0% found this document useful (0 votes)
54 views12 pages

Midterms Exam Cdi 9 24

Midterm-Reviewer-CDI-9

Uploaded by

Feihl Jay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views12 pages

Midterms Exam Cdi 9 24

Midterm-Reviewer-CDI-9

Uploaded by

Feihl Jay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

What are the Parts of a Computer and Their Functions

1. The computer case or chassis


This component holds all of the physical parts of a computer system.
It is usually designed in such a manner to make fitting a motherboard, wiring, and primary and
secondary storage devices as easy as possible. Some are designed so well that it is easy to make
everything look tidy and presentable.
They can also accommodate CD or DVD drives, allowing users to listen to music using compact discs
or watch Blu-ray movies from their computer. Cases come in all different sizes and shapes to
accommodate various computer components and satisfy the consumer’s needs. Not only do
computer builders need to ensure compatibility between components, but also the case.
Cases typically have extra connectors on the front of them for more convenience. USB ports and
headphone jacks are commonly found. Design elements can vary from plain to highly elaborate. You
can get a plain grey desktop case or one with colored lighting everywhere to make it look
spectacular.
Computer cases rely on fans inside them to create proper airflow to keep all the internals cool and
working reliably. A computer case, like most things, varies in quality. You can get them made from
cheap metals or good quality materials that provide you with a sturdy design.
A good way to discharge yourself from electrostatic charge before working on a computer is to touch
the case. It will safeguard the computer’s circuits from being damaged by static discharge. And, of
course, a ground strap is recommended where possible.
Laptops have their case or chassis designed specifically for each model to hole all the parts and the
screen in a conveniently compact design that can fold closed to make it even more mobile.
List of computer case sizes (known as form factor):
Very small form factor: Supports Mini ITX motherboards
Small form factor: Supports micro ATX motherboards.
Standard form factor: Supports standard ATX motherboards.
Larger form factors: Supports ATX and XL-ATX motherboards.
2. Motherboard - The motherboard is the main board mounted directly inside the computer case.
All other cards plug directly into the motherboard, hence its name.
It is a printed circuit board in which the CPU, RAM, drives, power supply, expansion cards, and more
are plugged into it.
Its function involves integrating all the physical components to communicate and operate together.
A good motherboard offers a wide amount of connectivity options. It also has the least amount of
bottlenecks possible. This allows all the components to operate efficiently and to fulfill their
maximum potential as they were designed to do. As the physical size is reduced, it limits
connectivity options and functionality.
Motherboards come in the following sizes:
Motherboar
Dimensions
d
Pico-ITX 3.9 inch x 2.9 inch | 100mm x 72mm
Nano-ITX 4.7 inch x 4.7 inch | 120mm x 120mm
Mini-ITX 6.7 inch x 6.7 inch | 170mm x 170mm
Micro-ATX 9.6 inch x 9.6 inch | 244mm x 244mm
Standard-
12 inch x 9.6 inch | 305mm x 244mm
ATX
EVGA: 13.5 inch x 10.3 inch | 343mm x 262mm
Gigabyte: 13.58 inch x 10.31 inch | 345mm x
XL-ATX 262mm
Micro-Star: 13.6 inch x 10.4 inch | 345mm x
264mm
3. Central Processing Unit (CPU)
The CPU or central processing unit is basically like the brain of computer systems. It processes all the
information on a computational level. It takes all the processes from the RAM and processes them to
perform the tasks required by the computer system.
The faster the processor, the more instructions it can execute at any given time. The central
processing unit is usually seated in a socket that utilizes a lever or a latch with a hinged plate with a
cut-out in the center to secure the CPU onto the motherboard. It has many copper pads underneath
it for the socket contacts to push up against them to make electrical contact. There are other ways
CPUs can be attached to the motherboard.
Here are some common examples:
ZIF (Zero Insertion Force): Although this is a more desirable socket, they are mostly found on
older computer motherboards. It has a lever-operated mechanism to clamp the pins of the processor.
PGA (Pin Grid Array): It is also a ZIF socket with a different pin pitch and count.
LGA (Land Grid Array): More commonly found on motherboards today. A levered hinged plate with
a center cut-out clamps down on the processor.
BGA (Ball Grid Array): The CPU is soldered directly onto the motherboard. This makes it a non-
user-swappable component. It is susceptible to bad connectivity.
A processor generates a decent amount of heat, especially when working under high loads.
It will run even hotter when set to a higher clock speed to make it run faster. This is called
overclocking.
This is why a heatsink and fan assembly are required to draw the heat away from the central
