Quiz On RA 10175

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Identification Questions:

1. What is the title of Republic Act No. 10175?


2. What is the main purpose of Republic Act No. 10175?
3. Which government agencies are responsible for the efficient law enforcement of
the Cybercrime Prevention Act?
4. What is the definition of "cyber" according to the Act?
5. What is the penalty for offenses under Section 4(a)(5) of the Act?
6. What is the jurisdiction of the Regional Trial Court regarding violations of the
Act?
7. What is the composition of the Cybercrime Investigation and Coordinating
Center (CICC)?
8. How much annual appropriation is allocated for the implementation of the Act?
9. What is the duty of law enforcement authorities regarding cybercrime cases?
10. What is the purpose of the Cybercrime Investigation and Coordinating Center
(CICC)?

Modified True or False Questions:

1. (True/False) Republic Act No. 10175 defines cybercrime and provides penalties
but does not include provisions for prevention measures.
2. (True/False) The Cybercrime Prevention Act of 2012 aims to protect computer
systems and data from all forms of misuse, abuse, and illegal access.
3. (True/False) The penalty for cyber-related offenses under the Act is always one
degree higher than that provided for by the Revised Penal Code.
4. (True/False) The CICC is responsible for the enforcement of the Act and has the
authority to issue arrest warrants.
5. (True/False) Failure to comply with orders from law enforcement authorities
under the Act can lead to imprisonment or a fine.
6. (True/False) The Act mandates the preservation of computer data for a minimum
of three months from the date of the transaction.
7. (True/False) The jurisdiction of the Regional Trial Court regarding violations of the
Act extends only to offenses committed within the Philippines.
8. (True/False) The Cybercrime Investigation and Coordinating Center (CICC) is
primarily responsible for creating national cybersecurity policies.
9. (True/False) All laws, decrees, or rules inconsistent with Republic Act No. 10175
are modified but not repealed.
10. (True/False) The Act takes effect immediately upon approval and publication in
the Official Gazette.

Matching Type Questions:

1. It refers to the intentional alteration or A. Access


reckless hindering or interference with B. Alteration
the functioning of a computer or C. Cybersecurity
computer network by inputting, D. Cybersex
transmitting, damaging, deleting, E. Computer Data
deteriorating, altering, or suppressing F. Database
computer data or program, electronic G. Cyber
document, or electronic data message, H. Subcriber’s Information
without right or authority, including the I. Misuse of devices
introduction or transmission of viruses. J. System Interference
2. It refers to the use, production, sale,
procurement, importation, distribution,
or otherwise making available, without
right, of a device, including a computer
program, designed or adapted primarily
for the purpose of committing any of the
offenses under the Act.
3. It refers to any information contained in
the form of computer data or any other
form that is held by a service provider,
relating to subscribers of its services
other than traffic or content data and by
which identity can be established.
4. It refers to a computer or a computer
network, the electronic medium in which
online communication takes place.
5. It refers to any representation of facts,
information, or concepts in a form
suitable for processing in a computer
system including a program suitable to
cause a computer system to perform a
function and includes electronic
documents and/or electronic data
messages whether stored in local
computer systems or online.
6. It refers to any representation of facts,
information, or concepts in a form
suitable for processing in a computer
system including a program suitable to
cause a computer system to perform a
function and includes electronic
documents and/or electronic data
messages whether stored in local
computer systems or online.
7. It refers to the instruction,
communication with, storing data in,
retrieving data from, or otherwise making
use of any resources of a computer
system or communication network.
8. It refers to the modification or change, in
form or substance, of an existing
computer data or program.
9. It refers to the collection of tools,
policies, risk management approaches,
actions, training, best practices,
assurance, and technologies that can be
used to protect the cyber environment
and organization and user’s assets.
10. It refers to the willful engagement,
maintenance, control, or operation,
directly or indirectly, of any lascivious
exhibition of sexual organs or sexual
activity, with the aid of a computer
system, for favor or consideration.

You might also like