- 1. Denotes the degree or grade by which a person, thing, or other entity has a property or quality
greater or less in extent than that of another
A) Policing B) Police C) Comparative D) System
- 2. Police typically are responsible for maintaining public order and safety, enforcing the law, and
preventing, detecting, and investigating criminal activities.
A) System B) Policing C) Police D) Comparative
- 3. These functions are known as policing.
A) System B) Policing C) Comparative D) Police
- 4. are
often also entrusted with various licensing and regulatory activities. T
A) Police B) Policing C) Comparative D) System
- 5. The modern metropolitan police force began
with
A) Sir Rubert Peel B) Sir Robert Pill C) Sir Rubert Pill D) Sir Robert Peel
- 6. is one of the most important functions undertaken by the every sovereign government.
A) Police B) Policing C) Comparative D) System
- 7. Policing mainly rests on either of the two broad principles:
A) Policing by contract and Policing by the low B) Policing by contract and Policing by law C) Policing by consent and Policing by law D) Policing by consent and Policing by low
- 8. Combination of parts in a whole; orderly arrangement according to some common law; collection of
rules and principles in science or art; method of transacting business
A) Police B) Policing C) System D) Comparative police system
- 9. Process of outlining the similarities and differences of one police system to another in order to discover
insights in the field of international policing.
A) Police B) Comparative C) System D) Comparative police system
- 10. The word comes via French word Policier,
from Latin _____ _______ ("civil administration")
A) Pulis B) politia C) polis D) Policier
- 11. from ancient Greek word _____ ("city").
A) Police B) Politia C) Pulis D) Polis
- 12. Comparative research is usually carried out by the ______ _________ (a researcher visits another
country)
A) cooperative method B) safari method C) collaborative method D) foreign method
- 13. Comparative research is usually carried out by the _________ __________(the researcher communicates with a foreign researcher).
A) safari method B) cooperative method C) foreign method D) collaborative method
- 14. Comparative is the form of an adjective or adverb which denotes the degree or by which a person or thing
has a quality greater or less in extent than that of another, and is used in this context with a subordinating conjunction.
A) Comparative research B) Comparative police system C) Comparative
- 15. The rapid development of the western culture that affects other cultures in the world as brought by
intellectual and technological advances, in which some crimes occurring in other countries are attributed.
A) Globalization B) Global C) Environmentation D) Organization
A) Service B) Legalistic C) All of these D) Watchman
- 17. Emphasizes maintaining order, usually found in communities with a declining industrial base,
and a blue-collar, mixed ethnic/racial population.
A) Watchman B) Legalistic C) Service
- 18. Emphasizes law enforcement and professionalism.
A) Legalistic B) Service C) Watchman
- 19. Emphasizes the service functions of police work, usually found in suburban, middle-class
communities where residents demand individual treatment.
A) Legalistic B) Service C) Watchman
- 20. is based on the presumption that the repression of criminal behavior is the most important aspect of police
duty and therefore should be given priority.
A) Crime control model B) Theories in policing C) Due process model
- 21. When due process is the primary object of policing, police policy is that is far better than 100 guilty men
escape justice rather than one innocent person be convicted.
A) Theories in policing B) Crime control model C) Due process model
- 22. This approach has been rationalized in the past by the assumption that inconvenience or harassment of
innocent people can be justified by the fact that police are fighting crime
A) Due process model B) Theories in policing C) Crime control model
- 23. is the theory of police service which maintains that police officers are servants of higher
authorities.
A) Home rule B) Continental C) Theories in policing
- 24. the theory of police service which states that police officers are servants of the community or
the people.
A) Theories in policing B) Home rule C) Continental
- 25. Key Elements of Terrorism
A) It is carried out by sub – national groups B) All of these C) It is aimed at civilians D) Terrorism is premeditated E) It is political
- 26. It refers to the Anti-Terrorism Act of 2020?
A) R.A. 11578 B) R.A. 11379 C) R.A. 11489 D) R.A. 11579 E) R.A. 11479
- 27. The following are some of the famous terrorist group in the world, which of the following is an example of transnational terrorist?
A) Abu Sayyaf Taliban B) Hamas C) ISIS D) Jemaah Islamiah
- 28. In organized crime group they are motivated by?
A) Fame B) Money C) Ideology D) Power E) Connection
- 29. This is a type of terrorism which based and operate entirely within a certain country is called.
A) Local Terrorism B) Global Terrorism C) International Terrorism D) Transnational Terrorism E) National Terrorism
- 30. Is a term used to describe a massive weapon with the capacity to indiscriminately kill large numbers of
people.
