Filters
Question type

Study Flashcards

__________ people in the general public consider online affairs to be just as real as offline affairs.

Correct Answer

verifed

verified

Cyberdeviance can be split into two broad types: disrupting a computer network as a target and


A) using the computer as a tool to commit deviant acts.
B) using the computer to keep records of deviance.
C) creating a method of hacking.
D) creating a computer network to commit deviance.

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

D

Which of the following is one reason why the United States cannot stop Internet gambling within their borders?


A) the lack of law enforcement
B) the lack of laws
C) too many compulsive Internet gamblers
D) organized crime involvement

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

The key factor that allows people to express their anti-minority feelings and beliefs is


A) the number of computers available.
B) anonymity.
C) freedom.
D) prejudice.

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

The reason the text's authors call the Internet the new, wild frontier of deviance today is because Internet deviants are more educated and clever.

A) True
B) False

Correct Answer

verifed

verified

Joe engaged in an online affair,but when he was caught by his wife,he insisted it was not an affair.He was likely to use all of the following reasons to deny guilt,EXCEPT that


A) no real sex took place.
B) it was merely fun.
C) it only involved a relationship to a machine.
D) no one was hurt by the affair.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Hacktivism involves accessing computer systems and files,by illegal means,for various political and socially conscientious purposes.

A) True
B) False

Correct Answer

verifed

verified

Most people consider online affairs just as real as offline affairs because


A) they involve the deviant use of a computer.
B) all fantasies about sex turn into reality.
C) a physical sexual act usually takes place.
D) they can lead to marital discord and divorce.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

If consumers are sent bogus e-mails that appear to come from legitimate banks or e-commerce sites in order to gain personal information,they are victims of ________.


A) hacking
B) plucking
C) phishing
D) pilfering

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Cyberaggression is similar to cyberbullying,but the negative online interaction is repeated over a much longer term.

A) True
B) False

Correct Answer

verifed

verified

While often conducted for malicious purposes,__________ may also be relatively innocent and harmless,such as breaking into computer systems only for the challenge and then notifying system administrators how the break-in is done so that they can improve their network security.

Correct Answer

verifed

verified

All of following are reasons for people to take part in cybersex,except for


A) anonymity.
B) ease and convenience.
C) resolving marital problems.
D) strong sexual fantasies.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

__________ is a scam that involves a caller pretending to have knowledge of an abduction of a family member.

Correct Answer

verifed

verified

Virtual kidnapping

To many sociologists,hackers strongly resemble


A) career criminals.
B) cyberterrorists.
C) identity thieves.
D) juvenile delinquents.

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

A serious type of cyberdeviance involves targeting a computer network through hacking and cyberterrorism.

A) True
B) False

Correct Answer

verifed

verified

Which of the following statements about cyberdeviance is true?


A) High tech has enabled law enforcement agencies to catch and convict at least 25 percent of online identity thieves.
B) The majority of identity thefts are inside jobs.
C) Most cyberporn enthusiasts are teenagers.
D) Cyberstalking is more benign and less harmful than off-line,traditional stalking.

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Two forms of cyberdeviance are using a computer as a __________ to commit acts of deviance and disrupting a computer network as a target.

Correct Answer

verifed

verified

Which of the following types of hacking are the most well known?


A) exploring networks
B) planting viruses
C) changing user names and passwords
D) manipulation of web pages

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

The most common type of cyberdeviance is ________.


A) terrorism
B) pornography
C) viruses
D) child pornography and exploitation

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Many people use the Internet as a tool for expressing their hate of others.

A) True
B) False

Correct Answer

verifed

verified

True

Showing 1 - 20 of 80

Related Exams

Show Answer