COMPOL 2 Yang💚
  • 1. AN ACT DECRIMINALIZING VAGRANCY AMENDING ACT
A) RA 10175
B) RA 10158
C) RA 10022
  • 2. Internet Worm
A) Robert Morris
B) Onel De Guzman
C) David Smith
  • 3. The world famous worm
A) Onel De Guzman
B) David Smith
C) Robert Morris
  • 4. It almost brought development of internet to a complete halt
A) Onel De Guzman
B) David Smith
C) Robert Morris
  • 5. He was sentenced to 20 months of imprisonment
A) Onel De Guzman
B) Robert Morris
C) David Smith
  • 6. Melissa Virus
A) David Smith
B) Robert Morris
C) Onel De Guzman
  • 7. the massive sending of information to a target computer to be crushed. Targets can
    either be a personal computer or official computers.
A) Ms Blaster Worm/W32
B) Cyber Defamation
C) Phising
D) Email Bombing
E) Cyber Stalking/Harassment
  • 8. Attacks the Microscope Windows
A) Email Bombing
B) Cyber Defamation
C) Ms Blaster Worm/W32
D) Cyber Stalking/Harassment
E) Phising
  • 9. form of identity thefts and committed when scammers send a mass email posing as banks,
    credit card companies, or popular commercial websites, asking recipients to confirm or update financial
    information in a hyperlink to a look like coming from the original website.
A) Ms Blaster Worm/W32
B) Cyber Stalking/Harassment
C) Cyber Defamation
D) Cyber defamation
E) Phising
  • 10. ny intentional, substantial and unreasonable intrusion to the private life
    of a person that makes the person suffer mental distress through the use of the cyber space. An electronic
    harassment or threats by using Email or Chat room.
A) Cyber Stalking/Harassment
B) Email Bombing
C) Credit card fraud
D) Cyber defamation
E) Ms Blaster Worm/W32
  • 11. defamation using the internet to injure someone’s reputation. The public nature of
    newsgroup, bulletin boards and even email presents the opportunity to publish defamatory statements.
A) Email Bombing
B) Cyber defamation
C) Ms Blaster Worm/W32
D) Cyber Stalking/Harassment
E) Credit card fraud
  • 12. committed through copying or cloning of the cards, ATM fraud, Internet Card
    Fraud, PIN number stealing.
A) Cyber Stalking/ Harassment
B) Cyber defamation
C) Credit card fraud
D) Ms Blaster Worm/W32
E) Phising
  • 13. heft of software’s through the illegal copying of genuine programs. Retail revenue
    losses worldwide are increasing due to this crime as a result of end user copying, hard disk downloading
    counterfeiting, and illegal downloads from the internet.
A) Phising
B) Email Bombing
C) Credit card fraud
D) Software privacy
E) Cyber defamation
Created with That Quiz — the math test generation site with resources for other subject areas.