You are on page 1of 2

ARI YUNG NUMBER 1 na compare and contrast, pwede na yung venn diagram lang gamitin mo po pero

pwede mo rin isulat yang 1-4 para pag natanong ka ng definition, may copy ka hehe)

1. Identity theft - The illicit obtaining and exploitation of private and personally  identifiable details, often
for the goal of monetary gain, is referred to as identity theft.

2. Forgery - The counterfeiting of currencies, the fabrication of documentation, the tampering of


transcripts, as well as the use of fake text, or the deliberate acquisition of false text with the aim to
conduct fraud are all examples of forgery.

3. Counterfeiting - Charges may be brought against the perpetrator of the forgery if the fraud caused the
victim to suffer losses. Making or constructing an illegal replica of a real item with the intention of
defrauding someone is the definition of counterfeit. In most cases, this entails the production of phony
currency, assets, and even, on occasion, commodities.

4. Fraud - An individual intends fraud against you when they tell you a falsehood, often known as a
"scam," in order to acquire anything from you, such as your finances or relevant data about your private
affairs.

Fraud
Identity
Theft

Illicit obtaining and Bot crimes often An individual intends


exploitation of private and operate in a cascade of fraud against you when
personally identifiable events following one
they tell you a falsehood,
another. Any stolen
details, often for the goal
information is theft, and often known as a "scam"
of monetary gain, and etc. its subsequent use
constitutes fraud.

Bot crimes often Bot crimes are


operate in a cascade of
committed with the
events following one All of these
another. After illegally
intention of deceiving
crimes harm other people and
exploiting data, which is
an act of identity theft, both the people often operate in a
the creation of fake whose identities cascade of events
papers, which is the act have been stolen following one
of counterfeiting, and the another.
follows — usually.

Both deeds are


linked to the Counterfeiting of
Making or utilization of currencies, the
constructing an illegal documents.
fabrication of
replica of a real item documentation, the
with the intention of tampering of transcripts,
defrauding someone etc.
Counterfeiting Forgery

NOTE: (ari yung nasa gitna ng venn diagram, di lang kasya e)


All of these crimes harm both the people whose identities have been stolen and the enterprises where
the stolen identities have been utilized to commit fraud.

2.
PRACTICAL - When analyzing papers that are controversial, it is more trustworthy to look at them from a
practical perspective than from a theoretical one. I have done some research on what the differences
exist between the two on the internet, and I found that much like the way we conduct research and
studies, following some practical procedures and taking some practical implications will most likely lead
to the discovery of the facts behind the questioned documents. Ink inspection, the identification of
indentation, and the detection of omissions, edits, and other alterations are some of the processes that
will be brought about as a result of utilizing specifics. This is far more accurate than depending on ideas,
which often lose touch with what really occurred in the truth. Instead of relying just on the mental
activity of thinking, practical concerns require us to reflect on and make connections to actual
circumstances and events.

THEORETICAL - In addition, theoretical considerations might be helpful. In this essay, where I show how
practical considerations in QDE are much beneficial, I did not intend to make it seem like a load of
hogwash. The employment of ideas and ideologies that support the legitimacy of obtaining correct
findings in the questioned documents is what is meant by the term "theoretical considerations." Your
analysis may benefit from having a foundation at a greater abstraction level by taking theoretical issues
into account. A number of the concerns pertaining to the methodology are also of a theoretical
character. It enables you to better understand the boundaries of such assumptions. A theoretical
underpinning identifies the primary factors that have an impact on the particular phenomena of interest
and draws attention to the fact that more investigation is needed to determine how those primary
factors could vary and under what conditions.

3. NOTE: Drawing
(Ari po ay isesend ni Kate ang pic, wala kasi ako reference kaya wala me mailagay. Pero if nakapag label
ka na at wala pa functions, chat ka lang kay kate at ako gagawa ng functions. Basta malabelan mo po)

4. In the field of forensic science, the study of documents that might be contested in a legal setting is
known as questioned document examination, or QDE for short. Using methodologies and techniques
from the scientific community, its major objective is to give proof of documentation that is deemed to
be dubious or suspect. Document-related problems are particularly prevalent at the present time, and
this has caused a great deal of unease among people. This is due to the fact that incidents with
documents are associated with a variety of crimes, some of which may result in the loss of property as
well as actions that may put an individual's financial, economic, or personal life status in jeopardy. In
point of fact, QDE is the secret to removing examples of criminal activity that belong to the identical
classification.

You might also like