- 1. AN ACT DECRIMINALIZING VAGRANCY AMENDING ACT
A) RA 10022 B) RA 10158 C) RA 10175
A) Onel De Guzman B) Robert Morris C) David Smith
A) David Smith B) Onel De Guzman C) Robert Morris
- 4. It almost brought development of internet to a complete halt
A) Onel De Guzman B) Robert Morris C) David Smith
- 5. He was sentenced to 20 months of imprisonment
A) Robert Morris B) David Smith C) Onel De Guzman
A) Onel De Guzman B) Robert Morris C) David Smith
- 7. the massive sending of information to a target computer to be crushed. Targets can
either be a personal computer or official computers.
A) Phising B) Cyber Defamation C) Ms Blaster Worm/W32 D) Email Bombing E) Cyber Stalking/Harassment
- 8. Attacks the Microscope Windows
A) Cyber Stalking/Harassment B) Email Bombing C) Phising D) Ms Blaster Worm/W32 E) Cyber Defamation
- 9. form of identity thefts and committed when scammers send a mass email posing as banks,
credit card companies, or popular commercial websites, asking recipients to confirm or update financial information in a hyperlink to a look like coming from the original website.
A) Cyber Stalking/Harassment B) Ms Blaster Worm/W32 C) Cyber Defamation D) Phising E) Cyber defamation
- 10. ny intentional, substantial and unreasonable intrusion to the private life
of a person that makes the person suffer mental distress through the use of the cyber space. An electronic harassment or threats by using Email or Chat room.
A) Cyber defamation B) Credit card fraud C) Cyber Stalking/Harassment D) Email Bombing E) Ms Blaster Worm/W32
- 11. defamation using the internet to injure someone’s reputation. The public nature of
newsgroup, bulletin boards and even email presents the opportunity to publish defamatory statements.
A) Email Bombing B) Credit card fraud C) Cyber Stalking/Harassment D) Ms Blaster Worm/W32 E) Cyber defamation
- 12. committed through copying or cloning of the cards, ATM fraud, Internet Card
Fraud, PIN number stealing.
A) Cyber Stalking/ Harassment B) Credit card fraud C) Cyber defamation D) Ms Blaster Worm/W32 E) Phising
- 13. heft of software’s through the illegal copying of genuine programs. Retail revenue
losses worldwide are increasing due to this crime as a result of end user copying, hard disk downloading counterfeiting, and illegal downloads from the internet.
A) Email Bombing B) Phising C) Software privacy D) Cyber defamation E) Credit card fraud
|