CHAPTER 1 Flashcards

1
Q

“Ever since men began to modify their lives by using technology, they have found themselves in a series of technological traps”

A

Roger Revelle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

-are essentially a combination of the elements of COMPUTER AND NET CRIME

A

CYBER-CRIMES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

can be best defined as “Offenses that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly using modem telecommunication networks such as the Internet and mobile phones.

A

CYBER-CRIMES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is criminal activity that either targets or uses a computer, a computer network or a networked device.

A

CYBERCRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

– two or more computers that are connected with one another for the purpose of communicating data electronically

A

COMPUTER NETWORK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

–kind of device that are used to connect devices or computers together to transfer resources or files

A

NETWORK DEVICE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

 common sources being shared today is CONNECTION TO THE

A

INTERNET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • is criminal activity in computer alone
A

COMPUTER CRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

–no help or no internet

A

COMPUTER CRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

–online or illegal activity which is committed on/ through internet without the use of computer

A

NET CRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

-is the study of causation of crimes that occur in the cyberspace and its impact in the physical space (Jaishankar, 2007).

A

CYBER CRIMINOLOGY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

–coined the term CYBER CRIMINOLOGY, he did not only define it

A

JAISHANKAR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

–known as the Founding Father of Cyber Criminology

A

JAISHANKAR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

REASONS OF JAISHANKAR ON COINING THE CYBER CRIMINOLOGY

A
  1. According to him, the body of knowledge that deals with cybercrime should not be confused with investigations and it should be merged with the CYBER FORENSIC OR DIGITAL FORENSIC in terms of investigating cybercrimes
  2. There should be an independent discipline to study and explore cybercrimes from a social science perspective
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

–process of preservation, identification, extraction, and documentation of computer evidence which can be used by the court of law

A

DIGITAL FORENSIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is the cause why people commit cybercrime and traditional crime

A

ECONOMIC GAIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

some people commit cybercrime because of

A

THRILL OR TO SIMPLY SHOW THEIR TALENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • study of crimes, criminals and victims
A

CRIMINOLOGY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

– environment of the internet

A

CYBERSPACE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

GENERAL CATEGORIES OF CYBER CRIME:

A
  1. COMPUTER AS A TARGET
  2. COMPUTER AS A WEAPON
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

– illegal activity that attack other computers or the direct target is the computer itself

A

COMPUTER AS A TARGET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  • The computer as we know it today had its beginning on
A

19TH CENTURY.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

designed the ANALYTICAL ENGINE and this design was used as basic framework of the computers of today are based on.

A

CHARLES BABBAGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CHARLES BABBAGE designed the

A

ANALYTICAL ENGINE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

this design was used as basic framework of the computers of today are based on.

A

ANALYTICAL ENGINE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

-during that time, when this engine was made it is considered as the first era of modern computers

A

ANALYTICAL ENGINE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

–it is a fully controlled and an automatic mechanical digital computer

A

ANALYTICAL ENGINE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  • The first recorded cybercrime in the history took place in the year
A

1820.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

-he is a textile manufacturer in France

A

JOSEPH MARIE JACQUARD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

-later on, he devised a loom or device allowed the repetition of series of steps in weaving special fabrics

A

JOSEPH MARIE JACQUARD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

-there was indeed a device to facilitate the production of fabric, the Jacquard employees were afraid or threatened because there was a chance they would lose their jobs. With that his employees committed acts of sabotage to the technology that was made in order to discourage Jacquard to further use that new technology

A

JOSEPH MARIE JACQUARD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

–despite of what they did, the employees were not convicted

A

JOSEPH MARIE JACQUARD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  • The first person to be found guilty of cybercrime in history was
A

IAN MURPHY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

also known as CAPTAIN ZAP

A

IAN MURPHY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
  • The first person to be found guilty of cybercrime was IAN MURPHY, also known as CAPTAIN ZAP, and that happened in the year?
A

1981.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
  • The first unsolicited bulk commercial email was sent by a
A

DIGITAL EQUIPMENT CORP MARKETING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
  • The first unsolicited bulk commercial email was sent by a DIGITAL EQUIPMENT CORP MARKETING representative to every
A

ARPANET (ADVANCED RESEARCH PROJECTS AGENCY NETWORK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
  • The first unsolicited bulk commercial email was sent by a DIGITAL EQUIPMENT CORP MARKETING representative to every ARPANET (ADVANCED RESEARCH PROJECTS AGENCY NETWORK) address on the west coast of the United States on
A

May 3, 1978.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

ARPANET MEANS

A

ADVANCED RESEARCH PROJECTS AGENCY NETWORK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

The message promoted the availability of a new model of computer and was sent by

A

GARY THUERK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

The message promoted the availability of a new model of computer and was sent by GARY THUERK to

A

393 RECIPIENTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

unsolicited bulk commercial email is a formal name for

A

SPAM OR JUNK EMAILS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

-was the first wide-area packet-switching network with distributed control and one of the first networks to implement the TCP/IP protocol suite.

