Professional Documents
Culture Documents
Output Devices - An output device is any hardware component that gives information to the
user.
Three commonly used output devices are as follow:
1. Monitor- This output device displays your information on a screen,
2. Printer- This output device prints information on paper. This type of printed output is
called a hard copy.
3. Speaker- Sound is the type of output you will get from a speaker.
Computer Software - The computer will not work without software. Software also called
PROGRAMS. These are the instructions that tell the computer what to do and how o do it.
Types (Processor)
• Macintosh (Macs)
• PC compatibles (PC)
Types (Physical)
• Mobile Computer - most popular type of mobile computer(notebook/laptop)
• Handheld Computer - very small PC that you can hold in your hand.
III. INTERNET
The Internet - called simply “the Net,” is a worldwide system of computer networks-a
network of networks in which users at any one computer can, if they have permission, get
information from any other computer (and sometimes talk directly users at other computers).
Basically, the way the Internet works is by connecting billions of computers together in
things called networks. Networks (“Net” for short) are clusters of computers linked together
so that they can send data to each other.
Types of Internet:
1. 1.Dial-Up (Analog 56K) - Dial-up access is cheap but slow. A modem (internal or
external) connects to the Internet after the computer dials a phone number. This analog
signal is converted to digital via the modem and sent over a landline serviced by a public
telephone network.
2. DSL(Digital Subscriber Line) - It is an internet connection that is always “on”. This
uses 2 lines so your phone is not tied up when your computer is connected. There is also
no need to dial a phone number to connect. DSL uses a router to transport data and the
range of connection speed, depending on the service offered, is between 128K to 8 Mbps.
3. Cable - Cable provides an internet connection through a cable modem and operates over
cable TV lines.
4. Wireless - Wireless, or Wi-Fi, as the name suggests, does not use telephone lines or
cables to connect to the internet. Instead, it uses radio frequency. Wireless is also an
always on connection and it can be accessed from just about anywhere.
5. Satellite - Satellite accesses the internet via a satellite in Earth’s orbit. The enormous
distance that a signal travels from earth to satellite and back again provides a delayed
connection compared to cable and DSL.
6. Cellular - Cellular technology provides wireless Internet access through cell phones. The speeds
vary depending on the provider, but the most common are 3G and 4G speeds. 3G is a term that
describes a 3rd generation cellular network obtaining mobile speeds of around 2.0 Mbps. 4G is
the fourth generation of cellular wireless standards. The goal of 4G is to achieve peak mobile
speeds of 100 Mbps but the reality is about 21 Mbps currently.
Types of Stalkers:
Rejected Stalker - This type of stalker becomes upset when the friendship or romantic
relationship has ended. The rejected stalker is not only self-centered and jealous but also over-
dependent and persistent.
Resentful Stalker – The resentful stalker feels humiliated that the relationship has ended and
seeks revenge upon the victim. Resentful stalkers are often irrationally paranoid and are known
to verbally assault their victims.
o Predatory Stalker - The predatory stalker seeks power and sexual gratification. They
will not make physical contact but will use surveillance to track the victim.
o Intimacy Seeker– The intimacy-seeking stalker seeks an intimate and romantic
relationship with the victim. When the stalker is rejected by the victim, he or she will
continually phone the victim, write the victim letters, and can become jealous and
violent if the victim enters a relationship with someone else.
o Incompetent Suitor- The incompetent suitor stalker usually has inadequate social
skills. They want a relationship with the victim but do not have the ability to realize he
or she is not meant to be with the victim.
o Erotomania and Morbidly Infatuated - This type of stalker feels that the victim loves
them even though they may not have had any contact with the victim. The stalker is
usually paranoid, prefers suitors in a higher social class, and will repeatedly approach
the victim.
V. TYPES OF HACKERS
Hackers or crackers are those who target data which is valuable on its face (e.g.,
trade secrets and proprietary data) or directed at data (e.g., credit card data)
which may be used to further other criminal activity.
White – hats - have the knowledge and skills that would enable them to function in the same
way as black-hats, but they decided to be on the right side of the law.
Black hats- are hackers who commit illegal acts, and their main purpose is to harm
information systems, steal information, etc.
Gray-hat hacker - A group of hackers that falls between black- and whitehat hackers who
have shifting or changing ethics depending on the specific situation.
Hacking techniques
Bait and switch - Using bait and switch hacking technique, an attacker can buy advertising
spaces on the websites. Later, when a user clicks on the ad, he might get directed to a page
that’s infected with malware. This way, they can further install malware or adware on your
computer. The ads and download links shown in this technique are very attractive and users
are expected to end up clicking on the same.
