3. Who disrupts fleming;s first public demonstration of marconi’s “secure” wireless telegraphy technology by sending insulting morse code messages? 4. Who was the first filipino to be convicted of cybercrime, particularly in hacking? 5. The famous virus that was created by Onel de Guzman on May 4, 2000, that spread across Hong kong, to Europe, to the United states, infecting and damaging computers and networks of small big companies, private and government institutions? 6. His conviction was considered a landmark case, as he is the fist local hacker to be convicted under section 33a of the E-Commerce Law or Republic Act 8792? 7. What particular worm that has been called the world’s first digital weapon? 8. Who is remembered as one of the most notorious hackers in internet hackers in internet history that was able to penetrate some of the most highly-guarded networks in the world, including those of Motorola and Nokia? 9. These are names used for and by individuals who participate in phreaking. The term first referred to groups who had reverse engineered the system of tones used to route long-distance calls? 10. Kevin Poulsen was multi-talented and also indulge in lock picking, forgery and hacking under the pseudonym? 11. It is also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy? 12. Cyber is derived from the word ____, which means science of communication and control over machine and man? 13. These are individuals or team of people that may use a device to access a user’s personal information, confidential business information, government information, or disable a device to commit malicious activities on digital systems or networks with the intention of stealing sensitive company information or personal data, and generating proof? 14. The following are some of the reasons for the vulnerability of computers to cyber criminality except one? 15. Computer is not an essentially and element of cyber criminality and it is either a tool or target of cyber crimes. The statement is? 16. What category of crime that is similar to a real-life instance of a criminally illegally possessing an individual’s bank or credit card details? 17. This refers to the use of internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation? 18. These are hackers who commit illegal acts, and their main purpose is to harm information systems, steal information? 19. What do you call those who target data which valuable on its face (e.g., trade secrets and proprietary data) or directed at data (eg., credit card data) which may be used to further other criminal activity? 20. This is the least common category of cybercrime, but is the most serious offense? 21. In the instance of an internal employee, there may be no initial motivation by the employee to commit any form of crime against their employer. However, while undertaking their duties they may identify a vulnerability in the internal systems where money or data could be removed without anyone else being able to identify their actions. What particular motivation of cybercriminals is being described? 22. Some cyber criminals may commit technical attacks against others as a training exercise to develop their skills for a more financially lucrative attack. What particular motivation of cybercriminal is being described? 23. This category of cybercrime involves cyberstalking, distributing pornography, and trafficking? 24. A type of hackers that have the knowledge and skills that would enable them to function in the same way as black-hats, but they decided to be on the right side of the law? 25. A group of hackers that falls between black- and white-hat hackers who have shifting or changing ethics depending on the specific situation? 26. What is the definition of cybercrime according to the Department of justice to attune the definition of cybercrime to the legal framework of the Philippines, Republic act no. 10175 or the cybercrime prevention act of 2012? 27. The following ae the categories of cybercrime except one? 28. It refers are networks from compromised computers that are controlled externally by remote hackers? 29. This type of attack involves hackers sending malicious email attachments or URLS to users to gain access their accounts or computer? 30. The attack is rarely personal and the attack on the target company is nothing more than a business venture to make money. What motivation of cybercriminal is being described? 31. This type of cybercrime are used to make an online service unavailable and take the network down by overwhelming the site with traffic from a variety of sources? 32. This cybercrime involves criminals sharing and distributing inappropriate content that can be considered highly distressing and offensive? 33. This type of content exists both on the everyday internet and on the dark web, an anonymous network? 34. These are less threatening than other cybercrimes, but are type of malware. They uninstall necessary software in your system including search engines and pre-downloaded apps? 35. The following are the type of hackers except one? 36. A motivation of cybercriminal wherein the state actor is a government agency or aligned group who conducts cyber activities on behalf of that government. The motivation may be to seek the Ip of the specific industries in foreign countries to gain a competitive advantage? 37. Revenge is the motivation of cybercriminal when an attacker may commit a criminal offense against company after a perceived injustice against themselves. The statement is? 38. When the opportunity exists for persons in remote locations to target the critical infrastructure of an entity they wish to cause extreme harm to. The motivation is terrorism? 39. A person in a remote location may see their goals advanced by causing a massive security failure in another nation’s critical infrastructure-such as power, nuclear energy, or water delivery-that leads to large-scale loss of live. What particular motivation is being described? 40. One of the characteristic of cybercrime is that these are legal activities done with malicious purposes? 41. It is common motivator for the criminal, whether internal or external to the company? 42. When one assumes the identity of another person and uses such identity to steal funds, access confidential information, or participate in tax or health insurance fraud, what cybercrime is committed? 43. This kind of cybercrime involves online harassment where the user is subjected a plethora of online messages and emails? 44. A cybercrime that involves criminals making direct contact with you usually by phone or email. They want to gain your confidence and usually pose as a customer service agent so you’ll give the necessary information needed? 45. These are usually in the form of ads or spam emails that include promises of rewards or offers of unrealistic amounts of money? 46. A type of cybercrime that needs a vulnerability (bug in the code of software) in order to gain control of user’s computer? 47. The definition of cybercrime that is given by Yor and Steinmetz? 48. It is essentially an element of cyber criminality and it is either a tool or target of cybercrimes? 49. What refers to the virtual computer world, and more specifically, is an electronic medium used to form a global computer network to facilitate online communication? 50. It is the new horizon which is controlled by machine for information and communication between human beings across the world?