You are on page 1of 1

1. WHAT IS OUT TOPIC ALL ABOUT?

2. Refers to the criminal activities carried out by means of computers or the Internet.
3. Cybercrime Prevention Act of 2012 is also known as?
4. Is a law in the Philippines which aims to address legal issues concerning online interactions
and the Internet.
5. Cybercrime Prevention Act of 2012 was promulgated on ?
6. Is registering, trafficking in, or using an Internet domain name with bad faith intent to profit
from the goodwill of a trademark belonging to someone else.
7. It is a virtual sex encounter in which two or more people (connected remotely via internet)
send each other sexually explicit contents or sexually explicit acts.
8. Is the attempt to obtain sensitive information such as usernames, passwords, and credit
card details (and, indirectly, money), often for malicious reasons, by disguising as a
trustworthy entity in an electronic communication.
9. A legal concept that allows the reproduction of copyrighted material for certain purposes
without obtaining permission and without paying a fee.
10. Cybersex is also known as?
11. Cyberspace is also known as?
12. Refers to obtaining files that you do not have the right to use from the Internet.
13. Is a form of child sexual exploitation.
14. It is the deliberate use of someone else's identity, usually as a method to gain a financial
advantage or obtain credit and other benefits in the other person's name, and perhaps to
the other person's disadvantage or loss.
15. Refers to the practice of modifying or altering computer software and hardware to
accomplish a goal that is considered to be outside of the creator's original objective.
16. An economic inequality between groups in terms of access to, use of, or knowledge of ICT.
The divide within countries can refer to inequalities between individuals, households,
businesses, and geographic areas at different socioeconomic (and other demographic) levels
17. The persona you create about yourself virtually.
18. The use of electronic communication to bully a person, typically by sending messages of an
intimidating or threatening nature.
19. The excessive use of computers to the extent that it interferes with daily life. This excessive
use may for example interfere with work or sleep, result in problems with social interaction,
or affect mood, relationships and thought processes.
20. It means relating to, or involving computers or computer networks (such as the Internet)
21. It is an unprivileged false statement of fact which tends to harm the reputation of a person
or company.
22. The practice of illegally copying and selling digital music, video, computer software, etc.
23. A legal device that gives the creator of a literary, artistic, musical, or other creative work the
sole right to publish and sell that work.
24. The correct or acceptable way of communicating on the Internet.
25. An act or instance of using or closely imitating the language and thoughts of another author
without authorization; the representation of that author's work as one's own, as by not
crediting the original author.
26. Is an electronic medium used to form a global computer network to facilitate online
communication.
27. Those individuals who engage in computer hacking activities are typically referred to as?
28. Cybersex is also known as?
29. Cyberspace is also known as?
30-34. Five examples of legal downloading sites
35-39. Five examples of illegal downloading sites

You might also like