Cookie theft -The cookies of a browser keep our personal data such as browsing history,
username, and passwords for different sites that we access. Once the hacker gets the access to
your cookie, he can even authenticate himself as you on a browser. A popular method to carry
out this attack is to encourage a user’s IP packets to pass through attacker’s machine. Also
known as Side Jacking or Session Hijacking, this attack is easy to carry out if the user is not
using SSL (https) for the complete session. On the websites where you enter your password
and banking details, it’s of utmost importance for them to make their connections encrypted.
Click Jacking Attacks - Click Jacking is also known by a different name, Ul Redress. In this
attack, the hacker hides the actual Ul where the victim is supposed to click. This behavior is
very common in app download, movie streaming, and torrent websites. While they mostly
employ this technique to earn advertising dollars, others can use it to steal your personal
information. In another word, in this type of hacking, the attacker hijacks the clicks of the
victim that aren’t meant for the exact page, but for a page where the hacker wants you to be. It
works by fooling an internet user into performing an undesired action by clicking on hidden
link.
Virus, Trojan etc. - Virus or trojans are malicious software programs which get installed into
the victim’s system and keeps sending the victims data to the hacker. They can also lock your
files, serve fraud advertisement, divert traffic, sniff your data, or spread on all the computer
connected to your network.
Eavesdropping (Passive Attacks) - Unlike other attacks which are active in nature, using a
passive attack, a hacker just monitors the computer systems and networks to gain some
unwanted information. - The motive behind eavesdropping is not to harm the system but to
get some information without being identified. These types of hackers can target email,
instant messaging services, phone calls, web browsing, and other methods of communication.
-Those who indulge in such activities are generally black hat hackers, government agencies,
etc
Fake WAP - Even just for fun, a hacker can use software to fake a wireless access point. This
WAP connects to the official public place WAP. Once you get connected the fake WAP, a
hacker can access your data, just like in the above case. It’s one of the easier hacks to
accomplish and one just needs a simple software and wireless network. Anyone can name
their WAP as some legit name like “Heathrow Airport WiFi” or “Starbucks WiFi” and start
spying on you. One of the best ways to protect yourself from such attacks is using a quality
VPN service.
Waterhole attacks - To poison a place, in this case, the hacker hits the most accessible
physical point of the victim.
Denial of Service (DoS\DDoS) - A Denial of Service attack is a hacking technique to take
down a site or server by flooding that site or server with a lot of traffic that the server is
unable to process all the requests in the real time and finally crashes down. This popular
technique, the attacker floods the targeted machine with tons of requests to overwhelm the
resources, which, in turn, restrict the actual requests from being fulfilled.
DDoS(Distributed Denial of Service) attacks, hackers often deploy botnets or zombie
computers which have got the only work to flood your system with request packets. With each
passing year, as the malware and types of hackers keep getting advanced, the size of DDoS
attacks keeps getting increasing.
Keylogger - Keylogger is a simple software that records the key sequence and strokes of your
keyboard into a log file on your machine.
PUNISHABLE ACTS
(Cybercrime Offenses (Philippine setting)
1. OFFENSES AGAINST THE CONFIDENTIALITY, INTEGRITY AND AVAILABILITY
(CIA) OF COMPUTER DATA AND SYSTEMS:
1) lllegal Access. – The access to the whole or any part of a computer system without
right.
2) lllegal Interception. – The interception made by technical means without right of any
non-public transmission of computer data to, from, or within a computer system
including electromagnetic emissions from a computer system carrying such computer
data.
3) Data Interference. - The intentional or reckless alteration, damaging, deletion or
deterioration of computer data, electronic document, or electronic data message, without
right, including the introduction or transmission of viruses.
4) System Interference. - The intentional alteration or reckless hindering or interference
with the functioning of a computer or computer network by inputting, transmitting,
damaging, deleting, deteriorating, altering or suppressing computer data or program,
electronic document, or electronic data message, without right or authority, including the
introduction or transmission of viruses.
5) Misuse of Devices
a) The use, production, sale, procurement, importation, distribution, or otherwise
making available, without right, of:
• i. A device, including a computer program, designed or adapted primarily for the
purpose of committing any of the offenses under this Act; or
• ii. A computer password, access code, or similar data by which the whole or any
part of a computer system is capable of being accessed with intent that it be used
for the purpose of committing any of the offenses under this Act.
b) The possession of an item referred to in paragraphs 5(a) or (b) above with intent
to use said devices for the purpose of committing any of the offenses under this
section.
