Back to Library

Cybercrime Prevention Act of 2012

Law

This document outlines Republic Act No. 10175, also known as the Cybercrime Prevention Act of 2012, which defines cybercrime, provides for its prevention, investigation, suppression, and penalties. It details various cybercrimes, their corresponding penalties, and the enforcement and implementation procedures, including the roles of law enforcement agencies and courts.

Cybercrime Legislation Technology
17 Questions Medium Ages 16+ Apr 14, 2026

Choose a Study Format

Embed This Study Set

Add this interactive study set to your website or blog — all 6 formats included.

<div data-quixly-id="1718"></div> <script src="https://www.quixlylearn.com/assets/embed/widget.js"></script>

About this Study Set

This study set covers Law through 17 practice questions. This document outlines Republic Act No. 10175, also known as the Cybercrime Prevention Act of 2012, which defines cybercrime, provides for its prevention, investigation, suppression, and penalties. It details various cybercrimes, their corresponding penalties, and the enforcement and implementation procedures, including the roles of law enforcement agencies and courts. Every question includes the correct answer so you can learn as you go — pick any format above to get started.

Questions & Answers

Browse all 17 questions from the Cybercrime Prevention Act of 2012 study set below. Each question shows the correct answer — select a study format above to practice interactively.

1 What is the official title of Republic Act No. 10175?
  • A The Cybercrime Prevention Act of 2012
  • B The Anti-Cybercrime Law
  • C An Act Defining Cybercrime
  • D The Digital Crimes Act
2 Which of the following is NOT recognized by the State as a vital role of information and communications industries in the nation's development?
  • A Content production
  • B Telecommunications
  • C Traditional manufacturing
  • D Electronic commerce
3 What is the primary goal of the State regarding information and communications technology (ICT) as stated in the Act?
  • A To limit its use
  • B To restrict access to information
  • C To attain free, easy, and intelligible access to exchange and/or delivery of information
  • D To prioritize physical industries over digital ones
4 According to Section 3(a), 'Access' refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network. What does this definition primarily encompass?
  • A Physical access to hardware
  • B Any form of interaction with a computer system or network
  • C Only reading data
  • D Only sending data
5 What does 'Alteration' refer to in the context of computer data, as defined in Section 3(b)?
  • A The creation of new data
  • B The deletion of existing data
  • C The modification or change in form or substance of existing computer data or program
  • D The backup of computer data
6 Section 3(d) defines a 'Computer' as an electronic, magnetic, optical, electrochemical, or other data processing or communications device. What does this definition explicitly include?
  • A Only desktop computers
  • B Only mainframe computers
  • C Any type of computer device including mobile phones and smart phones
  • D Only devices with optical drives
7 What is 'Computer data' as defined in Section 3(e)?
  • A Only raw binary code
  • B Any representation of facts, information, or concepts in a form suitable for computer processing
  • C Only physical documents scanned into a computer
  • D Only data stored on a hard drive
8 According to Section 3(g), a 'Computer system' covers any type of device with data processing capabilities. What does it include?
  • A Only the hardware components
  • B Only the software components
  • C Hardware and software, which may stand alone or be connected in a network
  • D Only devices connected to the internet
9 What does 'Without right' mean in Section 3(h)?
  • A Conduct undertaken with full authority
  • B Conduct undertaken without or in excess of authority, or not covered by legal defenses
  • C Conduct only performed by authorized personnel
  • D Conduct performed with prior court approval
10 What is 'Critical infrastructure' as defined in Section 3(j)?
  • A Any computer system
  • B Computer systems, networks, or programs vital to the country whose incapacity would have a debilitating impact
  • C Public transportation systems
  • D All government databases
11 What does 'Cybersecurity' encompass, according to Section 3(k)?
  • A Only antivirus software
  • B The collection of tools, policies, and technologies to protect the cyber environment
  • C Physical security of computer labs
  • D Only password protection
12 In Section 3(m), 'Interception' refers to listening to, recording, monitoring, or surveillance of the content of communications through technical means. What is a key aspect of this definition?
  • A It requires physical access to the device
  • B It can be done directly or indirectly through electronic eavesdropping
  • C It only applies to voice communications
  • D It only applies to data that is publicly available
13 What are 'Subscriber's information' as per Section 3(o)?
  • A Only the subscriber's name
  • B Any information held by a service provider that can establish a subscriber's identity, excluding traffic or content data
  • C Only billing information
  • D The content of all communications
14 What does 'Traffic data' or 'non-content data' refer to in Section 3(p)?
  • A The actual content of a communication
  • B Information like origin, destination, time, and duration of a communication, but not its content
  • C Personal messages exchanged
  • D The entire communication log
15 Which of the following is listed as a 'Cybercrime Offense' under Section 4(a)?
  • A Computer-related fraud
  • B Illegal Access
  • C Cybersex
  • D Libel
16 What is 'Data Interference' as defined in Section 4(a)(3)?
  • A Unauthorized access to data
  • B Intentional or reckless alteration, damage, deletion, or deterioration of computer data without right
  • C The transmission of viruses
  • D Intercepting communications
17 Section 4(a)(5) covers 'Misuse of Devices'. What does this include?
  • A Using a computer for educational purposes
  • B Making available devices or programs designed for committing cybercrimes, or passwords with such intent
  • C Using a mobile phone for calls
  • D Accessing public Wi-Fi
📱

Study on the go

Download Quixly and access all study formats on your phone — anywhere, anytime.

Download on App Store Get it on Google Play Get it on Chrome Web Store