processing unit and distribute it to thin sheets or fins of metal for the fan to cool down.
There are so many different types of computer processors. The largest manufacturers of processors
are Intel, AMD, and NVidia.
4. Random Access Memory (RAM)
RAM is a data storage device that can provide fast read and write access. RAM is volatile memory,
meaning it loses all the stored data when power is lost. The RAM keeps data ready for the CPU to
process. The RAM speed is a big contributor to the overall speed of a computer system.
It plugs directly into a long slot that has contacts on either side of the slot. It, too, has a clock speed,
just like a processor. So, it can also be overclocked to deliver increased performance beyond the
intended specification.
Certain RAM modules are sold with a heat spreader. It helps dissipate the heat from the individual
memory ICs, keeping them cooler. RAM has evolved like any other component. RAM used on the
motherboard often uses DDR (Double Data Rate) SDRAM (Synchronous Dynamic Random Access
Memory) type memory.
RAM Amount always comes in powers of 2, so you will always see numbers like 16GB, 32GB, or 64GB
of RAM, to mention some examples of memory units.
5. Graphics Card or Graphics Processing Unit (GPU)
A graphics card is an output device that processes the data from the motherboard and sends the
appropriate information to the computer’s screen for display.
You can connect monitors to it using HDMI, DisplayPort, DVI, or VGA connectors. It can also be
referred to as a video or display card. A video card takes the burden of all the video processing from
the main CPU. This gives a computer a big boost in performance.
Fans are almost a given because of the large processing requirements for a gaming GPU. A video
card plugs into a PCI Express (Peripheral Component Interconnect Express) slot on the motherboard.
It is a serial expansion bus slot capable of high bandwidth in two directions. A graphics card has a
GPU (Graphics Processing Unit), the main part of a computer system that requires cooling.
A GPU is slower than a CPU but is designed to deal with mathematical operations required for video
rendering. The card’s memory amount varies depending on the manufacturer’s design. Video cards
use GDDR (Graphics Double Data Rate) SDRAM, specially designed to optimize graphics
performance. GDDR is built to handle a higher bandwidth compared to plain DDR RAM. A laptop’s
GPU is usually mounted directly onto the motherboard, much like the CPU. Some models use
integrated graphics with the GPU and CPU in one processing unit.
This can also be true for some CPUs for a desktop computer. The GPU can be integrated with the
CPU, and the motherboard’s output ports are used instead of a graphics card’s ports. Integrated
graphics do not offer great performance, so most gamers or individuals using their computers for
work that involves more GPU-intensive tasks opt for systems with discrete GPUs.
6. Sound Card - Most of the time, the sound chip built into the motherboard is used for audio output.
But, if you are a sound enthusiast or prefer high-quality audio output while playing a game, you
might be inclined to use a sound card.
Sound cards plug into a computer in multiple ways. It can be through USB, PCI slot, or PCI Express x
1 slot. External DACs have gained popularity and help deliver clearer and more defined audio or
high-definition sound output.
They connect up using an IO cable like a USB cable to your computer or laptop and provide a line out
for your speakers or headphones. A sound processing chip on the card does all of the audio
processing and is usually not a very powerful processor. A sound card can offer a wide range of
connectivity with audio equipment. Examples could be optical audio, a 1/4-inch jack, or RCA
connectors.
7. Hard Disk Drive (HDD)
A hard drive is still found in many PCs to this day. A mechanical drive’s purpose is to store all your
information for retrieval at any time.
Software - Apart from storing information for your computer, hard disk drives also function as a boot
drive to run the operating system (OS) from it. You can install operating systems of many different
kinds depending on your needs. An OS is a software program installed, making a computer useable,
like Microsoft Windows. The biggest vulnerability of a mechanical drive is its physically fragile nature.
They have fragile components
One bump the wrong way can destroy a whole drive. A mechanical hard drive contains one or more
platters that spin anywhere between 5200 to 10000 RPM (revolutions per minute). The read and
write heads are about 0.002 (51 micro M) inches from the platter.
This gives you an idea about the physical limitations of its fragile nature. Small areas on the platter
can represent a 1 or a 0. It can be changed using the drive head to alter the material to represent
the correct value magnetically. This is how to write data to the drive for storage. There are various
categories of hard drives made for various real-world applications.
Some examples include:
General use for desktops or laptops.
Gaming optimized for desktops or laptops.
General high-capacity storage.
NAS Devices.
Servers.
Video recording.
They can also be purchased as an external drive that usually connects to your computer by USB
cable.
An uninterruptible power supply is sometimes used to prevent data loss with mechanical drives
where a sudden power outage is experienced, or the power cord is accidentally disconnected while
the computer is running.
This allows proper shutdowns for desktop systems that have experienced sudden power loss.
8. Solid State Drive (SSD) - An SSD is also a type of hard drive, but it doesn’t have any moving bits. It
consists of a bank of flash memory that can hold a reasonable amount of information.
While the capacity of SSDs is increasing, they aren’t cost-effective for storing large amounts. A
mechanical drive has a cheaper gigabyte-to-dollar ratio. However, the SSD is a high-performance
drive. It’s fast and cannot be as easily damaged by dropping it or taking a few bumps.
SSDs are available as 2.5-inch laptop encapsulated drives, and an M.2 SDD is the most commonly
used kind on the market. That’s why I always recommend SSDs for portable-type computers where
possible. In our other article, you can read more about whether or not SSD’s are worth it.
9. Power Supply Unit (PSU)
A power supply unit mounts inside the computer case. It converts the AC mains supply from the
power cord from a wall socket and supplies the correct DC voltages to all the parts of a computer.
A computer power supply supplies the following voltages:
+3.3v: This volta
ge is supplied to the motherboard.
+5V: This voltage is supplied to the motherboard and other computer hardware.
+12V: This voltage is supplied to the motherboard and other components.
-12V: This voltage is supplied to the motherboard.
One of the most important system components
It plays an important role in keeping a computer running reliably.
You get different wattage ratings for power supplies. The higher the wattage, the higher the
electrical current that can be made available to everything that needs it to function properly.
The higher you go in Watts, the more the power supply will likely cost.
\A power supply usually also comes with a cooling fan. This helps all the internal components in your
computer to stay cool when the power supply is subjected to bigger loads.
You read more about a power supply and its lifespan to know how long it lasts.
10. Monitor or Visual Display Unit (VDU) - A monitor is an output device to visualize the graphics
information sent from the computer’s GPU. There are various types of monitors on the market. An
LED (Light Emitting Diode) backlit LCD (Liquid Crystal Display) monitor is the most commonly used
with a modern PC.
There are also various computer screen sizes with different aspect ratios. The aspect ratio is simply
the ratio between height and width.
For example, a 16:9 aspect ratio screen will have 16 parts wide to 9 parts in height. There are also
curved computer monitors, but they are more expensive displays. Monitors also have a fast response
time to meet the high demands required to eliminate delays with user input for gaming.
11. Keyboard
A keyboard is an input device that is one of the ways to communicate with a computer. Typing a key
from the keyboard sends a small portion of information to tell it which key was pressed.
Once the computer receives input from the keyboard, it can use the keystrokes in digital form to
produce a specific task in any software being used.
The computer system can use this information in many ways. An example could be a command or a
character that can be used in a document. There are two main different types of keyboards.
Mechanical and membrane types.
12. Mouse or Trackpad
A mouse is an input device that allows the user to move a pointer displayed on the monitor and
experience a more intuitive interaction with computer systems.
These days, mice have more buttons than the common three and offer way more functions than
mice in the early days.
However, the three main buttons allow users to select, grab, scroll, and access extra menus and
options. A computer mouse is a handy pointing device that can be wired or wireless. The latter
requires batteries. Optical mice of today allow for very accurate precision and smooth movement.
Laptops have a built-in trackpad, which works almost like a mouse. Many people don’t like working
with them, so they usually plug a mouse into the laptop instead.
Common peripheral parts for computers - Some common peripherals connect to a computer and
extend their usefulness.
Printer
A printer can take an image sent by a computer and deliver it onto a sheet of paper.
It does this by using the information from the computer, and by either using toner or ink, it deposits
one of these in a controlled and accurate manner to form the image.
Scanner
A scanner can take anything on paper, and it functions by scanning it to produce a replicated digital
image for a computer to save.
This is also handy for saving physical photos you want to preserve. Once the photo is stored
digitally, it won’t decay as a physical photo does over time. The flatbed scanner is one of the most
commonly used today.