A) Nuclear Biological and Chemical Weapons (NBC) B) Biological Weapons anthrax virus C) Weapon of Mass Destruction (WMD) D) Chemical weapons E) Weapon of mass destruction
- 31. This refers to the offenses whose inception, prevention and/or direct or indirect effects involve more than one country is known as ________________.
A) International offenses B) Terrorism C) Transnational crimes D) Organized crime E) Illegal Recruitment
- 32. Jemaah Islamiah operated in some of Southeast Asian country, which of the following is not included?
A) Brunei B) Taiwan C) Malaysia D) Indonesia E) Philippines
- 33. R. A. 9208 is otherwise known as _____________.
A) Human Security Law B) Anti-trafficking in Person Act of 2003 C) Migrant Worker and Overseas Filipino Act D) Cybercrime prevention act of 2012 E) Philippine Passport Act of 1996
- 34. It refers to any crime that involves a computer and network, where the computer may or may not have played an instrumental part in the commission of a crime.
A) Cyber crimes B) Networking C) Technology crimes D) Web schemes E) Computer fraud
- 35. Who is the Filipino science student who invented/introduce the "I love You virus"
A) Jonel De Guzman B) Onel De Guzman C) Robert Moriss D) David Guzman E) Angelo De Guzman
- 36. In the steps of money laundering, when money is returned to the regular economy through purchase of Investment, the launderer then makes the proceeds available to the criminals in a apparently legitimate form.
A) Integration B) Placement C) Loan sharking D) Intervention E) Layering
- 37. The Golden Crest is one of the notorious criminal syndicate located at the crossroads of Central, South and Western Asia which known for major production of illegal what?
A) Marijuana B) Human organ C) smuggling of firearms D) Prostitution E) Opium
- 38. It refers to the monetary proceeds of criminal activity are converted into funds with an apparent legal source.
A) Smuggling B) Trafficking C) Money Laundering D) Lending E) Terrorism
- 39. Mafia is a criminal syndicate that emerged in the mid 19th century in __________.
A) North America B) Japan C) Italy D) Mexico E) Spain
- 40. ISIS is one of rebel or terrorist group which controlling the territory of Mosul. ISIS stands for?
A) Islamic State of Iran and the Syria B) Islamic State of Iraq and the Syberia C) Islamic State of Iraq and the Syria D) Islamic State of Iran and the South Africa E) Islamic State of Israel and the Somalia
- 41. Hezbollah is a terrorist group was originated in Lebanon, is a Shi'a Muslim militant group and political party which literally means?
A) Son of Allah B) Father of Swordsmith C) The Base D) Party of God E) Part of God
- 42. One of the famous attack in the history wherein they hijacked four commercial passenger jet airliners.
crashing two of them into the World Trade Center in New York City and one into the Pentagon. This was made by ?
A) Hamas B) Taliban C) Maute D) ISIS E) Al Qaeda
- 43. The terrorists are motivated by their?
A) Money B) Fame C) Power D) Ideology E) Connection
- 44. Spreading virus to destroy the computer of others is under what category of cybercrime?
A) Computer as a weapon B) Computer as a gadget C) Computer as a target D) Computer as an accessory E) Computer as a tool
- 45. It is known as Japan's native organized group whose members have full-body tattoos and severed fingertips.
A) Triad B) Yakuza C) Mafia D) Al Qaeda E) Taliban
- 46. It refers to the monetary proceeds of criminal activity are converted into funds with an apparent legal source.
A) Money Laundering B) Smuggling C) Terrorism D) Lending E) Trafficking
- 47. Which of the following terrorist group based in and around the southern Philippines, where for almost 30years various Muslim group have been engaged in an insurgency for an independent province in the country.
A) Maute Group B) MJLF C) Abu Sayyaf Group D) Jemaah Islamiah E) Taliban
- 48. It refers to using a computer as a "fancy filing cabinet" formatich to store illegal or stolen information.
A) Computer as a target B) Computer as a weapon C) Computer as a gadget D) Computer as an accessory E) Computer as a storage
- 49. What law is otherwise known as the Cyber Prevention Act Of 2012?
A) R.A. 10022 B) R.A. 10175 C) R.A. 10157 D) R.A. 10158 E) OR.A. 10575
- 50. It refers to the Anti-Terrorism Act of 2020?
A) R.A. 11578 B) R.A. 11379 C) R.A. 11479 D) R.A. 11579 E) R.A. 11489
- 51. The group Al Qaeda is one of the famous terrorist group which operates as a network comprising both a multinational, stateless army which literally means?