6) Cyber-squatting. - The acquisition of a domain name over the internet in bad faith to
profit, mislead, destroy reputation, and deprive others from registering the same, if such a
domain name is:
a) Similar, identical, or confusingly like an existing trademark registered with the
appropriate government agency at the time of the domain name registration:
b) Identical or in any way similar with the name of a person other than the registrant,
in case of a personal name; and c. Acquired without right or with intellectual
property interests in it.
2. COMPUTER-RELATED OFFENSES:
1) Computer-related Forgery.
a) The input, alteration, or deletion of any computer data without right resulting in
inauthentic data with the intent that it be considered or acted upon for legal
purposes as if it were authentic, regardless of whether or not the data is directly
readable and intelligible; or
b) The act of knowingly using computer data which is the product of computer-
related forgery as defined herein, for the purpose of perpetuating a fraudulent or
dishonest design.
2) Computer-related Fraud. -The unauthorized input, alteration, or deletion of
computer data or program or interference in the functioning of a computer system,
causing damage thereby with fraudulent intent: Provided, That if no damage has yet been
caused, the penalty imposable shall be one (1) degree lower.
3) Computer-related Identity Theft. - The intentional acquisition, use, misuse, transfer,
possession, alteration or deletion of identifying information belonging to another,
whether natural or juridical, without right: Provided, that if no damage has yet been
caused, the penalty imposable shall be one (1) degree lower.
3.CONTENT-RELATED OFFENSES:
1)Cybersex. - The willful engagement, maintenance, control, or operation, directly or
indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of
a computer system, for favor or consideration.
2)Child Pornography. - The unlawful or prohibited acts defined and punishable by
Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a
computer system. 3)Libel. The unlawful or prohibited acts of libel as defined in Article
355 of the Revised Penal Code, as amended, committed through a computer system or
any other similar means which may be devised in the future.
4) OTHER OFFENSES
The following acts shall also constitute an offense:
• Aiding or Abetting in the Commission of Cybercrime -Any person who willfully abets
or aids in the commission of any of the offenses enumerated in this Act shall be held
liable.
• Attempt in the Commission of Cybercrime -Any person who willfully attempts to
commit any of the offenses enumerated in this Act shall be held liable.
Who has Jurisdiction over Cybercrime Cases?
The Regional Trial Court shall have jurisdiction over any violation of the provisions of the
Act, including any violation committed by a Filipino national regardless of the place of
commission.
Note: Criminal action for violation of the Act may be filed with the RTC of the province or
city where the cybercrime or any of its elements is committed, or where any part of the
computer system used is situated, or where any of the damage caused to a natural or
juridical person took place
Competent Authorities:
Department of Justice(DOJ) - created an Office of Cybercrime(OOC) within the DOJ
designated as the central authority in all matters related to international mutual assistance and
extradition.
Cybercrime Investigation and Coordinating Center(CICC) - An inter-agency body to be
known as the Cybercrime Investigation and Coordinating Center (CICC), under the
administrative supervision of the Office of the President, for policy coordination among
concerned agencies and for the formulation and enforcement of the national cybersecurity plan.
CICC Composition:
1. Executive Director of the Information and Communications Technology Office under
the Department of Science and Technology (ICTO-DOST) as Chairperson
2. Director of the NBI as Vice Chairperson.
Members
1. the Chief of the PNP;
2. Head of the DOJ Office of Cybercrime; and
3. one (1) representative from the private sector and academe The CICC shall be manned
by a secretariat of selected existing personnel and representatives from the different
participating agencies.
Preservation and Retention of Computer Data:
The integrity of TRAFFIC DATA AND SUBSCRIBER INFORMATION shall be kept,
retained, and preserved by a service provider for a minimum period of SIX (6)
MONTHS FROM THE DATE OF THE TRANSACTION.
CONTENT DATA shall be similarly preserved for SIX (6) MONTHS FROM THE
DATE OF RECEIPT OF THE ORDER from law enforcement authorities requiring its
preservation.
Law enforcement authorities may order a ONE-TIME EXTENSION FOR ANOTHER
SIX (6) MONTHS: Provided, That once computer data that is preserved, transmitted or
stored by a service provider is used as evidence in a case, the mere act of furnishing such
service provider with a copy of the transmittal document to the Office of the Prosecutor shall
be deemed a notification to preserve the computer data until the final termination of the case
and/or as ordered by the Court.
