Northwest Samar State University: Republic of The Philippines

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Republic of the Philippines

Northwest Samar State University


Rueda St., Calbayog City 6710
Website: http//www.nwssu.edu.ph
Email: main@nwssu.edu.ph
Telefax: (055) 2093657
ISO 9001:2015 Certified

COLLEGE OF CRIMINAL JUSTICE AND SCIENCES

Name: Marlon M. Maslog Yr & sec.: BSCrim 4 - B


Program/Course: Bachelor of Science in Criminology
Subject: CDI 9

Quiz no. :____________


Assignment no.: __1__

Look for the definition of the following:

1. Cybercrime, also called computer crime, the use of a computer as an instrument to


further illegal ends, such as committing fraud, trafficking in child pornography and
intellectual property, stealing identities, or violating privacy.

2. Substantive law is the set of laws that governs how members of a society are to behave. It
is contrasted with procedural law, which is the set of procedures for making, administering,
and enforcing substantive law.

3. Procedural law, adjective law, in some jurisdictions referred to as remedial law, or rules of
court comprises the rules by which a court hears and determines what happens in civil,
lawsuit, criminal or administrative proceedings.

4. Preventive law is a branch of law that endeavors to minimize the risk of litigation or to
secure more certainty as to legal rights and duties.

5. Harmonisation seeks to 'effect an approximation or coordination of different legal


provision or systems by eliminating major differences and creating minimum requirements
or standards'”. Harmonisation can be seen as a step towards unification and, in a way,
harmonisation aims or strives towards unification.
Republic of the Philippines
Northwest Samar State University
Rueda St., Calbayog City 6710
Website: http//www.nwssu.edu.ph
Email: main@nwssu.edu.ph
Telefax: (055) 2093657
ISO 9001:2015 Certified

6. An Internet Protocol address is a numerical label such as 192.0.2.1 that is connected to a


computer network that uses the Internet Protocol for communication. An IP address serves
two main functions: host or network interface identification and location addressing.

7. Software, instructions that tell a computer what to do. Software comprises the entire set
of programs, procedures, and routines associated with the operation of a computer
system. ... A set of instructions that directs a computer's hardware to perform a task is
called a program, or software program.

8. Aiding
help, assist, or support (someone or something) in the achievement of something. Aiding
and abetting is a legal doctrine related to the guilt of someone who aids or abets another
person in the commission of a crime. It exists in a number of different countries and
generally allows a court to pronounce someone guilty for aiding and abetting in a crime
even if they are not the principal offender.

9. Abetting
encourage or assist (someone) to do something wrong, in particular, to commit a crime or
other offense.

10. Traffic data is defined as: “any data processed for the purpose of the conveyance of a
communication on an electronic communications network or for the billing in respect of
that communication and includes data relating to the routing, duration or time of a
communication”.

11. If successful in infecting a network, malware can spread quickly to devices such as
computers and other hardware. Malware can expose and leak sensitive information just as
quickly. How malware goes about infecting a network depends on how it is delivered.
12. Illegal Information is an kind of information, data or any forms of text which is illegal to
possess, utter, propagate, or otherwise transmit in some legal jurisdiction.
13. Committing Fraud intentional perversion of truth in order to induce another to part with
something of value or to surrender a legal right was accused of credit card fraud.
14. Child pornography is pornography that exploits children for sexual stimulation. It may be
produced with the direct involvement or sexual assault of a child or it may be simulated
Republic of the Philippines
Northwest Samar State University
Rueda St., Calbayog City 6710
Website: http//www.nwssu.edu.ph
Email: main@nwssu.edu.ph
Telefax: (055) 2093657
ISO 9001:2015 Certified

child pornography and The act of recruiting, transporting, transferring, harbouring or


receiving a person; By means of e.g. coercion, deception or abuse of vulnerability; For the
purpose of exploitation, such as sexual exploitation, slavery and forced labour, among
others.
15. Trafficking Intellectual Property crime is committed when someone manufactures, sells
or distributes counterfeit or pirated goods, such as such as patents, trademarks,

You might also like