0% found this document useful (0 votes)
181 views

Yllana Bay View College Balangasan District Pagadian City: "The Builder of Future Leaders"

1. Hacking focuses on intercepting passwords, user names, email messages, and secret data using sniffing software. 2. A computer is an electronic machine that can accept data, manipulate it according to instructions, process results, and store them for future use. 3. The internet is a global network of connected computers that allows for high-speed and reliable communication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
181 views

Yllana Bay View College Balangasan District Pagadian City: "The Builder of Future Leaders"

1. Hacking focuses on intercepting passwords, user names, email messages, and secret data using sniffing software. 2. A computer is an electronic machine that can accept data, manipulate it according to instructions, process results, and store them for future use. 3. The internet is a global network of connected computers that allows for high-speed and reliable communication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Yllana Bay View College

Balangasan District Pagadian City


“The Builder of Future Leaders”

Midterm Examination in Crim. Elective 2(Cybercrime Investigation)

Directions: Read and understand the test. Write your answer in your booklet. Any forms of alterations, erasures and
tearing of booklet will be considered as wrong. Use black pen in answering the questions.

Test I. Simple Recall (2pts.)


Read carefully and give the answer correctly.

1. It focuses on intercepting data such as passwords, user names, e-mail messages, and even secret data using
sniffing software.
2. An electronic machine, operating under the control of instructions stored in its own memory that can accept data
(input) manipulate the data according to specified rules (process, product results (output) and store the results for
future use.
3. This is a global array of computers connected by a high speed reliable network.
4. It attempts to cause harm to computer systems by explaining system faults and vulnerabilities.
5. It is one of the most lucrative business that are growing today in cyber space.
6. Means as deliberately destroying or damaging property of another.
7. An act of imputing any person with intent to lower the person in the estimation of the right-thinking members of
society generally or to cause him to be shunned or avoided or to expose him to hatred, contempt or ridicule.
8. It includes the hosting of web site containing these prohibited materials.
9. This is done by gaining access to the login ID and the password.
10. This term is derived from the term hi jacking.
11. Programs that attack themselves to a computer or a file and then circulate themselves to other files and to other
computers on a network.
12. This offense, the hacker gains access and control over the website of another.
13. It involves following a person’s movement across the internet by posting messages on the bulletin boards
frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victims
with emails.
14. Any lawful act by which the owner is deprived completely or partially of his rights.
15. Occurs when a person uses the internet to steal someone’s identity and/or impersonate them to open a new credit
card account or conduct some financial transactions.

Test II. Enumeration


1-3. Classification of Cyber Crimes
4-9. Crimes against their property of an individual
10-15. Crimes against individuals
16-17. Crimes against Organization
18-24. Crimes against Society at large
25-33. Give me the Digital Crimes
34-38. Havens of Computer Crimes
39-43. Computer as a tool for committing Crimes
44-45. Two types of Computer Network Attacks
46-48. Three major types of internet securities fraud
49-50. Examples of Scam
51-61. Mode and manner of committing Cybercrimes.
62-65. Existing computer Fraud Investigating Bodies.
Test III. Essay (Brief and Concise)
1. Explain briefly what is hacking. (5pts.)
2. What is unauthorized access? (5pts.)
God will always be with you!
Ma’am Crisel

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy