暗記メーカー
ログイン
CYBERCRIME 1
  • Jessa Trocio

  • 問題数 38 • 2/24/2025

    記憶度

    完璧

    5

    覚えた

    16

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    Any devices that has chip in it

    COMPUTER

  • 2

    This is a crime that involves a computer and a network.This is carried out by computer or the internet.

    CYBERCRIME

  • 3

    Where does cybercrime takes place?

    ONLINE

  • 4

    What are cyber crimes?

    IDENTIFY THEFT REVENGE PORN CYBER-STALKING HARASSMENT BULLYING CHILD EXPLOITATION

  • 5

    Cybercrime is also called?

    COMPUTER CRIME

  • 6

    It is the use of computer as an instrument to further illegal ends

    COMPUTER CRIME

  • 7

    They define cybercrime as a crime committed with or through the use of information and communication technologies, such as RADIO, TELEVISION,CELLULAR PHONES, COMPUTER NETWORK.

    THE OFFICE OF CYBERCRIME OF THE PHILIPPINES DEPARTMENT OF JUSTICE

  • 8

    According to them cybercrime is any illegal behavior committed by means of, or in relation to a computer system or network including crimes as ILLEGAL POSSESSION, OFFERING OR DISTRIBUTING INFORMATION by means of computer

    PNP REVISED CRIMIMAL INVESTIGATION MANUAL OF 2011

  • 9

    According to him the term cybercrime means TECHNOLOGICAL CRIME, HIGH TECHNOLOGY CRIME, HIGH TECH CRIME, INTERNET CRIME, DIGITAL CRIME, ELECTRONIC CRIME.

    McQUADE 2009

  • 10

    This refers to a computer or computer network, the electronic medium in which the online communication takes place.

    CYBER

  • 11

    The first cyber attack in the world. Which robbers hacked the FRENCH TELEGRAPH SYSTEM and steal information from the STOCK MARKET.

    1834 FIRST CYBER ATTACK

  • 12

    The year which young boys repeatedly and purposely misdirecting and disconnecting customer calls of BELLS TELEPHONE COMPANY two years after.

    1878 EARLY MOBILE CALLS

  • 13

    Who invented the telephone in 1876?

    ALEXANDER GRAHAM BELL

  • 14

    The year where the University of Washington Data Center downloads a program on a computer from an unknown user. It is known as the first virus on computer.

    1969 RABBIT VIRUS

  • 15

    They usually affect the data on a computer, either by altering or deleting it.

    VIRUS

  • 16

    He penetrates some of the highest guarded networks in the world, NOKIA and MOTOROLA tracking codes and passwords

    1970-1995 KEVIN MITNICK

  • 17

    Are programs that attach themselves to a computer of a file and then circulate themselves to other files.

    VIRUS

  • 18

    He is the first to be convicted of Cybercrime

    1981 IAN "CAPTAIN" ZAP MURPHY

  • 19

    The year which CIA blows up a siberian gas pipeline by injecting code into the network and the operating system monitor the gas pipeline without using a bomb.

    1982- THE LOGIC BOMB

  • 20

    These are dependent programs where programs kick into action only when a certain event (known as TRIGGER EVENT) occurs.

    LOGIC BOMBS

  • 21

    He releases the first worm on the internet.

    ROBERT MORRIS

  • 22

    The year which a worm was relaese by a student Robert Morris of Massachusetts Institute of Technology.

    1988-THE MORRIS WORM

  • 23

    They do not need the host to attach themselves to. They merely make FUNCTIONAL COPIES of themselves and do this repeatedly.

    WORM

  • 24

    A diskette that appears to be and AIDS INFO DISK(AIDS) information archive is mailed to a UK electronic JOURNAL to thousands of AIDS.

    TROJAN HORSE

  • 25

    They invented TROJAN HORSE

    BASIT ALVI AND AMJAD FAROOQ ALVI

  • 26

    An unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing.

    TROJAN ATTACKS

  • 27

    It is a virus that infects microsoft word records, transmitting itself via email as an automatic document.

    1999- THE MELLISA VIRUS by DAVID L. SMITH

  • 28

    Also known as LOVE BUT or LOVE LETTER FOR YOU is a computer worn that infected over 10 million windows personal on MAY 5, 2000

    2000- I LOVE YOU VIRUS by ONEL DE GUZMAN

  • 29

    Hired by companies to prevent hackers or black hackers

    WHITE HACKERS

  • 30

    It is the bridge of Cybercrime

    LOGIC BOMB

  • 31

    It is the link use transaction of syndicate

    PIPELINE

  • 32

    Worms replicate slowly while___ eat up all the networks connected to it.

    VIRUS

  • 33

    This is hard to detect by the anti-virus

    TROJAN HORSE

  • 34

    The world's first software bomb is a destructive computer virus that can control systems used for controlling manufacturing facilities.

    2010 STUXNET WORM

  • 35

    CIA

    CENTRAL INTELLIGENCE AGENCY

  • 36

    AT&T

    AMERICAN TELEPHONE AND TELEGRAPH SYSTEM

  • 37

    Damages of Iloveyou virus

    315 BILLION DAMAGES

  • 38

    4 types of warrant

    1. WARRANT TO DISCLOSE COMPUTER DATA 2. WARRANT TO SEARCH, SEIZE, AND EXAMINE COMPUTER DATA 3. WARRANT TO INTERCEPT COMPUTER DATA 4. WARRANT TO EXAMINE COMPUTER DATA