FOR OSAEC and CSAEM - That in the case of CONTENT DATA, the same shall be
PRESERVED WITHIN ONE (1) YEAR, and upon notice by the competent authority, the
preservation shall be EXTENDIBLE FOR ANOTHER SIX (6) MONTHS.
TYPES OF WARRANT:
1. Warrant to Disclose Computer Data (WDCD) DISCLOSURE OF COMPUTER
DATA.
A WDCD requires any person or service provider to disclose subscriber’s
information, traffic data, or relevant data in his/her or its possession or control
within 72 hours from receipt of the order. A request for WDCD may only be filed if
there is a complaint officially docketed and assigned for investigation and the disclosure
is necessary and relevant for the investigation.
A WDCD is an order in writing issued in the name of the People of the
Philippines, signed by a judge, upon application of law enforcement authorities,
authorizing the latter to issue an order to disclose and accordingly, require any person or
service provider to disclose or submit subscriber’s information, traffic data, or relevant
data in his/her or its possession or control.
Contents of WDCD:
a. The probable offense involved.
b. Relevance and necessity of the computer data or subscriber’s information sought
to be disclosed for the purpose of the investigation.
c. Names of the individuals or entities whose computer data or subscriber’s
information are sought to be disclosed, including the names of the individuals or
entities who have control, possession, or access thereto, if available
d. Particular description of the computer data or subscriber’s information sought to
be disclosed.
e. Place where the disclosure of computer data or subscriber’s information is to be
enforced, if available.
f. Manner or method by which the disclosure of the computer data or subscriber’s
information is to be carried out, if available
g. Other relevant information that will persuade the court that there is a probable
cause to issue a WDCD.
2. Warrant to Intercept Computer Data (WICD)
Interception of Computer Data. Interception, as defined under Section 3
(m), Chapter I of RA 10175, may be carried out only by virtue of a court issued
warrant, duly applied for by law enforcement authorities.
Warrant to Intercept Computer Data (WICD). – A WICD is an order in
writing issued in the name of the People of the Philippines, signed by a judge,
upon application of law enforcement authorities, authorizing the latter to carry out
any or all of the following activities:
a) listening to;
b) recording;
c) monitoring;
d) surveillance of the content of communications, including procuring of
the content of computer data, either directly, through access and use of a
computer system or indirectly, through the use of electronic eavesdropping
or tapping devices, at the same time that the communication is occurring.
3. Warrant to Search, Seizure and Examination of Computer data.
Warrant to Search, Seize and Examine Computer Data (WSSECD). -
A Warrant to Search, Seize and Examine Computer Data (WSSECD) is an order
in writing issued in the name of the People of the Philippines, signed by a judge,
upon application of law enforcement authorities, authorizing the latter to search
the particular place for items to be seized and/or examined.
Contents of Application for a WSSECD. – A WSSECD is like a search
warrant, except the subject matter of a WSSECD is computer data.
Upon the conduct of the seizure, law enforcement must file a return stating
the:
(a) devices that were subject of the WSSECD and
(b) the hash value of the computer data and/or the seized computer device
or computer system containing such data
Issuance and Form of WSSECD. - If the judge is satisfied that there is
probable cause to believe that the facts upon which the application for WSSECD
exists, he shall issue the WSSECD.
Refers to the process whereby LEAs, by virtue of a Refers to the process whereby LEAs, by virtue of a
warrant to search, seize, and examine, obtains the warrant to search, seize, and examine, are allowed to
computer data subject thereof for forensic examination, bring the computer device/s and/or part/s of the
without the need of bringing related computer device/s computer system outside the place to be searched in
and/or parts of the computer system outside the place order to conduct the forensic examination of the
to be searched. computer data subject of the warrant.
- Law enforcement authorities shall, if the circumstances so allow, endeavor to FIRST MAKE A
FORENSIC IMAGE OF THE COMPUTER DATA ON-SITE AS WELL AS LIMIT THEIR
SEARCH TO THE PLACE SPECIFIED IN THE WARRANT. OTHERWISE, AN OFF-SITE
SEARCH MAY BE CONDUCTED, provided that a forensic image is, nevertheless, made, and
that the reasons for the said search are stated in the initial return. A person whose computer
devices or computer system have been searched and seized off-site may, upon motion, seek the
return of the said items from the court issuing the WSSECD: Provided, that a forensic image of
the computer data subject of the WSSECD has already been made. The court may grant the
motion upon its determination that no lawful ground exists to otherwise withhold the return of
such items to him.
