Question Tag: Cybercrime

Search 500 + past questions and counting.
  • Filter by Professional Bodies

  • Filter by Subject

  • Filter by Series

  • Filter by Topics

  • Filter by Levels

MI – Nov 2015 – L1 – SB – Q6a – Information Systems

Identifies areas where computers serve as instruments and targets of crime.

a. In a computer environment, it is a common occurrence that data is lost, manipulated, or tampered with by unauthorized individuals for selfish reasons.

Required:
Enumerate FOUR areas where computers are used as instruments of crime and FOUR areas as targets of crime. (8 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

BL – Nov 2021 – L1 – SA – Q10 – Agency Law

Defining crimes committed using a computer.

Any crime committed using a computer is known as
A. Cybercrime
B. Internet fraud
C. Internet crime
D. Computerised crime
E. Computer crime

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

BL – Nov 2021 – L1 – SA – Q3 – Nigerian Legal System

Identifying offences covered by the Nigerian Cybercrime Act 2015.

Which of the following offences is NOT provided for in the Nigerian Cybercrime Act 2015?
A. Hacking computer systems
B. Cyber-bullying
C. Trafficking in persons
D. Child pornography offences
E. Identity theft

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

BL – May 2022 – L1 – SA – Q10 – Intellectual Property Law

Define the type of crime committed using a computer or network.

An offence committed with the aid or assistance of a computer or computer network is called
A. Computer fraud
B. Computer crime
C. Yahoo Yahoo
D. Electronic crime
E. Cybercrime

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

MI – May 2021 – L1 – SB – Q5c – Information Systems Development and Security

Lists and describes five techniques used in the forensic process.

List FIVE techniques used in forensic process and briefly describe each.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

MI – May 2021 – L1 – SB – Q5b – Information System Development and Security

States two uses of computer forensics in criminal and corporate investigations.

State TWO uses of computer forensics.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

MI – May 2021 – L1 – SB – Q5a – Information System Development and Security

Defines computer forensics and its role in criminal investigations and legal proceedings.

Define computer forensics.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

BL – Nov 2023 – L1 – SA – Q4 – Company Law

This question asks about the offence under the Cyber Security Act 2015.

Which of the following is an offence under the Cyber Security Act of 2015?
A. Glitches
B. Election rigging
C. Cyberchosis
D. Market rigging
E. Distribution to the public of racist and xenophobic materials, which attracts a fine of not less than N10 million

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

MI – Nov 2015 – L1 – SB – Q6a – Information Systems

Identifies areas where computers serve as instruments and targets of crime.

a. In a computer environment, it is a common occurrence that data is lost, manipulated, or tampered with by unauthorized individuals for selfish reasons.

Required:
Enumerate FOUR areas where computers are used as instruments of crime and FOUR areas as targets of crime. (8 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

BL – Nov 2021 – L1 – SA – Q10 – Agency Law

Defining crimes committed using a computer.

Any crime committed using a computer is known as
A. Cybercrime
B. Internet fraud
C. Internet crime
D. Computerised crime
E. Computer crime

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

BL – Nov 2021 – L1 – SA – Q3 – Nigerian Legal System

Identifying offences covered by the Nigerian Cybercrime Act 2015.

Which of the following offences is NOT provided for in the Nigerian Cybercrime Act 2015?
A. Hacking computer systems
B. Cyber-bullying
C. Trafficking in persons
D. Child pornography offences
E. Identity theft

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

BL – May 2022 – L1 – SA – Q10 – Intellectual Property Law

Define the type of crime committed using a computer or network.

An offence committed with the aid or assistance of a computer or computer network is called
A. Computer fraud
B. Computer crime
C. Yahoo Yahoo
D. Electronic crime
E. Cybercrime

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

MI – May 2021 – L1 – SB – Q5c – Information Systems Development and Security

Lists and describes five techniques used in the forensic process.

List FIVE techniques used in forensic process and briefly describe each.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

MI – May 2021 – L1 – SB – Q5b – Information System Development and Security

States two uses of computer forensics in criminal and corporate investigations.

State TWO uses of computer forensics.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

MI – May 2021 – L1 – SB – Q5a – Information System Development and Security

Defines computer forensics and its role in criminal investigations and legal proceedings.

Define computer forensics.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

BL – Nov 2023 – L1 – SA – Q4 – Company Law

This question asks about the offence under the Cyber Security Act 2015.

Which of the following is an offence under the Cyber Security Act of 2015?
A. Glitches
B. Election rigging
C. Cyberchosis
D. Market rigging
E. Distribution to the public of racist and xenophobic materials, which attracts a fine of not less than N10 million

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.