Correct Answer
verified
Multiple Choice
A) using the computer as a tool to commit deviant acts.
B) using the computer to keep records of deviance.
C) creating a method of hacking.
D) creating a computer network to commit deviance.
Correct Answer
verified
Multiple Choice
A) the lack of law enforcement
B) the lack of laws
C) too many compulsive Internet gamblers
D) organized crime involvement
Correct Answer
verified
Multiple Choice
A) the number of computers available.
B) anonymity.
C) freedom.
D) prejudice.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) no real sex took place.
B) it was merely fun.
C) it only involved a relationship to a machine.
D) no one was hurt by the affair.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) they involve the deviant use of a computer.
B) all fantasies about sex turn into reality.
C) a physical sexual act usually takes place.
D) they can lead to marital discord and divorce.
Correct Answer
verified
Multiple Choice
A) hacking
B) plucking
C) phishing
D) pilfering
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) anonymity.
B) ease and convenience.
C) resolving marital problems.
D) strong sexual fantasies.
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) career criminals.
B) cyberterrorists.
C) identity thieves.
D) juvenile delinquents.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) High tech has enabled law enforcement agencies to catch and convict at least 25 percent of online identity thieves.
B) The majority of identity thefts are inside jobs.
C) Most cyberporn enthusiasts are teenagers.
D) Cyberstalking is more benign and less harmful than off-line,traditional stalking.
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) exploring networks
B) planting viruses
C) changing user names and passwords
D) manipulation of web pages
Correct Answer
verified
Multiple Choice
A) terrorism
B) pornography
C) viruses
D) child pornography and exploitation
Correct Answer
verified
True/False
Correct Answer
verified
Showing 1 - 20 of 80
Related Exams