a. Defamation c. Spamming
b. Cyber Harassment d. Cyberstalking
6. Jolina’s ex-boyfriend opened her laptop and deleted their picture together without any
permission is liable of ___________.
a. Illegal Interception b. Illegal Alteration
c. Illegal Access d. Illegal Infrastructure
(Questions 7-8 are related)
7. Mr. Kampanya has been threatened by his rival, Mr. Kunying, that if he runs for the position
of Brgy. Chairman, his “video scandal” with his secretary will become public. In desperation,
Mr. Kampanya hired a hacker with the codename "Mr. ice-ice-baby" with the promise of 100,000
pesos to access Mr. Kunying's computer and delete every file related to his scandal. What kind of
hacker is he if he agreed to such a proposal?
a. White b. Pink
c. Black d. Gray
8. In the same scenario, what if, after the hacker deleted every file, including Mr. Kunying's
Company's confidential files, Mr. Kunying went to the PNP Cybercrime and reported the hacking
incident? Mr. Kunying, in collaboration with the PNP Cybercrime Unit, has offered a $100,000
reward to anyone who can provide information about the perpetrator. When Mr. "ice-ice-baby"
discovered this, he went to the police and assisted them in solving the case. What kind of hacker
is he in this case?
a. White b. Pink
c. Black d. Gray
9. These are people who did not grew up into a world that was already digital.
a. millennials b. Gen X
c. digital immigrants d. Digital Natives
10. Kardo Aringkingking, a criminology student, was browsing his computer for his cybercrime
assignment when he came across a software called "CYBERCRIMEQandA" Thinking it was a
legitimate program, he downloaded and installed it right away. After how many days he noticed
that his files had been deleted, as well as unexpected and unusual computer activity. What
exactly is this type of malware?
a. Backdoor b. Virus
c. Trojan Horse d. Worm
11. University of the Visayas is preparing for its online classes. They hired an IT expert to set up
its website and learning management system. However, when they registered www.uv.edu.ph on
the internet someone had registered it. Further investigation revealed that a former professor of
the school has registered the domain and asked for 100,000 for the release of the domain name.
Is the professor criminally liable?
12. Henry, who is a gamer, downloaded a certain gaming program, without him knowing this
program monitored his activity, collected his usernames and passwords and other personal
information. This is an example of ___________.
a. Pharming b. Sniffer
c. Spoofing d. Keylogger
13. It is a type of malware that is used to get unauthorized access to a website by cybercriminals.
a. Trojan Horse b. Backdoor
c. 419 Fraud d. Unauthorized Access
14. The willful engagement, maintenance, control, or operation, directly or indirectly, of any
lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for
favor or consideration.
a. Cybercrime b. Cybersex
c. Cyber Pornography d. Online Sexual Activity
15. It is considered the first cybercrime law.
a. RA 10175 b. RA 10627
C. RA 8792 d. RA 9995
16. This is any information contained in the form of computer data or any other form that is held
by a service provider.
a. Surveillance c. Interception
b. Interference d. Illegal Access
24. Albert, aged 30, is a self-proclaimed NGSB (No Girlfriend Since Birth) who, in his quest for
genuine affection, became a member of the "PinayTRULab" Facebook page. This is where his
path crossed with Joanna. Engaging in Facebook conversations for half a year, Albert developed
profound feelings for Joanna, even going so far as to provide her with financial support.
Believing this connection to be everlasting, Albert and Joanna arranged a long-awaited encounter
at MG's Dinugoan Resto. Despite waiting patiently for three hours, Joanna failed to appear.
Subsequently, Albert's attempts to reach Joanna became futile. It was later unveiled that the
pictures of the Facebook account was someone named Kristine Dimacatae, and the individual
with whom Albert had been conversing turned out to be Berto. Albert is a victim of
_____________.
29. Assume that Mr. Y's server recovered from the malware attack, causing Mark to do the
unthinkable. He distributed malware to various computers and took control of them. Mark used
his computer, along with the computer he took control of, to flood Mr. Y's company's server with
authentication requests. This is an illustration of __________.
a. Denial of Server Attack
b. Distributed Denial of Server Attack
c. Denial of Service Attack
d. Distributed Denial of Service Attack
30. In the preceding scenario, the computers that Mark used and took control of were referred to
as ____________
a. Hacked Computer b. Infected Computer
c. Zombie d. Malware Host
(Questions 31-32 are related)
31. Layla de Layla received an email from UM-BANK requesting that she update her account
information. Her personal information was clearly requested in the email. When Layla contacted
UM-BANK, they denied having sent such an email. This is an example of ______________
a. Illegal Solicitation b. Pharming
c. Phishing d. Spoofing
32. Assume that the email Layla received contained a link with the caption "Click Here," and she
clicked the link out of curiosity, and she was redirected to a mirror site. What type of Phishing is
this?
