Professional Documents
Culture Documents
Mock Board
Mock Board
Name:_________________________________ Date:_______________
Year/Section: _______________ Score:________________
1. A burned body found was subjected to autopsy; however examination of lungs and blood showed
no abnormal quantity of Carbon Monoxide or Dioxide, what will be your interpretation under
circumstance?
a. The person died because of burning
b. The person died because of asphyxia
c. The person was killed before he was burned
d. The person died not of fire because of suffocation
2. An extra judicial confession obtained from a suspect is admissible in a court of law if it was made
in the presence of a counsel of his own choice and must be in ___.
a. the presence of a fiscal b. the presence of a police investigator
b. writing d. front of a judge
3. The law amending the definition of RAPE and reclassifying it, as a crime against person is
a. RA#7679 c. RA#8353
b. RA#7877 d. RA#8551
4. The questioning of a person in a formal and systematic way and is most often used to question
criminal suspects to determine their probable guilt or innocence.
a. inquiry b. interview
b. polygraph examination d. interrogation
6. Fiscal and Prosecutors are under the control and supervision of the ___.
a. National Bureau of Investigation
b. Department of the Interior and Local Government
c. Supreme Court
d. Department of Justice
7. Committed by any person who, with intent to gain but without violence or intimidation of persons
nor force upon things, shall take personal property of another without the latter’s consent.
a. Robbery c. Kidnapping
b. brigandage d. Theft
10. An examination of an individual’s person, houses, or effects or a building, or premises with the
purpose of discovering contraband or personal properties connected in a crime.
a. search b. raid
c. investigation d. seizure
11. Refers to all activities done with criminal intent in the cyberspace. Crimes committed with the use
of Information Technology, where computer, network, internet is the target and where the internet
is the place of activity.
a. Money laundering c. Human trafficking
b. Cybercrime d. Drug trafficking
12. What is the stage of a commission of a felony when all the elements necessary for its execution is
present?
a. Attempted c. Consummated
b. Frustrated d. Enumerated
13. PO1 “A” caught “ B “ one night in the act of removing the glass jalousies of the window of the
house of “C” which was closed. “ B “ had already detached the three glass blades. If A was
arrested, What crime should brought against B?
a. Attempted Robbery
b. Attempted trespass to dwelling
c. Attempted Theft
d. Consummated theft
e. Consumated to the space Dwelling
14. Pedro Penduko, a receiving teller of the Philippine National Bank, taking advantage of his
position, appropriated the amount of P1,000.00 which he had in his possession. What crime was
committed by Pedro Penduko?
a. Theft d. Estafa
b. Qualified theft e. Malversation
c. No crime was committed
15. To obtain admission and confession of guilt is the primary purpose of ___.
a. interview b. surveillance
c. investigation d. interrogation
16. A notary public issued a supposed copy of deed of safe, when in fact no such deed of sale was
prepared by him. A is liable for?
a. Estafa c. Falsification
b. Forgery d. All of these
18. The questioning of a person by law enforcement officers after that person has been taken into
custody.
a. preliminary investigation b. interrogation
b. custodial investigation d. cross examination
19. A is a supply officer of a Municipality. He entered on an agreement with B to supply the
Municipality with some office forms at the price grossly disadvantageous to the Municipality. The
agreement as part of the purchase price must be given to A. The transaction did NOT
materialized. A is may be liable for:
a. Attempted Estafa c. Frustrated Estafa
b. Attempted fraud d. Consummated fraud
20. A, the neighbor of B, shot the pig of B which was eating A’s camote plant’s. A thereafter cook the
pig’s meat consumed the same. What is A liable for?
a. Anti- fencing law d. Malicious mischief
b. Anti cuttle- rustling law e. Theft
c. Cruelty of animals
21. A treasury warrant was payable to A or his representative. B took possession of the warrant, wrote
the name of A, endorsed it the back and was able to encash it . B is liable for:
a. Estafa c. Falsification
b. Forgery d. All of these
22. What rule is observed when generally, there can be no evidence of a writing, the contents of
which is the subject matter of inquiry other than the original it self.
a. Secondary evidence c. hard evidence
b. Corollary evidence d. Parol evidence e. best evidence
23. In what instance can alibi (the weakest defense) acquire commensurate strength in evidential
value?
a. When it changes the burden of proof
b. When evidence for the prosecution is strong
c. Where no positive and proper identification has been satisfactory made
d. When questions on whether or not accused committed the offense is clear
24. A and B, living together as a husband and wife, but not married. A killed B. What crime does
committed?