A) Party of God B) The State C) The Base D) The Father of Swordsmith
- 52. The word Abu Sayyaf who is operating in the around Southern Philippines is literally means?
A) Party of God B) The Base C) Islamic Congregation D) Father of Swordsmith E) The Son of God
- 53. One of the famous attack in the history wherein they hijacked four commercial passenger jet airliners, crashing two of them into the World Trade Center in New York City and one into the Pentagon. This terrorist attack happen on?
A) November 01,2011 B) September 11, 2001 C) December 11, 1991 D) November 11, 2001 E) September, 11, 2011
- 54. It is a militant Sunni Islamist group founded by Osama bin Laden, operates as a network comprising both multinational, stateless army and a radical Sunni Muslim movement calling for global Jihad.
A) Mafia B) Al Qaeda C) Jemaah Islamiah D) ISIS E) Hezbollah
- 55. terrorist groups who operate across national borders, whose actions and
political aspirations may affect individuals of more than one nationality.
A) Local Terrorism B) Global Terrorism C) National Terrorism D) Transnational Terrorism E) International Terrorism
- 56. foreign based and is directed against a country by countries or groups outside
that country.
A) National Terrorism B) International Terrorism C) Transnational Terrorism D) Local Terrorism E) Global Terrorism
- 57. Hezbollah Leader ______ ________ Founded 1982 – 1985 (officially)
A) Abubakar Shekau B) Mullah Mohammed Omar C) Mohammed Yusuf D) Osama bin Laden E) Hassan Nasrallah
- 58. militant Sunni Islamist group founded by _______ _______ sometime between August 1988 and
late 1989.
A) Hassan Nasrallah B) Mohammed Yusuf C) Abubakar Shekau D) Osama bin Laden E) Mullah Mohammed Omar
- 59. Leaders of Boko Haram ("Western education is forbidden"),
A) Abubakar Shekau B) Sheikh Ahmed Yassin C) Osama bin laden D) Mullah mohammed omar E) Hassan Nasrallah
A) Osama bin laden B) Hassan Nasrallah C) Abubakar Shekau D) Sheikh Ahmed Yassin E) Mullah mohammed omar
- 61. Hezbollah Official colours
A) Orange, Green B) Green, Red C) Yellow, Orange D) Yellow, Red E) Yellow, Green
A) Moro National Lebration Front B) Moro Nation Lebration Front C) Moro National Liberation Front D) Moro Nation Liberation Front
- 63. signed a landmark peace agreement with the Philippine government that saw the creation
of Autonomous Region in Muslim Mindanao (ARMM), an area composed of two mainland provinces and three island provinces in which the predominantly Muslim population enjoys a degree of self-rule.
A) MNLF B) MILF C) Hamas D) ISIS E) Abu Sayaff
A) Moro Islamic Lebration Front B) Moro Islamia Liberation Front C) Moro Islam liberation Front D) Moro Islamic Liberation Front E) Moro Islam Lebration Front
A) Bangsamoro Islamic Armed Forces B) Bangsamoro Islam Armed Forces C) Bangsamoro Islamic Arms Forces D) Bangsamoro Islamic Arm Forces E) Bangsamoro Islamia Armed Forces
- 66. is a group based
in Mindanao, Philippines seeking an autonomous region of the Moro people from the central government.
A) Abu Sayyaf B) BIAF C) ISIS D) MILF E) MNLF
- 67. it is a criminal syndicate that emerged in the mid 19th century in Sicily. It is a loose association of criminal
groups that share a common organizational structure and code of conduct.
A) MAFIA B) YAKUZA C) TRIAD D) MILF E) MNLF
- 68. it is a term used to described many branches of Chinese criminal organizations based in Hong Kong, Macau,
Mainland China, and also in countries with significant Chinese populations, such as Malaysia, Singapore, Taiwan, the United States and Canada
A) MNLF B) TRIAD C) MILF D) YAKUZA E) MAFIA
- 69. created upon enactment of RA 9165 in 2002
A) AFP B) PNP C) PDEA D) FBB E) DDB
A) Dangerous Drugs Board B) Danger Drugs Board C) Danger Drugs Bord D) Dangerous Drug Boards E) Dangerous Drug Boards
- 71. mostly abused by classes C, D, & E
A) Cocaine B) Marijuana C) Shabu D) Ecstacy
- 72. prevalent in schools & slum areas
A) Cocaine B) Ecstasy C) Marijuana D) Shabu
- 73. popular users: classes A & B
A) Marijuana B) Shabu C) Ecstasy D) Cocaine
- 74. rampant in bars, house parties Drug
A) Ecstasy B) Shabu C) Marijuana D) Cocaine
- 75. money legally obtained as
A) Pure B) Smooth C) Was D) Clean E) Dirty
- 76. money illegally obtained as
A) Pure B) Wash C) Clean D) Dirty E) Smooth
- 77. RA 9160 This Act shall be known as the ____________ .