Multifunction printers
Many all-in-one, multifunction devices have printer and scanning capabilities in one reasonably
compact product, which has dominated the market over recent years and continues to grow.
The most common models include an inkjet printer and scanner for home use and a laser printer
version for home and other office applications.

Computer Speakers
Speakers can connect to the sound card at the rear of the computer. Another way they can be
connected is by a monitor that already has built-in speakers.

For more full immersion


Generally, the sound quality is poor from a monitor’s speakers. That’s why most people buy a set of
computer speakers for their desks.
You can even connect up a 7.1 surround speaker system to certain sound cards for a computer.
This can add a nicer experience to gaming, playing music, or watching a film.
A microphone
A microphone is essential for anyone who requires decent audio recording or capturing. They can
range widely in price, from extremely cheap to very expensive, depending on the individual’s
profession or application.
They are usually connected to an audio interface before connecting to the computer.
There are so many uses for a microphone connected to a computer, but some include:
Recording singing or musical instruments for composing music.
Game streaming or commentary.
Communication for calls.
Webinars.
Creating podcasts.
Camera or webcam
Desktop users often use cameras when not using a laptop or other portable communication device
with an inbuilt camera. Again, quality can vary depending on how much someone is willing to spend.
They allow many applications, including video or conference calls, webinars, or presentations, and
gamers to be streamed from their seats. Many models have microphones built into them, but they
won’t deliver the audio quality that a high-end dedicated microphone can produce.