a. Murder only d. Murder and Homicide
b. Homicide only e. Parricide only
c. None of these
25. A with intent to kill B, burn the house B. B died. What crime A committed?
a. Arson with murder d. Murder only
b. Arson Only e. All of the above
c. Homicide only
26. Which of the following evidence is the same, as that which is already given?
a. Corroborative evidence c. “Factum Evidence”
b. Cumulative evidence d. Testimonial evidence
27. A is walking a certain street, on his way, he found 100 pesos bill. A went in a certain restaurant
and spend the money to pay the food he eat, what did A committed?
a. Swindling d. Theft
b. Estafa e. Robbery
c. None of these
28. When is presented in court for admissibility considered relevant of the issue?
a. When it is not excluded by the rules
b. When it has a direct bearing and actual connection to the facts and issue
c. When it is not repugnant in taste
d. When it is not immoral
29. The body of the dead person is _______ if his death is at the issue.
a. Real evidence
b. Testimonial evidence if testified by medico – legal
c. Secondary evidence
d. Corroborative evidence of death
e. none of these
30. How should the plea to a “complaint” or “information” be made by the accused?
a. Personality, in open court and of record
b. By approval of the court and upon written request by the accused
c. Through counsel in open court and on record
d. None of these
31. Which of these statements of the suspect directly acknowledging his criminal guilt?
a. Admission c. Confession
b. Acknowledgement d. Deposition
32. A search Warrant is valid and can only be served once the date of issuance, within:
a.40 days d 30 days
b. 15 days e. Either or Neither
c. 10 days
33. Using diversionary tactics, the robbers deceive their victims by padding fake peso bills into real
ones.
a. Ativan gang c. Dugo-dugo gang
b. Budol-budol gang d. Salisi gang
34. Pedro stole the cow of Juan. What was the crime committed?
A. Robbery C. Qualified Theft
B. Farm Theft D. Simple Theft
35. It refers to the questioning where the interviewer asks more than one question at the same time.
A. Open-ended Questions C. Forced - choice Questions
B. Closed Questions D. Multiple Questions
36. It refers to the questions that require more definite and distinct answers.
A. Open-ended Questions C. Forced - choice Questions
B. Closed Questions D. Multiple Questions
37. The questioning of persons not suspected of being involved in a crime,but who knows about the
crime or individuals involved in it.
A. Interrogation
B. rumor mongering
C. interview
D. inquiry
38. It refers to the questions that greatly restrict the possible answers to those that you have
determined.
A. Open-ended Questions C. Forced - choice Questions
B. Closed Questions D. Multiple Questions
39. It refers to the questions that allow the suspect to reply with longer, more detailed responses and
lack direction from the interviewer.
A. Open-Ended Questions C. Forced - choice Questions
B. Closed Questions D. Multiple Questions
40. It refers to the questions that induce a particular reply and be judged to have manipulated the
interviewee.
A. Leading Questions C. Forced - choice Questions
B. Closed Questions D. Multiple Questions
41. It is defined as a structures conversation where one person or the “interviewer” seeks to gather
information from another or the “interviewee” as part of the investigation or intelligence
operation.
A. Investigative Interviewing C. Interview
B. Interrogation D. Behavior Analysis Interview
44. It refers to the express or implied statement tending to support the suspect’s involvement in the
crime, but insufficient by itself to prove guilt.
A. Admission C. Factual Analysis
B. Confession D. Interrogation
46. This type of evidence include contract of employment/business permits, photographs, videos,
publications, records, police records, forensic reports and other pertinent documents.
A. Testimonial Evidence C. Documentary evidence
B. Paper Evidence D. Object Evidence
47. This type of evidence include affidavit of the complainant and witnesses.
A. Testimonial Evidence C. Documentary evidence
B. Paper Evidence D. Object Evidence
52. The three tools in criminal investigation, whereby their application varies in proportion on their
necessity to establish the guilt of the accused in a criminal case.
A. information, interrogation, instrumentation
B. detection, apprehension, conviction ‘
C. inquiry, observation, conclusion
D. magnifying glass, pencil, tape measure
55. Crimes that are directed to a person’s belongings, intellectual properties and money
A. Crime against property C. robbery
B. theft D. Malicious mischief
57. A term that describes an individual or group's habitual way of operating, which represents a
discernible pattern
A. Motive C. Financial Report
B. Modus Operandi D. Evidence
58. It includes the names, aliases and nicknames of the suspect(s), the present address, occupation,
places of enjoyment, habits, associates, family history, and past criminal records and physical
descriptions.