A) Anti-Trafficking in Persons Act of 2003 B) Anti-Money Laundering Act of 2001 C) Cybercrime Prevention Act Republic Act D) Electronic Commerce Act
- 78. Republic Act No. 8792 This Act shall be known as the _____________.
A) “Electronic Commerce Act B) Anti-Money Laundering Act C) Anti-Trafficking in Persons Act D) Cybercrime Prevention Act Republic Act
- 79. The first involves the physical distribution of the cash
A) Layering B) Placement C) Integration
- 80. second involves carrying out complex financial transactions in order to camouflage the illegal source
A) Layering B) Placement C) Integration
- 81. the final step entails acquiring wealth generated from the transactions of the illicit funds
A) Integration B) Placement C) Layering
A) Anti-trafficking in Persons Act of 2003 B) Migrant Workers and Overseas Filipino Act C) An Act to Declare Unlawful the Practice of Matching Filipino Women for Marriage to Foreign Nationals on a Mall-Orders Basis and Other similar Practices D) Special Protection of Children Against Abuse, Exploitation and Discrimination Act E) Philippine Passport Act of 1996
- 83. SMUGGLING OF HUMAN ORGANS
A) RA 9208 B) RA 6955 C) RA 8042 D) RA 7610 E) RA 9208
- 84. Special Protection of Children Against Abuse, Exploitation and Discrimination Act
A) RA 6955 B) RA 8042 C) RA 9208 D) RA 8239 E) RA 7610
- 85. Migrant Workers and Overseas Filipino Act
A) RA 6955 B) RA 8239 C) RA 8042 D) RA 9208 E) RA 7610
- 86. An Act to Declare Unlawful the Practice of Matching Filipino Women for Marriage to
Foreign Nationals on a Mall-Orders Basis and Other similar Practices
A) RA 8042 B) RA 8239 C) RA 9208 D) RA 6955 E) RA 7610
- 87. Philippine Passport Act of 1996
A) RA 9208 B) RA 8239 C) RA 7610 D) RA 6955 E) RA 8042
- 88. Causes of human trafficking
A) Corruption B) Weak enforcement of laws C) Family orientation & values D) Poverty E) All of these
- 89. Organized by unscrupulous travel agency to have one “bogus family”,
A) Family tours B) Human trafficking C) Human smuggling D) Smuggling of firearms
- 90. Transnational importation of illegal firearms, mostly small arms, by governments and insurgents in war
zone regions.
A) Human smuggling B) Family tours C) Money laundering D) Smuggling of firearms E) Human trafficking
- 91. Process of moving money from the location of the criminal activity
A) Prostitution B) Integration C) Layering D) Loan sharking E) Placement
- 92. Involves the frequent series of money transfers and transaction used to “cover the tracks” of the illegal
funds.
A) Loan sharking B) Integration C) Placement D) Prostitution E) Layering
- 93. When the money is returned to the regular economy through purchase of investment.
A) Layering B) Loan sharking C) Placement D) Integration E) Prostitution
- 94. Getting currency into the bank, around the reporting system, at home or abroad.
A) Prostitution B) Layering C) Placement D) Loan sharking E) Integration
- 95. It refers to the lending of money at excessively high rates of interest.
A) Placement B) Integration C) Loan sharking D) Prostitution E) Layering
- 96. The act or practice of providing sexual services to another person in return for payment.
A) Loan sharking B) Placement C) Layering D) Integration E) Prostitution
- 97. Depiction of erotic behavior intended to cause sexual excitement. The word originally signified any
work of art or literature depicting the life of prostitutes.
A) Layering B) Cybercrime C) Pornography D) Prostitution E) Loan sharking
- 98. Sexually explicit pictures, writing, or other material whose primary purpose is to cause sexual arousal.
A) Prostitution B) Layering C) Integration D) Pornography E) Placement
- 99. using a computer to commit “traditional crime” that we see in the physical
world (such as fraud or illegal gambling)
A) Computer as a weapon B) Computer as an accesory C) Computer as a target
- 100. AN ACT AMENDING RA 8042 MIGRANT WORKERS AND OVERSEAS
FILIPINO ACT
A) RA 10175 B) RA 10158 C) RA 10022
|