CHAPTER II
PUNISHABLE ACTS
SEC. 4. Cybercrime Offenses. — The following acts constitute the offense of
cybercrime punishable under this Act:
(a) Offenses against the confidentiality, integrity and availability of computer data
and systems:
(1) Illegal Access. – The access to the whole or any part of a computer system
without right.
(2) Illegal Interception. – The interception made by technical means without right of
any non-public transmission of computer data to, from, or within a computer system
including electromagnetic emissions from a computer system carrying such computer
data.
(3) Data Interference. — The intentional or reckless alteration, damaging, deletion
or deterioration of computer data, electronic document, or electronic data message,
without right, including the introduction or transmission of viruses.
(4) System Interference. — The intentional alteration or reckless hindering or
interference with the functioning of a computer or computer network by inputting,
transmitting, damaging, deleting, deteriorating, altering or suppressing computer
data or program, electronic document, or electronic data message, without right or
authority, including the introduction or transmission of viruses.
(5) Misuse of Devices.
(i) The use, production, sale, procurement, importation, distribution, or otherwise
making available, without right, of:
(aa) A device, including a computer program, designed or adapted primarily for the
purpose of committing any of the offenses under this Act; or
(bb) A computer password, access code, or similar data by which the whole or any
part of a computer system is capable of being accessed with intent that it be used for
the purpose of committing any of the offenses under this Act.
(ii) The possession of an item referred to in paragraphs 5(i)(aa) or (bb) above with
intent to use said devices for the purpose of committing any of the offenses under
this section.
(6) Cyber-squatting. – The acquisition of a domain name over the internet in bad
faith to profit, mislead, destroy reputation, and deprive others from registering the
same, if such a domain name is:
(i) Similar, identical, or confusingly similar to an existing trademark registered with
the appropriate government agency at the time of the domain name registration:
(ii) Identical or in any way similar with the name of a person other than the
registrant, in case of a personal name; and
(iii) Acquired without right or with intellectual property interests in it.
(b) Computer-related Offenses:
(1) Computer-related Forgery. —
(i) The input, alteration, or deletion of any computer data without right resulting in
inauthentic data with the intent that it be considered or acted upon for legal purposes
as if it were authentic, regardless whether or not the data is directly readable and
intelligible; or
(ii) The act of knowingly using computer data which is the product of computer-
related forgery as defined herein, for the purpose of perpetuating a fraudulent or
dishonest design.
(2) Computer-related Fraud. — The unauthorized input, alteration, or deletion of
computer data or program or interference in the functioning of a computer system,
causing damage thereby with fraudulent intent: Provided, That if no
damage has yet been caused, the penalty imposable shall be one (1) degree lower.
(3) Computer-related Identity Theft. – The intentional acquisition, use, misuse,
transfer, possession, alteration or deletion of identifying information belonging to
another, whether natural or juridical, without right: Provided, That if no damage has
yet been caused, the penalty imposable shall be one (1) degree lower.
(c) Content-related Offenses:
(1) Cybersex. — The willful engagement, maintenance, control, or operation,
directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity,
with the aid of a computer system, for favor or consideration.
(2) Child Pornography. — The unlawful or prohibited acts defined and punishable by
Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through
a computer system: Provided, That the penalty to be imposed shall be (1) one degree
higher than that provided for in Republic Act No. 9775.
(3) Unsolicited Commercial Communications. — The transmission of commercial
electronic communication with the use of computer system which seek to advertise,
sell, or offer for sale products and services are prohibited unless:
(i) There is prior affirmative consent from the recipient; or
(ii) The primary intent of the communication is for service and/or administrative
announcements from the sender to its existing users, subscribers or customers; or
(iii) The following conditions are present:
(aa) The commercial electronic communication contains a simple, valid, and
reliable way for the recipient to reject. receipt of further commercial electronic
messages (opt-out) from the same source;
(bb) The commercial electronic communication does not purposely disguise the
source of the electronic message; and
(cc) The commercial electronic communication does not purposely include
misleading information in any part of the message in order to induce the recipients to
read the message.
(4) Libel. — The unlawful or prohibited acts of libel as defined in Article 355 of the
Revised Penal Code, as amended, committed through a computer system or any
other similar means which may be devised in the future.

WHAT ARE THE PENALTIES IN VIOLATION OF RA 10175?


CYBERCRIME LAW, Penalizes (section 8) sixteen types of cybercrime
(Section 4). They are:
Types of Cybercrime Penalty

Prision mayor (imprisonment of six years and


1 day up to 12 years) or a fine of at least Two
hundred thousand pesos (P200,000) up to a
maximum amount commensurate to the
damage incurred or BOTH.————————If
1. Illegal access
committed against critical
Unauthorized access (without right) to a computer
infrastructure:Reclusion temporal
system or application.
(imprisonment for twelve years and one day
up to twenty years) or a fine of at least Five
hundred thousand pesos (P500,000) up to a
maximum amount commensurate to the
damage incurred or BOTH

2. Illegal interception
Unauthorized interception of any non-public
– same as above
transmission of computer data to, from, or within a
computer system.

