Professional Documents
Culture Documents
Cdin H
Cdin H
2. A digital world or virtual environment, a dynamic and constantly evolving environment is called?
a. Network
b. Cyber space
c. Cyber
d. Internet
3. This includes the voice, video, and other form of data which refers to the transmission of information through
ICT media.
a. Communication
b. Talking
c. Gossiping
d. Reporting
4. It refers to any illegal activity that uses a computer as its primary means of function.
a. Cyber crime
b. Computer crime
c. Net crime
d. All of the above
5. It can be used to protect the cyber environment, organization, and user’s assets.
a. Anti-virus
b. Firewalls
c. Filtering software
d. Cyber security
6. Refers to any representation of facts including a program that is suitable to cause a computer system to
perform a function.
a. Data
b. Database
c. Computer data
d. Program
7. Refers to a representation of information stored in a formalized manner, which is intended for use in a
computer system.
a. Data
b. Database
c. Computer data
d. Computer Program
8. In the 21st century, the era is dominated by new highly sophisticated methods of committing crimes such as
“phishing” and “botnet attacks”. The statement is incorrect
a. Yes
b. True
c. No
d. False
10. The virus was created by Onel De Guzman, a Filipino computer science student, on May 4, 2000.
a. I Love You Virus
b. Love Letter Virus
c. Love Bug Worm
d. All of the above
13. It refers to the species or subspecies which do not naturally occur at present or in historical time within the
protected area.
a. Endemic species
b. Exotic species
c. Threatened species
d. Protected species
14. It refers to the species or subspecies considered critically endangered whose population is at risk of extinction.
a. Endemic species
b. Exotic species
c. Threatened species
d. Protected species
15. Which refers to a relatively large area not altered by human activity where extractive uses are not allowed.
a. Natural park
b. National
c. Natural monument
d. Wildlife sanctuary
17. The SAGF refers to the trust fund deposited in the national treasury representing the _____ of the revenues
generated to support the NIPAS.
a. 25%
b. 50%
c. 75%
d. 100%
18. Whose jurisdiction are the terrestrial plant and animal species?
a. Palawan
b. DA
c. DENR
d. None of these
19. Whose jurisdiction are the aquatic critical habitats and all aquatic resources?
a. Palawan
b. DA
c. DENR
d. None of these
21. What is one of the suggested ways to contribute to environmental conservation based on the passage?
a. Decrease electricity consumption
b. Always segregate biodegradable and non-biodegradable wastes
c. Turn off lights and appliances when not in use
d. All of these
26. Which term refers to the sum total of all surroundings of a living organism?
a. Biotic environment
b. Abiotic environment
c. Social environment
d. Environment
27. What are the two main components that form the environment?
a. Living and non-living
b. Biotic and social
c. Natural and built
d. Chemical and physical
29. Which category of the environment includes interactions among plants, animals, soil, water, temperature, and
light?
a. Built environment
b. Natural environment
c. Social environment
d. Chemical environment
31. Which term refers to the immediate physical and social setting in which people live or in which something
happens or develops?
a. Natural environment
b. Built environment
c. Social environment
d. Cultural environment
34. If a city experiences frequent earthquakes, which factor would likely be a significant consideration in its built
environment?
a. Culture and fashion
b. Economy
c. Climate and geology
d. Technology
36. How does irrigation impact the environment, especially at the tail-end and downstream of the irrigation
scheme?
a. Changes in quantity and quality of soil and water
b. Positive effects on natural conditions
c. No changes in soil and water
d. Improved quantity and quality of soil and water
37. In which regions is palm oil a significant source of income for farmers?
a. North America
b. Southeast Asia, Central and West Africa, and Central America
c. Europe
d. Australia
38. What is a key reason why the environmental impact of petroleum is considered negative?
a. Sustainable energy source
b. Non-toxic to any forms of life
c. Not linked to present society
d. Toxic to almost all forms of life
41. Why does the environmental impact of pesticides often exceed intentions?
a. Unintended consequences of reaching non-target species and other environments
b. Precise targeting of species
c. Efficient utilization of sprayed insecticides
d. Limited impact on non-target species
42. What is the primary speculation regarding the environmental impact of pharmaceuticals and personal care
products (PPCPs)?
a. Significant impact on personal health
b. Boosting growth of livestock
c. Limited impact on the environment
d. Largely unknown and speculative
44. What is the estimated contribution of carbon dioxide emissions from shipping to the global total in 2007?
a. 1 to 2%
b. 2 to 3%
c. 4 to 5%
d. 6 to 7%
45. Which country's military is considered one of the worst polluters in the world, responsible for numerous
contaminated sites?
a. China
b. Russia
c. United States
d. Germany
49. Approximately how much wildlife has been lost in the last 40 years, according to estimates?
a. Less than 25 percent
b. Around 30 percent
c. More than 50 percent
d. Exactly 75 percent
58. Who is credited with designing the Analytical Engine, laying the basic framework for today's computers?
a. Steve Jobs
b. Charles Babbage
c. Bill Gates
d. Mark Zuckerberg
62. What is an abacus, and why is it mentioned in relation to the earliest form of a computer?
a. Abacus is the earliest form of a computer
b. Abacus is a type of cybercrime tool
c. Abacus is a modern computer component
d. Abacus is is the first ever computer
64. Which position holds the role of Vice Chairperson in the CICC?
a. Director, NBI
b. Chief of the PNP
c. Executive Director, ICTODOST
d. Head of the DOJ Office of Cybercrime
66. What was the initial focus of cybercrime when it first started?
a. Legal computer activities
b. Ethical hacking
c. Breaking into computer networks
d. Government-regulated computer operation
72. Plankton envies his workmate, Bob, as the latter is being boastful with regards to his money and other assets.
Plankton then stole Bob’s wallet which contains ids, atm cards, and money. Does that act constitute identity
theft?
