercrime offense?
28. The following must be showed before a court warrant is issued or granted, except one.
29. .A warrant authorizing the law enforcement authorities to carry out any or all of the
following activities: a) listening to; b) recording; c) monitoring; d) surveillance of the
content of communications, including procuring of the content of computer data, either
directly, through access and use of a computer system or indirectly, through the use of
electronic eavesdropping or tapping devices, at the same time that the communication is
occurring.
30. All computer data, including content and traffic data that are examined under a proper
warrant shall be deposited with the court in a sealed package for how many hours?
31. Sending of an email to targets with a website link for users to click on, which might
either download malware onto the users’ digital devices will be liable for?
32. This protects the internal components from damage, dirt, and moisture.
33. It holds data stored in the computer even after the power is disconnected
34. These are a newer type of storage drive and do not have any moving parts, but rather are
computer chips that store the data as electrical charges.
35. It is an important computer component because it is where everything else connects to.
36. Computers also need to be able to communicate with one another, and this
communication is principally accomplished through a _____?
37. Refers to a series of instructions that performs a particular task.
38. It is a prepackaged instructions which allow users to perform a variety of functions,
including but not limited to word processing, statistical analysis, and the like.
39. This is designed to be portable by being compact, light-weight and capable of running for
extended periods on battery power. They’re also almost always capable of connecting to
the internet wirelessly, either through mobile broadband or Wi-Fi
40. The intentional alteration, or reckless hindering or interference with the functioning of a
computer or computer network by inputting, transmitting, damaging, deleting,
deteriorating, altering or suppressing computer data or program.
41. If a crime defined and punished in the RPC was committed through the use of
information and communications technologies the penalty is ___.
42. Using packet sniffing software and hardware to monitor network traffic and intercept
those packets someone is interested in is considered as __.
43. Phishing is considered as_____?
44. The input, alteration or deletion of any computer data without right, resulting in
inauthentic data, with the intent that it be considered or acted upon for legal purposes as
if it were authentic, regardless whether or not the data is directly readable and
intelligible.
45. Where should Law enforcement authorities record all sworn complaints?
46. The number of months the integrity of traffic data and subscriber information shall be
kept, retained and preserved by a service provider from the date of the transaction.
47. A digital device component that accepts physical inputs from external source and pairs
this information with computer controlled instructions to perform specific functions.
48. Refers to a computer that manages access to different resources and services over a
network.
49. It contains of the information needed by the digital investigative analysts to determine
how the act of cybercrime was committed
50. It is also known as the Electronic Commerce Act of 2000.

You might also like