A

ADVANCED RESEARCH PROJECTS AGENCY NETWORK (ARPANET)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

-This technology became the technical foundation of the Internet.

A

ADVANCED RESEARCH PROJECTS AGENCY NETWORK (ARPANET)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q
  • suite of communication protocol use to interconnect network devices on the internet
A

TCP/IP OR TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

-also known as a LOVE BUG VIRUS

A

I LOVE YOU VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

-was a type of computer virus that attacked billions of computers with windows operating systems.

A

I LOVE YOU VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

-It started the attack MAY 2000 from the PHILIPPINES.

A

I LOVE YOU VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

-It started the attack MAY 2000 from the PHILIPPINES.

A

I LOVE YOU VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

-This virus was created by computer programmer student of AMA namely ONEL DE GUZMAN.

A

I LOVE YOU VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

I LOVE YOU VIRUS STARTED THE ATTACK ON?

A

MAY 2000 from the PHILIPPINES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

I LOVE YOU VIRUS spread through internet network as an ?

A

EMAIL ATTACHMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

The virus spread through internet network as an EMAIL ATTACHMENT, with the subject line as ____ and an attachment _____

A

“ILOVEYOU”

“LOVE-LETTER-FOR-YOU.txt.vbs”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

I LOVE YOU VIRUS WAS CREATED BY

A

ONEL DE GUZMAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

–he created this because his thesis was rejected, the reason why his professor rejected his thesis is about a virus then therefore for them, it is unethical since he is a student

A

ONEL DE GUZMAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

–once it was opened, a VISUAL BASIC SCRIPT OR VBS will be executed or ito na yung virus itself then the computer will be infected and finds the recipient outlook address book and resend the note to everyone in it then it will destroy every file of your computer including the jpeg, mp3

A

I LOVE YOU VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

–the virus target is the MICROSOFT OUTLOOK

A

I LOVE YOU VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

WITHIN 10 DAYS, HOW MANY NETWORKS WERE DESTROYED?

A

50 MILLION

56
Q

WHAT HAPPENED TO THE CASE OF ONEL DE GUZMAN?

A

NOTHING HAPPENED

57
Q

_____ filed cases against him, but even at the first stage, the indictment was _____ because there was no law penalizing the said act during the time of commission in the Philippines.

A

GOVERNMENT PROSECUTORS
DISMISSED

58
Q

“NULLUM CRIMEN, NULLA POENA SINE LEGE” MEANS

A

“THERE IS NO CRIME IF THERE IS NO LAW PUNISHING IT.”

59
Q

WHAT WAS THE EFFECT OF I LOVE YOU VIRUS CASE ON THE PHILIPPINE LEGISLATION?

A

the Philippine Congress enacted REPUBLIC ACT (RA) 8792, otherwise known as the “Electronic Commerce Act of 2000”. This was signed into law on JUNE 14, 2000.

60
Q

otherwise known as the “Electronic Commerce Act of 2000”

A

REPUBLIC ACT (RA) 8792

61
Q

This was signed into law on JUNE 14, 2000.

A

REPUBLIC ACT (RA) 8792

62
Q

THE SALIENT FEATURES OF THE ACT ARE AS FOLLOWS:

A

*Provides for the ADMISSIBILITY OF ELECTRONIC DOCUMENTS in court cases

*PENALIZES LIMITED ONLINE CRIME, such as hacking, introduction of viruses and copyright violations of AT LEAST PHP 100,000 and a maximum commensurate to the damage incurred, and imprisonment of six months to three years, among others;

  • PROMOTES E-COMMERCE in the country

*Aims to REDUCE GRAFT AND CORRUPTION IN GOVERNMENT

63
Q

PENALIZES LIMITED ONLINE CRIME, such as __________ and a maximum commensurate to the damage incurred, and imprisonment of _____, among others;

A

hacking, introduction of viruses and copyright violations of AT LEAST PHP 100,000

six months to three years

64
Q

-is considered the landmark law in the history of the Philippines since it has placed the Philippines among the countries penalizing cybercrime.

65
Q

-Likewise, the Supreme Court drafted the RULES ON ELECTRONIC EVIDENCE, which took effect on AUGUST 1, 2000, to emphasize the admissibility of evidence in electronic form, subject to its AUTHENTICITY AND RELIABILITY.