a. Yes
b. True
c. No
d. False
73. Sandy has unauthorized access to the computer of Patrick as her purpose is to steal the latter’s information or
data. What form of cybercrime did Sandy do?
a. Hacking
b. Cracking
c. Malware
d. Phishing
74. Considering factors like speed, size, and cost, which category of computer is characterized by being the
fastest, largest, most powerful, and expensive?
a. Mainframe Computer
b. Supercomputer
c. Personal Computer (PC)
d. Minicomputer
75. Which internet connection type uses radio frequency and does not require cables?
a. Cable
b. Wireless
c. Satellite
d. Cellular
76. What is the main disadvantage of satellite internet compared to cable and DSL
a. Slower connection
b. Lower cost
c. Closer proximity to Earth
d. Always-on connection
80. The types of IP addresses are crucial for internet-related investigations. What does an IP address serve as in
the investigation of internet-related crimes
a. A random number
b. Series of numbers assigned by an ISP
c. A username identifier
d. A social media handler
81. The types of IP addresses are crucial for internet-related investigations. Which type of IP address changes
every time the internet user accesses their Internet Service Provider?
a. Random IP Address
b. Assigned IP Address
c. Static IP Address
d. Dynamic IP Address
82. The types of IP addresses are crucial for internet-related investigations. To which type of internet service
subscribers are static IP addresses usually assigned?
a. Dial-up service
b. Base speed broadband service
c. High-speed internet users or corporate accounts
d. All internet users
83. What is the primary function of an input device?
a. Outputting information
b. Allowing the user to enter data into the computer
c. Displaying data on the screen
d. Processing information
87. What does "Without a right" mean in the context of illegal access to a computer system?
a. Conduct undertaken without or in excess of authority.
b. Conduct not covered by established legal defenses.
c. Conduct unjustified by court orders.
d. Conduct with irrelevant principles under the law.
88. How is "Illegal Interception" defined in the context of computer data transmission?
a. Unauthorized interception of public data.
b. Interception made by technical means without the right of any non-public transmission.
c. Intercepting data with established legal defenses.
d. Intercepting data with court-issued justifications.
91. Krystal, without authorization, alters a company's financial records to show inflated profits. She intends to
present these records during a legal audit. What offense does this represent?
a. Illegal Interception
b. Data Interference
c. Computer-Related Forgery
d. Misuse of Devices
92. Teddy knowingly uses manipulated computer data to deceive investors and create a false image of the
company's success. Which offense is Teddy committing?
a. Data Interference
b. Computer-Related Fraud
c. System Interference
d. Computer-Related Identity Theft
93. Irene intentionally acquires personal information from her co-worker, including financial details, to
impersonate her online. What crime does Irene commit?
a. Illegal Access
b. System Interference
c. Computer-Related Identity Theft
d. Computer-Related Forgery
94. Imagine a scenario where an individual is accused of engaging in explicit sexual activities using a computer
system and seeking favor or consideration. What specific offense is the individual accused of committing?
a. Child Pornography
b. Unsolicited Commercial Communications
c. Libel
d. Cybersex
95. What offense involves the transmission of commercial electronic communication through a computer system
for advertising, selling, or offering products and services?
a. Cybersex
b. Unsolicited Commercial Communications
c. Libel
d. Child Pornography
96. If an individual commits libel as defined in the Revised Penal Code using a computer system, what offense is
committed?
a. Child Pornography
b. Cybersex
c. Unsolicited Commercial Communications
d. Cyber libel
97. According to the Anti-Child Pornography Act of 2009 (Republic Act No. 9775), if an offense of Child
Pornography is committed through a computer system, what penalty should be imposed?
a. The same penalty as in Republic Act No. 9775
b. One (1) degree lower than the penalty in Republic Act No. 9775
c. One (1) degree higher than the penalty in Republic Act No. 9775
d. Double the penalty in Republic Act No. 9775
a. 1, 2, 3, 4, and 5
b. 1, 2, 3, and 4
c. 2, 3, 4, and 5
d. 2, 3, and 4
a. 1, 2, 3, 4, and 5
b. 1, 2, 3, and 4
c. 2, 3, 4, and 5
d. 2, 3, and 4
100. Statement no. 1. Environmental conservation is the practice of humans in saving the environment. Statement
no. 2. Environmental preservation protects the environment from harmful human activities.
a. Statement No. 1 is true while statement no. 2 is false
b. Statement No. 1 is false while statement no. 2 is true
c. Statements No. 1 and 2 are both true
d. Statements No. 1 and 2 are both false
References:
Foronda, M. & Alcon, R. (2022). Criminology Reviewer All Arean Edition 2 (New Curriculum). Book of Life
Publication.
Ongyod, F. (2023). Environmental Laws and Protection with Disaster Risk Reduction and Management. Cavite State
University – Main Campus
Rufino, C. (2023). Introduction to Cybercrime and Environmental Laws. Cavite State University – Main Campus
Serrano, E. (2023). Introduction to Cybercrime and Digital Forensic Investigation. Cavite State University – Main
Campus