A) Improve health B) Promote sleep only C) Alter mental and physical state D) Increase intelligence
A) Comprehensive Dangerous Drugs Act of 2002 B) Civil Code C) Labor Code D) Revised Penal Code
A) Experimentation B) Addiction C) Dependence D) Abuse
A) Compulsive drug seeking B) Occasional use C) Legal use D) BControlled use
A) Commission on Audit B) Department of Tourism C) Bureau of Customs D) Philippine Drug Enforcement Agency
A) Methamphetamine hydrochloride B) Cocaine C) Marijuana D) Heroin
A) Psychological only B) None C) Both physical and psychological D) Physical only
A) Use B) Possession C) Experimentation D) Trafficking
A) Trial B) Education and awareness C) Arrest D) Punishment
A) Arrest suspects B) Punish users C) Investigate crimes D) BTreat and reintegrate users
A) All of the above B) Society only C) Family only D) Individual only
A) Advertise B) Document legal transactions C) Educate D) Entertain
A) A contract B) A decision C) A law D) A sworn written statement
A) Formal charge filed in court B) Verbal statement C) Opinion D) Agreement
A) DA case B) A legally binding agreement C) A law D) A promise only
A) Clarity and precision B) Entertainment C) Decoration D) Creativity
A) File complaint B) Command appearance in court C) Arrest D) Decide case
A) Vague B) Clear and concise C) Ambiguous D) Emotional
A) Witness B) Judge C) Lawyer D) Police officer
A) Signature only B) Decision C) Title and parties D) Evidence
A) Opinion B) Suggestion C) Statement D) Promise under penalty of law
A) Accurate and complete B) Emotional C) Informal D) Creative
A) In police stations B) Using computers or the internet C) Physically D) In courts
A) RA 9165 B) RA 7610 C) RA 6713 D) RA 10175
A) Programming B) Legal access C) Data entry D) Unauthorized access to systems
A) Fraud using fake emails/websites B) Hacking hardware C) Programming D) Fishing
A) Software designed to harm B) Hardware C) Network D) Website
A) Hardware B) Application C) Malware D) Network
A) Arrest B) Online harassment C) Legal action D) Physical harm
A) Electronic data B) Documents only C) Photos only D) Witnesses
A) Digital forensic analysis B) Court trial only C) Physical search only D) Arrest only
A) Using another person’s identity B) Hacking system C) Stealing money only D) Virus attack
A) Install apps B) Slow computers C) Delete files D) Protect accounts
A) Burn data B) Store data C) Delete files D) Protect networks
A) Custodial Investigation B) Criminal Investigation C) Undercover Investigation D) Preliminary Investigation
A) Interview B) Instrumentation C) Inquiry D) Interrogation
A) Rep Ipsa Loquitor B) Flagrante Delicto C) Corpus Delicti D) Mens Rea
A) Strategic B) Tactical C) Roping D) Tailing
A) Regular B) Cultivated C) Classified D) Grapevine
A) Flaviano Guerero B) Agustin Patricio C) Raphael Crame D) Epimaco Velasco
A) Rule of Operation B) Habit of Operation C) Routine of Operation D) Mode of Operation
A) Admission B) Declaration C) Confession D) Justification
A) Convoy B) Detective C) Investigator D) Surveillant
A) Conclusive B) Prima Facie C) Associative D) Circumstantial
A) Lead B) Intelligence C) Fact D) Information
A) To create laws B) To punish the suspect C) To identify and locate the offender D) To defend the accused
A) Interrogation B) Arrest C) Surveillance D) Investigation
A) Enforce traffic laws B) Collect taxes C) Issue licenses D) Repair roads
A) Turn B) Stop C) Go D) Slow down
A) Parking space B) Priority to proceed C) Road ownership D) Road size
A) Interview witnesses B) File report C) Secure the scene D) Arrest suspect
A) Driver identity B) Vehicle color C) Insurance status D) Speed of vehicle
A) Speeding only B) Stolen vehicle C) Parking violation D) Driver leaving accident scene
A) Driving fast B) Overtaking always C) Ignoring signs D) Avoiding risks and hazards
A) Ticket B) License C) Traffic Accident Report D) Passport
A) Weather B) Road signs C) Human error D) Vehicles
A) Driving under influence B) Driving underground C) Driving unsafe D) Driving unlimited
A) People crossing B) Motorcycles C) Vehicles D) Parking
A) Inform and document facts B) Sell Product C) invest D) Enrertain
A) Body B) Conclusion C) Title D) Introduction
A) Clear and objective B) Happy C) Drained D) Confusing
A) Objective B) Funny C) Informal D) Casual
A) Introduction B) Joke section C) Body D) Conclusion
A) Speaking B) Checking errors C) Writing fast D) Printing
A) Accurate B) False C) Hidden D) Random
A) Be funny B) Be long C) Add new ideas D) Summarize findings
A) Writing original B) Copying without credit C) Editing text D) Reading books
A) Main idea B) Example C) Ending D) Title
A) Dot B) Emojis C) Technical terms used properly D) Slang
A) Fire triangle (heat, fuel, oxygen) B) Wind only C) Sand D) Water only
A) Intentional burning B) Accidental fire C) Electrical issue D) Natural fire
A) BFP B) NBI C) PNP D) PECU
A) Burn area B) Scene C) Spot D) Origin
A) Interview media B) Secure the area C) Arrest suspect D) Write report
A) Increase heat B) Spread smoke C) Put out fire D) Start fire
A) Ordinary combustibles B) Metals C) Electrical D) Gas
A) Solid B) Water C) Air D) Gas particles from burning
A) Burn patterns B) Soil C) Water D) Ashes only
A) Coldest point B) Lowest temp a liquid ignites C) Highest temp D) Freezing point
A) Making smoke B) Ignoring fire C) Burning waste D) Stopping fire before it starts |