66
Q

Likewise, the Supreme Court drafted the RULES ON ELECTRONIC EVIDENCE, which took effect on ______, to emphasize the admissibility of evidence in electronic form, subject to its _____

A

AUGUST 1, 2000

AUTHENTICITY AND RELIABILITY.

67
Q

The first Filipino to be convicted of cybercrime, was

A

JJ MARIA GINER

67
Q

JJ MARIA GINER He was convicted in ____ BY _____

A

SEPTEMBER 2005 by Manila MTC Branch 14 JUDGE ROSALYN MISLOS-LOJA.

67
Q

Giner pleaded guilty to hacking the

A

government portal “gov.ph” and other government websites.

68
Q

He was sentenced to ONE TO TWO YEARS of imprisonment and fined Php100,000. However, he immediately APPLIED FOR PROBATION, which was eventually granted by the court.

A

JJ MARIA GINER

69
Q

is considered a landmark case, as he is the first local hacker to be convicted under SECTION 33A OF THE E-COMMERCE LAW OR REPUBLIC ACT 8792.

A

CONVICTION OF GINER

70
Q

The CONVICTION OF GINER is considered a landmark case, as he is the first local hacker to be convicted under

A

SECTION 33A OF THE E-COMMERCE LAW OR REPUBLIC ACT 8792.

71
Q

-electronic machine or device powered by electric wherein its task or function is that it accepts data, stores data, processes data into a useful information.

72
Q

is made up of multiple parts and components that facilitate user functionality.

73
Q

TWO PRIMARY CATEGORIES OF COMPUTER

A
  1. HARDWARE
  2. SOFTWARE
74
Q
  • The physical components of a computer system
75
Q
  • These are the instructions that tell the computer what to do and how to do it.
76
Q

–a.k.a PROGRAMS

77
Q

HARDWARE COMPONENTS

A
  1. INPUT DEVICES
  2. OUTPUT DEVICES
  3. PROCESSING DEVICES
  4. STORAGE MEDIA
78
Q

is any hardware component that allows the user to enter data into the computer.

A

INPUT DEVICES

78
Q

-one of the pointing device that has a pointer that changes into different shape as we use it

79
Q

INPUT DEVICES EXAMPLES

A
  • KEYBOARD
  • MOUSE
  • SCANNER
  • MICROPHONE
  • DIGITAL CAMERA
  • PC VIDEO CAMERA
80
Q

is the pointing device in laptop

81
Q

is any hardware component that gives information to the user

A

OUTPUT DEVICES

82
Q

OUTPUT DEVICES EXAMPLES

A
  • MONITOR
  • PRINTER
  • SPEAKER
82
Q

-components responsible for the processing of information within the computer system

A
  1. PROCESSING DEVICES
83
Q

–core function of the any computer

A
  1. PROCESSING DEVICES
84
Q

–raw data is transformed into information

A
  1. PROCESSING DEVICES
85
Q

2 COMMON EXAMPLE OF PROCESSING DEVICES

A
  • CPU/ CENTRAL PROCESSING UNIT
  • MOTHERBOARD
86
Q

-considered as the brain of the computer

A
  • CPU/ CENTRAL PROCESSING UNIT
87
Q

-is considered as the backbone of the computer

A
  • MOTHERBOARD
88
Q

-it connect some of the parts of a computer together

A
  • MOTHERBOARD
89
Q

THE TWO MAIN CATEGORIES OF SOFTWARE:

A
  • SYSTEM SOFTWARE
  • APPLICATION SOFTWARE
90
Q

also called the OPERATING SYSTEM (OS) which actually runs the computer.

A
  • SYSTEM SOFTWARE
91
Q

–common system software is

A

WINDOWS OPERATING SYSTEM, MacOS, IOS, ANDROID

92
Q

is a program that allows users to a specific task on the computer.

A
  • APPLICATION SOFTWARE
93
Q

EXAMPLES OF APPLICATION SOFTWARE

A
  • WORD PROCESSING APPLICATION
  • SPREADSHEET APPLICATION
  • E-MAIL APPLICATION
  • INTERNET APPLICATION
94
Q

-keeps data, information and instructions for use in the future.

A

STORAGE DEVICE/ MEDIUM OR MEDIA

95
Q

STORAGE MEDIA/ STORAGE MEDIUM/ STORAGE DEVICE HAS

A

WRITING
READING

96
Q

– when the user saves information or data in storage devices, the process is

97
Q
  • once we open the data or information that we saved in the storage devices, the process is
98
Q

PRIMARY STORAGE

A
  • RAM (RANDOM ACCESS MEMORY)
99
Q
  • is the primary storage of a computer.
A
  • RAM (RANDOM ACCESS MEMORY)
100
Q

-When you’re working on a file on your computer, it will temporarily store data in your

A
  • RAM (RANDOM ACCESS MEMORY)
101
Q

-It allows you to perform everyday tasks like opening applications, loading webpages, editing a document or playing games, and allows you to quickly jump from one task to another without losing your progress.