3. Data Interference
Unauthorized alteration, damaging, deletion or
deterioration of computer data, electronic document,
or electronic data message, and including the
– same as above
introduction or transmission of viruses.Authorized
action can also be covered by this provision if the
action of the person went beyond agreed scope
resulting to damages stated in this provision.

4. System Interference – same as above


Unauthorized hindering or interference with the
functioning of a computer or computer network by
inputting, transmitting, damaging, deleting,
deteriorating, altering or suppressing computer data
or program, electronic document, or electronic data
messages, and including the introduction or
transmission of viruses.Authorized action can also be
covered by this provision if the action of the person
went beyond agreed scope resulting to damages
stated in this provision.

5. Misuse of devices
The unauthorized use, possession, production, sale,
procurement, importation, distribution, or otherwise
making available, of devices, computer program
designed or adapted for the purpose of committing
– same as above except fine should be no
any of the offenses stated in Republic Act
more than Five hundred thousand pesos
10175.Unauthorized use of computer password,
(P500,000).
access code, or similar data by which the whole or
any part of a computer system is capable of being
accessed with intent that it be used for the purpose
of committing any of the offenses under Republic Act
10175.

6. Cyber-squatting
Acquisition of domain name over the Internet in bad
faith to profit, mislead, destroy reputation, and
deprive others from the registering the same. This
includes those existing trademark at the time of
registration; names of persons other than the
registrant; and acquired with intellectual property
interests in it.Those who get domain names of – same as above
prominent brands and individuals which in turn is
used to damage their reputation – can be sued under
this provision.Note that freedom of expression and
infringement on trademarks or names of person are
usually treated separately. A party can exercise
freedom of expression without necessarily violating
the trademarks of a brand or names of persons.

7. Computer-related Forgery
Unauthorized input, alteration, or deletion of
computer data resulting to inauthentic data with the
Prision mayor (imprisonment of six years and
intent that it be considered or acted upon for legal
1 day up to 12 years) or a fine of at least Two
purposes as if it were authentic, regardless whether
hundred thousand pesos (P200,000) up to a
or not the data is directly readable and intelligible;
maximum amount commensurate to the
orThe act of knowingly using computer data which is
damage incurred or BOTH.
the product of computer-related forgery as defined
here, for the purpose of perpetuating a fraudulent or
dishonest design.

8. Computer-related Fraud
Unauthorized input, alteration, or deletion of – same as aboveProvided, That if no damage
computer data or program or interference in the has yet been caused, the penalty imposed
functioning of a computer system, causing damage shall be one (1) degree lower.
thereby with fraudulent intent.

9. Computer-related Identity Theft – same as above


Unauthorized acquisition, use, misuse, transfer,
possession, alteration or deletion of identifying
information belonging to another, whether natural or
juridical.

10. Cybersex
Willful engagement, maintenance, control, or
operation, directly or indirectly, of any lascivious
exhibition of sexual organs or sexual activity, with
Prision mayor (imprisonment of six years and
the aid of a computer system, for favor or
1 day up to 12 years) or a fine of at least Two
consideration.There is a discussion on this matter if it
hundred thousand pesos (P200,000) but not
involves “couples” or “people in relationship” who
exceeding One million pesos (P1,000,000) or
engage in cybersex. For as long it is not done for
BOTH.
favor or consideration, I don’t think it will be covered.
However, if one party (in a couple or relationship)
sues claiming to be forced to do cybersex, then it
can be covered.