A. Evidence C. Suspects
B. Crime Reports D. Photograph
59. This pertains to the reason or reasons why the suspect committed the crime.
A. Motive C. Financial Report
B. Modus Operandi D. Evidence
a. admission b. confession
c. deposition d. accusation
62. The following are example of this type of evidence: photographs, videos, police reports, and other
documents
A. Testimonial Evidence C. Documentary Evidence
B. Object Evidence D. Physical Evidence
63. It may be a direct acknowledgement of the truth of the guilty fact as charge or of some essential
part of the commission of the criminal act itself.
a. admission b. confession
c. deposition d. accusation
64. The following are example of this type of evidence: affidavit of complaint and witnesses
A. Testimonial Evidence C. Documentary Evidence
B. Object Evidence D. Physical Evidence
65. It is public and malicious imputation of a crime, or of a vice or defect, real or imaginary, or any
act, omission, condition, status, or circumstance tending to cause the dishonor, discredit, or
contempt of a natural or judicial person, or to blacken the memory of one who is dead.
a.Cyber Libel c. Libel
b. Cybercrime d. Defamation
66. A search warrant shall be valid for _____ days from its date. Thereafter, it shall be void.
a. 10 b. 15
c. 30 d. 45
67. The willful engagement, maintenance, control, or operation, directly or indirectly, of any
lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for
favor or consideration.
a.Child Sexual Exploitation c. Human Traficking
b. Cybersex d.Private Communication
68. This refers to the acquisition of a domain name over the internet in bad faith to profit, mislead,
destroy reputation, and deprive other from registering the same, if such a domain name.
a.Cyber Sexual Exploitation c. Cybersex
b. Cybersquatting d. Cyber libel
69. It is the act of trading and dealing with children including, but not limited to, the act of buying and
selling of a child for money, or for any other consideration, or barter.
a.Child trafficking c. Drug Trafficking
b. Human Trafficking d. None of these
77. It is one of the sources of the Philippine Criminal Law, aside from the Revised Penal Code.
a. Penal Code c. Special Penal Code
b. Revised Penal Code d. Filipino Penal Code
79. It is the intentional burning or setting fire to the property of another or own property under
circumstances which expose to danger the life or property of another.
a. Arson c. Fire Tech
b. Fire Crime d. Destructive Arson
80. These are attempts against another’s property inspired sometimes by hatred or a desire for revenge
and sometimes by the mere desire for pleasure.
a. Littering c. Malicious Mischief
b.loittering d. Vandalism
81. Culpabale Insolvency is also known as ____.
a. Capable Insolvency c. Fraud Insolvency
b.Fraudulent Insolvency d. Fraudable Insolvency
83. It is the carrying away of someone else property that is an element of larceny.
a. Asportation c. Damage to property
b.Lost Property d. Hunting or Gathering
84. The perpetrator finds a lost item/property and failed or did note intend to deliver the lost property
to its rightful owner.
a. Asportation c. Damage to property
b.Lost Property d. Hunting or Gathering
85. The offender maliciously damages the property of others, and he removes or makes use of the
fruits or objects of the damage caused by him.
a. Asportation c. Damage to property
b.Lost Property d. Hunting or Gathering
86. The violator enters an enclosed estate or a field without any consent of the owner, and where
trespass is forbidden.
a. Asportation c. Damage to property
b.Lost Property d. Hunting or Gathering
87. According to the 1930 Revised Penal Code of Philippines , it is committed by any person who,
with intent to gain but without violence against or intimidation of persons nor force upon things,
shall take personal property of another without the latter’s consent.
a. Usurpation c. Qualified Theft
b.Unqualified Theft d. Theft
90. It is an act of making or drawing and issuance of check without sufficient funds of credit.
a. Phishing c. Hacking
b.Bouncing checks d. Cyber Phishing
94. This refers to the kind of emotional violence that can be enacted online such as bullying or
harassment.
a. Cyber-Trespass c. Ceber-Porn and Obscenity
b.Cyber - Deception and Theft d. Cyber-Violence
95. It a type of malicious code or program written to alter the way a computer operates and is
designed to spread from one computer to another.
a. Computer Virus c. I Love You Virus
b. Resident Virus d. Direct Action Virus
97. It is exclusionary rule, prohibiting hearsay or out of court statements offered as proof of that
statement, from being admitted as evidence because of the inability of the other party to cross-
examine the maker of the statement.
a. Interest Rule c. Hearsay Rule
b.Hershey Rule d. Rumor Rule
98. This is one of the classifications of physical evidence that includes cigarette butts, jewelry,
matches, spoon and fork, syringe, broken finger nails, magnetic tape, recording or writing
instruments, tapes that can link a person to a crime scene, etc.
a. Questioned documents c. Miscellaneous Evidence
b. Hair and fiber d. Impressions
99. It is the focus of the preliminary investigation and also the primary source of physical evidence.
a. The Evidence c. The Victim
b.The Suspect d. The Crime Scene