a. Illegal Solicitation b. Pharming
c. Phishing d. Spoofing
33. What do you call the smallest piece of data?
a. Byte b. Code
c. Bit d. Program
34. Bryan and Jessa are online lovers. When face-to-face classes began, Bryan became
increasingly jealous of Jessa's numerous suitors; unable to bear it any longer, Jessa ended her
relationship with Bryan. Bryan, unable to live with his broken heart and hatred for Jessa, he
decided to use packet sniffing software to monitor Jessa's network traffic. Under RA 10175, what
crime was committed?
a. Identity Theft b. Illegal Access
c. Illegal interception d. System Interference
35. Nicole, a criminology student, had feelings for one of her senior classmates. She immediately
stalked his crush's social media account and followed him. During class, she followed him
around without his knowledge, until he saw her crush kissing someone in the Apex Café.
Nonetheless, since she has no way of showing her true feelings, she posted “Ouch krusht kaayo
taka. Jujujuju bawi ko nextlayf” in her Facebook, she was contented in loving him from afar. Can
this be considered as Cyberstalking?
a. No, since she is following him around without his knowledge
b. No, since there was no online stalking done
c. No, since she is already obsessed with him
d. No, since there was no online harassment done
36. This type of attack involves hackers sending malicious email attachments or URLs to users to
gain access to their accounts or computer.
a. Online scam b. Scam
c. Phishing d. Social Engineering
(Questions 37-39 are related)
37. Mark is a CRI 327L-272 student who has a crush on his seatmate, named Nika. Mark,
desperate for romantic relationships, befriended Nika's best friend, Judy, in the hopes that she
would assist him in confessing his feelings for Nika, not realizing that Judy has feelings for him.
Judy, who was heartbroken because the love of her life was in love with her best friend did the
unthinkable. She created a Facebook account using Rika's personal information, including
photos, and used it to post naked pictures, sex scandals, and tagged Nika's friend with each post.
Mark believing it to be Nika's legitimate Facebook Account, was then turned off.
Judy committed what kind of cybercrime?
a. Online scam b. Identity Theft
c. Phishing d. Cyberstalking
38. In the same scenario, what is the criminal liability of Mark?
a. Cyberstalking b. Illegal Content
c. Identity Theft Accomplice d. None
39. Assume that Mark successfully confessed his feelings for Nika but was turned down because
he is not her type. Mark, who can't stand rejection, texted Nika several times on her social media
accounts and via SMS, saying, "Akoa lang ka!! "Bantayan taka permi, di ka maadto sa uban."
This is an illustration of __________.
a. Online Harassment b. Cyberstalking
c. Identity Theft d. Victims of Love
40. These are cybercriminals who uses Deepthroat to compromise computer systems.
a. VSD
b. Hackers
c. Crackers
d. Hacktivists
41. Jolina’s ex-boyfriend opened her laptop and deleted their picture together without any
permission is liable of ___________.
a. Illegal Interception b. Illegal Alteration
c. Illegal Access d. Illegal Infrastructure
42. It refers to a computer or a computer network, the electronic medium in which online
communication takes place.
a. Cyber c. Cybercrime
b. Cyber-attack d. Cyber terrorism
43. Computer is essentially an element of Cyber Criminality, and it is either a tool or target of
Cyber Crimes. The statement is?
a. Correct c. Sometimes correct
b. Incorrect d. Sometimes incorrect
44. It refers to the computer crime, the use of a computer as an instrument to further illegal ends,
such as committing fraud, trafficking in child pornography and intellectual property, stealing
identities, or violating privacy.
a. Cybercrime c. Cyber
b. Cyber terrorism d. Cyberspace
45. A type of cybercriminals wherein law enforcement authorities often use it as a category
which includes vandalism, destructive programs (e.g., viruses and worms), and general mischief
for no economic.
a. Cyberpunks b. Hacker
c. Victor Skill Deficiency d. Cracker
46. What is a malicious program which redirect users’ network traffic to undesired sites?
a. Phishing
b. Spyware
c. Floating windows
d. Redirectors
47. The following are the reasons for vulnerability of computers to cyber criminality except one.
a. Illegal Interception
b. Computer Related Fraud
c. Computer Related Forgery
d. Data Alteration