11. Child Pornography


Penalty to be imposed shall be one (1) degree
Unlawful or prohibited acts defined and punishable
higher than that provided for in Republic Act
by Republic Act No. 9775 or the Anti-Child
9775, if committed through a computer
Pornography Act of 2009, committed through a
system.
computer system.

****** Unsolicited Commercial


Communications (SPAMMING)
THIS PROVISION WAS STRUCK DOWN BY THE
SUPREME COURT AS UNCONSTITUTIONAL.

12. Libel
Unlawful or prohibited acts of libel as defined in
Article 355 of the Revised Penal Code, as amended
committed through a computer system or any other
similar means which may be devised in the
future.Revised Penal Code Art. 355 states Libel
means by writings or similar means. — A libel
committed by means of writing, printing, lithography,
engraving, radio, phonograph, painting, theatrical
Penalty to be imposed shall be one (1) degree
exhibition, cinematographic exhibition, or any similar
higher than that provided for by the Revised
means, shall be punished by prision correccional in
Penal Code, as amended, and special laws, as
its minimum and medium periods or a fine ranging
the case may be.
from 200 to 6,000 pesos, or both, in addition to the
civil action which may be brought by the offended
party.The Cybercrime Prevention Act strengthened
libel in terms of penalty provisions.The electronic
counterpart of libel has been recognized since the
year 2000 when the E-Commerce Law was passed.
The E-Commerce Law empowered all existing laws to
recognize its electronic counterpart whether
commercial or not in nature.

13. Aiding or Abetting in the commission of Imprisonment of one (1) degree lower than
cybercrime – Any person who willfully abets or aids that of the prescribed penalty for the
in the commission of any of the offenses enumerated offense or a fine of at least One hundred
in this Act shall be held liable. thousand pesos (P100,000) but not exceeding
Five hundred thousand pesos (P500,000) or
both.

14. Attempt in the commission of cybercrime


Any person who willfully attempts to commit any of
– same as above
the offenses enumerated in this Act shall be held
liable.

15. All crimes defined and penalized by the Revised


Penalty to be imposed shall be one (1) degree
Penal Code, as amended, and special laws, if
higher than that provided for by the Revised
committed by, through and with the use of
Penal Code, as amended, and special laws, as
information and communications technologies shall
the case may be.
be covered by the relevant provisions of this Act.

Although not exactly a cybercrime, I am including


this here as penalties are also imposed by the law.
16. Corporate Liability. (Section 9)
For sanctioned actions, Juridical person shall
When any of the punishable acts herein defined are
be held liable for a fine equivalent to at least
knowingly committed on behalf of or for the benefit
double the fines imposable in Section 7 up to a
of a juridical person, by a natural person acting
maximum of Ten million pesos
either individually or as part of an organ of the
(P10,000,000).For neglect such as misuse of
juridical person, who has a leading position within,
computer resources that resulted to
based on:(a) a power of representation of the
cybercrime committed in organization physical
juridical person provided the act committed falls
or virtual premises or resources, juridical
within the scope of such authority;(b) an authority to
person shall be held liable for a fine equivalent
take decisions on behalf of the juridical
to at least double the fines imposable in
person. Provided, That the act committed falls within
Section 7 up to a maximum of Five million
the scope of such authority; or(c) an authority to
pesos (P5,000,000).Criminal liability may still
exercise control within the juridical person,It also
apply to the natural person.
includes commission of any of the punishable acts
made possible due to the lack of supervision or
control.

If you are going to include all provisions in the Revised Penal Code, there can even be more
than 16 types of cybercrime as a result.

What are the QUESTIONS FOR ESSAY?


a. THE 1987 CONSTITUTION OF THE REPUBLIC OF THE PHILIPPINES – ARTICLE III ARTICLE III

BILL OF RIGHTS

Section 1. No person shall be deprived of life, liberty, or property without due process of law, nor
shall any person be denied the equal protection of the laws.

