COMPOL 2 Yang💚
  • 1. AN ACT DECRIMINALIZING VAGRANCY AMENDING ACT
A) RA 10022
B) RA 10158
C) RA 10175
  • 2. Internet Worm
A) Robert Morris
B) Onel De Guzman
C) David Smith
  • 3. The world famous worm
A) Robert Morris
B) Onel De Guzman
C) David Smith
  • 4. It almost brought development of internet to a complete halt
A) Robert Morris
B) Onel De Guzman
C) David Smith
  • 5. He was sentenced to 20 months of imprisonment
A) David Smith
B) Onel De Guzman
C) Robert Morris
  • 6. Melissa Virus
A) Robert Morris
B) Onel De Guzman
C) David Smith
  • 7. the massive sending of information to a target computer to be crushed. Targets can either be a personal computer or official computers.
A) Phising
B) Cyber Stalking/Harassment
C) Cyber Defamation
D) Ms Blaster Worm/W32
E) Email Bombing
  • 8. Attacks the Microscope Windows
A) Ms Blaster Worm/W32
B) Email Bombing
C) Cyber Stalking/Harassment
D) Phising
E) Cyber Defamation
  • 9. form of identity thefts and committed when scammers send a mass email posing as banks, credit card companies, or popular commercial websites, asking recipients to confirm or update financial information in a hyperlink to a look like coming from the original website.
A) Cyber Stalking/Harassment
B) Ms Blaster Worm/W32
C) Phising
D) Cyber defamation
E) Cyber Defamation
  • 10. ny intentional, substantial and unreasonable intrusion to the private life of a person that makes the person suffer mental distress through the use of the cyber space. An electronic harassment or threats by using Email or Chat room.
A) Credit card fraud
B) Ms Blaster Worm/W32
C) Cyber defamation
D) Cyber Stalking/Harassment
E) Email Bombing
  • 11. defamation using the internet to injure someone’s reputation. The public nature of newsgroup, bulletin boards and even email presents the opportunity to publish defamatory statements.
A) Cyber defamation
B) Cyber Stalking/Harassment
C) Ms Blaster Worm/W32
D) Email Bombing
E) Credit card fraud
  • 12. committed through copying or cloning of the cards, ATM fraud, Internet Card Fraud, PIN number stealing.
A) Ms Blaster Worm/W32
B) Credit card fraud
C) Phising
D) Cyber defamation
E) Cyber Stalking/ Harassment
  • 13. heft of software’s through the illegal copying of genuine programs. Retail revenue losses worldwide are increasing due to this crime as a result of end user copying, hard disk downloading counterfeiting, and illegal downloads from the internet.
A) Phising
B) Software privacy
C) Credit card fraud
D) Cyber defamation
E) Email Bombing
Created with That Quiz — the math test generation site with resources for other subject areas.