A
  • RAM (RANDOM ACCESS MEMORY)
101
Q

–considered as VOLATILE MEMORY means that it is unstable so once i-off yung laptop ay mawawala lahat ng data since it is TEMPORARILY STORED

A
  • RAM (RANDOM ACCESS MEMORY)
102
Q

RAM MEANS

A
  • RAM (RANDOM ACCESS MEMORY)
103
Q

ROM MEANING

A

READ ONLY MEMORY

104
Q

–stores the application software and operating system

A

ROM/READ ONLY MEMORY

105
Q

–considered as NON- VOLATILE MEMORY

A

ROM/READ ONLY MEMORY

106
Q

SECONDARY STORAGE

A

HARD DISK DRIVES (HDD) & SOLID-STATE DRIVES (SSD)

107
Q

are commonly used as the main storage device in a computer.

A
  • HARD DISK DRIVES (HDD)
108
Q

often store operating system, software programs and other files.

A
  • HARD DISK DRIVES (HDD)
109
Q

-These are magnetic storage devices

A
  • HARD DISK DRIVES (HDD)
110
Q

–takes longer to gather information due to the mechanical nature which is it needs to rotate first

A
  • HARD DISK DRIVES (HDD)
111
Q

–many intricate moving parts so it is vulnerable to damage and wet

A
  • HARD DISK DRIVES (HDD)
112
Q
  • is a new generation of storage device used in computers.
A
  • SOLID-STATE DRIVES (SSD)
113
Q

replace traditional mechanical hard disks by using flash-based memory, which is significantly faster.

A
  • SOLID-STATE DRIVES (SSD)
114
Q

don’t rely on magnets and disks, instead they use a type of flash memory called NAND OR NOT AND

A
  • SOLID-STATE DRIVES (SSD)
115
Q

SSDs don’t rely on magnets and disks, instead they use a type of flash memory called

A

NAND OR NOT AND

116
Q

EXTERNAL STORAGE DEVICES

A
  • EXTERNAL HARD DRIVE
  • FLOPPY DISKS
  • CDs, DVDs, and Blu-Ray disks
  • FLASH MEMORY DEVICES
117
Q
  • is a device which is plugged into your machine to give almost-immediate storage space, without the need to open or use your computer’s internal storage.
A
  • EXTERNAL HARD DRIVE
118
Q

-were the first widely available portable, removable storage devices.

A
  • FLOPPY DISKS
119
Q

-They work in the same way as hard disk drives, although at a much smaller scale.

A

FLOPPY DISKS

120
Q

was the fist personal computer (PC) release without a floppy disk drive

121
Q

-are used for a lot more than just playing music and videos

A
  • CDs, DVDs, and Blu-Ray disks
122
Q

—they also act as storage devices, and collectively they’re known as OPTICAL STORAGE DEVICES OR OPTICAL DISK MEDIA.

A
  • CDs, DVDs, and Blu-Ray disks
122
Q

–working through the action of light

A
  • CDs, DVDs, and Blu-Ray disks
123
Q
  • CDs, DVDs, and Blu-Ray disks
    -are used for a lot more than just playing music and videos—they also act as storage devices, and collectively they’re known as
A

OPTICAL STORAGE DEVICES OR OPTICAL DISK MEDIA

124
Q

–working through the action of light

A
  • CDs, DVDs, and Blu-Ray disks
125
Q

– are the latest available drive
–reserve with high-definition display

A

BLU-RAY DISK

126
Q

CD- ROM MEANS

A

COMPACT DISC- READ ONLY MEMORY

126
Q

–is optical storage disk where data written on them is already permanent and cannot be removed or overwritten or palitan

A

CD- ROM (COMPACT DISC- READ ONLY MEMORY)

126
Q

–common in software installation program
–cannot be used as personal storage device

A

CD- ROM (COMPACT DISC- READ ONLY MEMORY)

127
Q

CD-RW MEANS

A

COMPACT DISC RE-WRITABLE

127
Q

CD-R MEANS

A

COMPACT DISC- RECORDABLE

128
Q

– recordable but cannot be overwritten; not flexible

A

CD-R(COMPACT DISC- RECORDABLE)

129
Q

– you can continuously write data and erase data from them

A

CD-RW (COMPACT DISC RE-WRITABLE)

130
Q

– these are small, portable storage devices that have long been a popular choice for extra computer storage.

A
  • FLASH MEMORY DEVICES
130
Q

-The most recognizable type of flash memory device is the

A

USB FLASH DRIVE