Section 2. The right of the people to be secure in their persons, houses, papers, and effects against
unreasonable searches and seizures of whatever nature and for any purpose shall be inviolable, and
no search warrant or warrant of arrest shall issue except upon probable cause to be determined
personally by the judge after examination under oath or affirmation of the complainant and the
witnesses he may produce, and particularly describing the place to be searched and the persons or
things to be seized.

Section 3. (1) The privacy of communication and correspondence shall be inviolable except upon
lawful order of the court, or when public safety or order requires otherwise, as prescribed by law.
(2) Any evidence obtained in violation of this or the preceding section shall be inadmissible for any
purpose in any proceeding.

Section 4. No law shall be passed abridging the freedom of speech, of expression, or of the press, or
the right of the people peaceably to assemble and petition the government for redress of grievances.

Section 12. (1) Any person under investigation for the commission of an offense shall have the right
to be informed of his right to remain silent and to have competent and independent counsel
preferably of his own choice. If the person cannot afford the services of counsel, he must be provided
with one. These rights cannot be waived except in writing and in the presence of counsel.

(2) No torture, force, violence, threat, intimidation, or any other means which vitiate the free will
shall be used against him. Secret detention places, solitary, incommunicado, or other similar forms of
detention are prohibited.

(3) Any confession or admission obtained in violation of this or Section 17 hereof shall be
inadmissible in evidence against him.

(4) The law shall provide for penal and civil sanctions for violations of this section as well as
compensation to and rehabilitation of victims of torture or similar practices, and their families.

Section 13. All persons, except those charged with offenses punishable by reclusion perpetua when
evidence of guilt is strong, shall, before conviction, be bailable by sufficient sureties, or be released
on recognizance as may be provided by law. The right to bail shall not be impaired even when the
privilege of the writ of habeas corpus is suspended. Excessive bail shall not be required.

Section 14. (1) No person shall be held to answer for a criminal offense without due process of law.

(2) In all criminal prosecutions, the accused shall be presumed innocent until the contrary is proved,
and shall enjoy the right to be heard by himself and counsel, to be informed of the nature and cause
of the accusation against him, to have a speedy, impartial, and public trial, to meet the witnesses
face to face, and to have compulsory process to secure the attendance of witnesses and the
production of evidence in his behalf. However, after arraignment, trial may proceed notwithstanding
the absence of the accused provided that he has been duly notified and his failure to appear is
unjustifiable.

Article 3. Definitions. - Acts and omissions punishable by law are felonies (delitos).

Felonies are committed not only be means of deceit (dolo) but also by means of fault (culpa).

There is deceit when the act is performed with deliberate intent and there is fault when the wrongful
act results from imprudence, negligence, lack of foresight, or lack of skill.

Article 4. Criminal liability. - Criminal liability shall be incurred:

1. By any person committing a felony (delito) although the wrongful act done be different from
that which he intended.

2. By any person performing an act which would be an offense against persons or property,
were it not for the inherent impossibility of its accomplishment or an account of the
employment of inadequate or ineffectual means.
Article 6. Consummated, frustrated, and attempted felonies. - Consummated felonies as well as
those which are frustrated and attempted, are punishable.

A felony is consummated when all the elements necessary for its execution and accomplishment are
present; and it is frustrated when the offender performs all the acts of execution which would
produce the felony as a consequence but which, nevertheless, do not produce it by reason of causes
independent of the will of the perpetrator.

There is an attempt when the offender commences the commission of a felony directly or over acts,
and does not perform all the acts of execution which should produce the felony by reason of some
cause or accident other than this own spontaneous desistance.

Article 8. Conspiracy and proposal to commit felony. - Conspiracy and proposal to commit felony are
punishable only in the cases in which the law specially provides a penalty therefor.

A conspiracy exists when two or more persons come to an agreement concerning the commission of
a felony and decide to commit it.

There is proposal when the person who has decided to commit a felony proposes its execution to
some other person or persons.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy