4 for COMPRE Flashcards

1
Q

Type of case review conducted at an early stage of the investigation

A

Informal (Golden Hour Review)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Allows the investigator to ensure that he has completed all the basic procedural and investigative requirements.

A

Self-inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Provide an overview of a long term investigation in order to aid decision-making with respect to whether all operational resources should be removed from the investigation

A

Concluding reviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A review on a sample of their solved cases in an effort to identify good practices and thereby learn from their past successes

A

Detected Case Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The preventive and protective measures and actions undertaken in order to safeguard records/documents in all government agencies from unauthorized and indiscriminate disclosure, damage, destruction and loss, whether these records are filed in the current or non-current storage area.

A

Security of records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The stage wherein record come into existence as a result of an agency’s operations.

A

Records Creation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Refers to managerial activities involve with respect to the records … Record maintenance and use transmission, retention and record… Order to achieve adequate and proper documentation of policies and

A

Records Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An advisory body on the improvement of all phases of records management chairman and members of which shall be designated by the head of the agency

A

Records Management Improvement Committee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Addresses the issue on paper files piling and document security from natural environmental cause

A

Digitizations program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Deals with keeping and maintaining records in custody as well as the procedures of classifying, filing and servicing them.

A

Files Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Major Categories of Value of Records

A

Time Value

Utility Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Classification of Records

A
  1. Top Secret Documents
  2. Secret Records or Documents
  3. Confidential Records or Documents
  4. Restricted Records or Documents
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Republic Act No. 9470

A

“National Archives of the Philippines Act of 2007”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Any act of introducing any dangerous drug into the body of any person, with or without his/her knowledge, by injection, inhalation, ingestion or other means, or of committing any act of indispensable assistance to a person in administering a dangerous drug to himself/herself unless administered by a duly licensed practitioner for purposes of medication.

A

Administer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An analytical test using a device, tool or equipment with a different chemical or physical principle that is more specific which will validate and confirm the result of the screening test.

A

Confirmatory Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Any act of knowingly planting, growing, raising, or permitting the planting, growing or raising of any plant which is the source of a dangerous drug.

A

Cultivation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Any act of knowingly passing a dangerous drug to another, personally or otherwise, and by any means, with or without consideration.

A

delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The willful act by any person of maliciously and surreptitiously inserting, placing, adding or attaching directly or indirectly, through any overt or covert act, whatever quantity of any dangerous drug and/or controlled precursor and essential chemical in the person, house, effects or in the immediate vicinity of an innocent individual for the purpose of implicating, incriminating or imputing the commission of any violation of this Act.

A

Planting of Evidence.

19
Q

Any person who knowingly and willfully consents to the unlawful acts provided for in this Act and uses his/her influence, power or position in shielding, harboring, screening or facilitating the escape of any person he/she knows, or has reasonable grounds to believe on or suspects, has violated the provisions of this Act in order to prevent the arrest, prosecution and conviction of the violator.

A

Protector/Coddler

20
Q

Any person who sells, trades, administers, dispenses, delivers or gives away to another, on any terms whatsoever, or distributes, dispatches in transit or transports dangerous drugs or who acts as a broker in any of such transactions, in violation of this Act.

A

Pusher

21
Q

Any act of giving away any dangerous drug and/or controlled precursor and essential chemical whether for money or any other consideration.

A

Sell

22
Q

Transactions involving the illegal trafficking of dangerous drugs and/or controlled precursors and essential chemicals using electronic devices such as, but not limited to, text messages, email, mobile or landlines, two-way radios, internet, instant messengers and chat rooms or acting as a broker in any of such transactions whether for money or any other consideration in violation of this Act.

A

Trading

23
Q

Any act of injecting, intravenously or intramuscularly, of consuming, either by chewing, smoking, sniffing, eating, swallowing, drinking or otherwise introducing into the physiological system of the body, and of the dangerous drugs.

A

Use.

24
Q

RA 9208

A

THE ANTI-TRAFFICKING IN PERSONS ACT OF 2003”

25
Q

“AN ACT TO INSTITUTE POLICIES TO ELIMINATE TRAFFICKING IN PERSONS ESPECIALLY WOMEN AND CHILDREN, ESTABLISHING THE NECESSARY INSTITUTIONAL MECHANISMS FOR THE PROTECTION AND SUPPORT OF TRAFFICKED PERSONS, PROVIDING PENALTIES FOR ITS VIOLATIONS, AND FOR OTHER PURPOSES”

A

REPUBLIC ACT 10364

26
Q

THERE ARE THREE INTERRELATED AND INTER-DEPENDENT ELEMENTS THAT MUST BE PRESENT TO ESTABLISH A TIP CASE:

A
  1. ACT/S
  2. MEANS
  3. EXPLOITATIVE PURPOSE
27
Q
  • Recruitment
  • Obtaining
  • Hiring
  • Providing
  • Offering
  • Transportation
  • Transfer
  • Maintaining
  • Harboring
  • Receipt of persons
A

Acts

28
Q
  • Threat
  • Use of force
  • Coercion
  • Abduction
  • Fraud
  • Deception
  • Abuse of power
  • Abuse of position
  • Taking advantage of the vulnerability of the person
  • Giving or receiving payment or benefits
A

Means

29
Q
Prostitution of others
•Other forms of sexual exploitation
•Forced labor or services
•Slavery or practices similar to slavery
•Involuntary Servitude
•Removal of organs
•Children in armed conflict
A

Exploitative Purpose

30
Q

If the victim is a child, the _____ are irrelevant.

A

means

31
Q

Victim’s consent or knowledge is ______.

A

irrelevant

32
Q

is an unlawful acts wherein the computer is either a:

  • TOOL
  • TARGET
  • or Both
A

Cybercrime

33
Q

provides a target rich environment for criminals

A

Cyberspace

34
Q

Offense against Confidentiality, Integrity, and Availability (CIA) of computer data and system: such as;

A
  • Illegal Access
  • Illegal Interception
  • Data Interference
  • System Interference
  • Misuse of Devices
35
Q

is simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.

A

Hacking

36
Q

Its is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means

A

Phishing

37
Q

-Section 33 of the law has two (2) provisions that enumerates and penalizes the following acts:
Computer hacking,
Introduction of computer virus, and
Copyright infringement

A

Republic Act 8792 Electronic Commerce Act of 2000

38
Q

This device is overlaid onto an existing ATM machine keypad and allows the ATM machine to function properly while it records the keystrokes
Skimming Device

A

Pinpad overlay device

Tiny camera

39
Q

➢Suspect get profile of would-be victims online
➢Suspects & victims Communicate online or thru phone call
➢Suspect offers sale of shares of stocks
➢Victim send payment to account number provided by suspects.

A

BOILER ROOM/INVESTMENT FRAUD

40
Q

➢an attacker hijacks communications between two machines, he then sets up his computer to filter the communications between the two compromised accounts, allowing him to view and alter the

A

Man-in-the-Middle

41
Q

-is the creation of an account (email, social media account, etc.) that looks like the same of the original, which the receiver cannot distinguish at the first instance.

A

Email spoofing

42
Q

Bad guy/gal uses online dating or social networking sites and posts attractive picture
➢Communicates and gains victim’s confidence
➢Then asks for money
➢Travel expenses to meet in person
➢Medical expenses
➢Information about the victim’s significant details such as bank account and credit cards to commit fraud.

A
  1. Romance scam
43
Q

Devising any scheme to defraud, or for obtaining money or property by means of false or fraudulent pretenses, or promises, and using the Internet for the purpose of executing the scheme.”

A
  1. NON-DELIVERY/NON-PAYMENT OF MERCHANDISE