Cdi 3

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

2.

An extra judicial confession obtained from a suspect is admissible in a court of law if it was made in the presence of a counsel of
his own choice and must be in ___.
a. the presence of a fiscal b. the presence of a police investigator
b. writing d. front of a judge
4. The questioning of a person in a formal and systematic way and is most often used to question criminal suspects to determine
their probable guilt or innocence.
a. Inquiry b. interview (informal procedure of gathering information)
b. polygraph examination d. interrogation
6. Fiscal and Prosecutors are under the control and supervision of the ___.
a. National Bureau of Investigation (under of DOJ also)
b. Department of the Interior and Local Government
c. Supreme Court (under of DOJ also)
d. Department of Justice
8. The Anti-Bouncing Check Law.
a. RA 6425 (Dangerous Drugs Act of 1972)
b. RA 8353 (An Act Expanding the Definition of the Crime of Rape and Reclassifying the same as Crime Against Persons)
c. BP.22
d. RA 6975 (DILG Act of 1990)
10. An examination of an individual’s person, houses, or effects or a building, or premises with the purpose of discovering contraband
or personal properties connected in a crime.
a. Search
b. Raid (unexpected visit by police or other law enforcement officers with the aim of using the element of surprise)
c. Investigation
d. Seizure (happens if the officers take possession of items during the search)
12. Refers to all activities done with criminal intent in cyberspace. Crimes committed with the use of Information Technology, where
computer, network, internet is the target and where the internet is the place of activity.
a. Money laundering (disguising financial assets so they can be used without detection of the illegal activity that produced
them)
b. Cybercrime
c. Human trafficking (the unlawful act of transporting or coercing people to benefit from their work or service, typically
in the form of forced labor or sexual exploitation.)
d. Drug trafficking
14. PO1 “A” caught “ B “ one night in the act of removing the glass jalousies of the window of the house of “C” which was closed. “
B “ had already detached the three glass blades. If A was arrested, What crime should brought against B?
a. Attempted Robbery
b. Attempted trespass to dwelling
c. Attempted Theft
d. Consummated theft
e. Consummated to the space Dwelling
16. To obtain admission and confession of guilt is the primary purpose of ___.
a. interview b. surveillance
c. investigation d. interrogation
18. Can a husband testify against the wife in an adultery case?
a. Yes, the privilege of marital communication rule is already abolished
b. Yes, under the law she is a competent witness
c. No
d. Yes, because crime charge is one committed by the wife against husband
20. A is a supply officer of a Municipality. He entered into an agreement with B to supply the Municipality with some office forms at
a price grossly disadvantageous to the Municipality. The agreement as part of the purchase price must be given to A. The
transaction did NOT materialize. A is may be liable for:
a. Attempted Estafa c. Frustrated Estafa
b. Attempted fraud d. Consummated fraud

22. A treasury warrant was payable to A or his representative. B took possession of the warrant, wrote the name of A, endorsed it at
the back and was able to encash it . B is liable for:
a. Estafa c. Falsification
b. Forgery d. All of these
24. In what instance can alibi (the weakest defense) acquire commensurate strength in evidential value?
a. When it changes the burden of proof
b. When evidence for the prosecution is strong
c. Where no positive and proper identification has been satisfactory made
d. When questions on whether or not accused committed the offense is clear
26. A with intent to kill B, burn the house B. B died. What crime A committed?
a. Arson with murder d. Murder only
b. Arson Only e. All of the above
c. Homicide only
28. A is walking a certain street, on his way, he found 100 pesos bill. A went in a certain restaurant and spend the money to pay the
food he eat, what did A committed?
a. Swindling d. Theft
b. Estafa e. Robbery
c. None of these
30. The body of the dead person is _______ if his death is at the issue.
a. Real evidence
b. Testimonial evidence if testified by medico – legal
c. Secondary evidence
d. Corroborative evidence of death
e. none of these
32. Which of these statements of the suspect directly acknowledging his criminal guilt?
a. Admission (verbal or written, made by the party in the course of the proceedings in the same case, does not require proof)
c. Confession (is an acknowledgement of guilt made by a person after an offense has been committed)
b. Acknowledgement d. Deposition (a formal written statement, made for example by a witness to a crime,
which can be used in a court of law if the witness cannot be present.
34. Using diversionary tactics, the robbers deceive their victims by padding fake peso bills into real ones.
a. Ativan gang
b. Budol-budol gang
c. Dugo-dugo gang
d. Salisi gang
36. It refers to the questioning where the interviewer asks more than one question at the same time.
A. Open-ended Questions
B. Closed Questions
C. Forced - choice Questions
D. Multiple Questions
38. The questioning of persons not suspected of being involved in a crime,but who knows about the crime or individuals involved in
it.
A. Interrogation
B. rumor mongering
C. interview
D. inquiry
40. It refers to the questions that allow the suspect to reply with longer, more detailed responses and lack direction from the
interviewer.
A. Open-Ended Questions
B. Closed Questions
C. Forced - choice Questions
D. Multiple Questions
42. It is defined as a structures conversation where one person or the “interviewer” seeks to gather information from another or the
“interviewee” as part of the investigation or intelligence operation.
A. Investigative Interviewing
B. Interrogation
C. Interview
D. Behavior Analysis Interview
44. It pertains to an oral or written statement acknowledging guilt.
A. Admission
B. Confession
C. Factual Analysis
D. Interrogation
46. It is process of questioning by which police obtain evidence.
A. Investigative Interviewing
B. Interrogation
C. Interview
D. Behavior Analysis Interview
48. This type of evidence include affidavit of the complainant and witnesses.
A. Testimonial Evidence
B. Paper Evidence
C. Documentary evidence
D. Object Evidence
50. This type of evidence include computers, electronic devices and instruments used in taking and distribution of pornography and
means to control and the child victims.
A. Testimonial Evidence
B. Paper Evidence
C. Documentary evidence
D. Object Evidence
52. SIM stands for ____.
A. Subscriber Identifying Module
B. Subscriber Identity Moment
C. Subscriber Identity Module
D. Subscriber Identify Moment
54. PNP - ACG stands for _____.
A. Philippine National Police Anti- Cybercrime Group
B. Philippine National Police Anti -Crime Rate Group
C. Philippine National Police Anti -Crime Campaign Group
D. Philippine National Police Anti -Crime security Group
56. Crimes that are directed to a person’s belongings, intellectual properties and money
A. Crime against property
B. theft
C. robbery
D. Malicious mischief
58. A term that describes an individual or group's habitual way of operating, which represents a discernible pattern
A. Motive
B. Modus Operandi
C. Financial Report
D. Evidence
60. This pertains to the reason or reasons why the suspect committed the crime.
A. Motive
B. Modus Operandi
C. Financial Report
D. Evidence
62. Statement of the suspect directly acknowledging his guilt.
a. admission b. confession
c. deposition d. accusation
64. The following are example of this type of evidence: photographs, videos, police reports, and other documents
A. Testimonial Evidence
B. Object Evidence
C. Documentary Evidence
D. Physical Evidence
66. The following are example of this type of evidence: affidavit of complaint and witnesses
A. Testimonial Evidence
B. Object Evidence
C. Documentary Evidence
D. Physical Evidence
68. A search warrant shall be valid for _____ days from its date. Thereafter, it shall be void.
a. 10 b. 15
c. 30 d. 45
70. This refers to the acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive
other from registering the same, if such a domain name.
a. Cyber Sexual Exploitation c. Cybersex
b. Cybersquatting (poser) d. Cyber libel
72. Republic Act No. 7610 is also known as ____.
a. Special Protection of a Child Against Abuse, Exploitation and Discrimination Act.
b. Special Protection of Children Against Abuse, Exploitation and Discrimination Act.
c. Special Protection of Human Against Abuse, Exploitation and Discrimination Act.
d. Special Protection of Adult Against Abuse, Exploitation and Discrimination Act.
74. Republic Act No. 11075 is also known as ____.
a. Cyber Libel Prevention Act of 2012
b. Cybersex Prevention Act of 2012
c. Cybersquatting Prevention Act of 2012
d. Cybercrime Prevention Act of 2012
76. It is the use of a computer as an instrument to further illegal ends
a. Cyber Crime c. Cybersex
b. Cybersquatting d. Cyber libel
78. Presidential Decree No. 532 is also known as ___
a. Anti - Piracy and Anti-Highway Robbery Law of 1964
b. Anti - Piracy and Highway Robbery Law of 1964
c. Piracy and Anti-Highway Robbery Law of 1964
d. Piracy and Highway Robbery Law of 1964
80. Republic Act 381, of 1930, is commonly known as ___.
a. Penal Code of the Philippines
b. Special Penal Code of the Philippines
c. Revised Penal Code of the Philippines
d. Filipino Penal Code of the Philippines
82. These are attempts against another’s property inspired sometimes by hatred or a desire for revenge and sometimes by the mere desire for
pleasure.
a. Littering c. Malicious Mischief
b. loitering d. Vandalism
84. Swindling is also known as ___
a. Fraudulent c. Estafa
b. Fraud d. Damage to property
86. The perpetrator finds a lost item/property and failed or did note intend to deliver the lost property to its rightful owner.
a. Asportation c. Damage to property
b. Lost Property d. Hunting or Gathering
88. The violator enters an enclosed estate or a field without any consent of the owner, and where trespass is forbidden.
a. Asportation c. Damage to property
b.Lost Property d. Hunting or Gathering
90. They are also known as Highway Robbers.
a. Briganda c. Brigada
b. Brigands/brigandage d. Brigadir
92. It is an act of making or drawing and issuance of check without sufficient funds of credit.
a. Phishing c. Hacking
b. Bouncing checks d. Cyber Phishing
94. his involves offenses such as online fraud and IP theft.
a. Cyber-Trespass c. Ceber-Porn and Obscenity
b. Cyber - Deception and Theft d. Cyber-Violence
96. This refers to the kind of emotional violence that can be enacted online such as bullying or harassment.
a. Cyber-Trespass c. Ceber-Porn and Obscenity
b. Cyber - Deception and Theft d. Cyber-Violence
98. It refers to the declaration of a dying person.
a. Dying Declaration c. Act or Declaration about Pedigree
b. Declaration Against Interest d. Family Declaration
100. This is one of the classifications of physical evidence that includes cigarette butts, jewelry, matches, spoon and fork, syringe, broken finger
nails, magnetic tape, recording or writing instruments, tapes that can link a person to a crime scene, etc.
a. Questioned documents c. Miscellaneous Evidence
b. Hair and fiber d. Impressions
102. It can be prime sources of physical evidence.
a. The Evidence
b. The Suspect
c. The Victim
d. The Crime Scene

You might also like