Exam 15: Crimes of the New Millenium Cybercrime
Exam 1: Crime and Criminology100 Questions
Exam 2: The Nature and Extent of Crime100 Questions
Exam 3: Victims and Victimization100 Questions
Exam 4: Rational Choice Theory100 Questions
Exam 5: Trait Theories100 Questions
Exam 6: Social Structure Theories99 Questions
Exam 7: Social Process Theories Socialization and Society100 Questions
Exam 8: Critical Criminology and Restorative Justice100 Questions
Exam 9: Developmental Theories Life Course Latent Trait and Trajectory100 Questions
Exam 10: Interpersonal Violence100 Questions
Exam 11: Political Crime and Terrorism94 Questions
Exam 12: Property Crime99 Questions
Exam 13: Enterprise Crime: White-Collar, Green-Collar, and Transnational Organized Crime100 Questions
Exam 14: Public Order Crime Sex and Substance Abuse94 Questions
Exam 15: Crimes of the New Millenium Cybercrime95 Questions
Exam 16: Criminal Justice Process and Perspectives95 Questions
Exam 17: Police and the Courts Investigation Arrest and Adjudication95 Questions
Exam 18: Punishment and Correction94 Questions
Select questions type
The two main mediums for cyberbullying include:
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
A
What are "cyber smears" and "pump and dumps?"
Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
C
_________________ is the illegal buying and/or selling of merchandise on the Internet.
Free
(Short Answer)
4.9/5
(32)
Correct Answer:
E-tailing fraud
Which type of cybercrime consists of acts aimed at undermining the social, economic, and political system of an enemy nation?
(Multiple Choice)
4.8/5
(33)
In 2004, the Identity Theft Penalty Enhancement Act was signed into law; the act increases existing penalties for the crime of identity theft.
(True/False)
5.0/5
(41)
A logic bomb, also called slag code, is a type of delayed-action virus that may be set off when a program user makes certain input that sets the slag code in motion.
(True/False)
4.7/5
(31)
Cybervandalism is motivated more by a profit than a cybercriminal's urge to seek revenge.
(True/False)
4.8/5
(27)
The number of Web sites that advertise or sell prescription drugs is booming. The majority of these sites require that a patient provide a prescription from his or her doctor.
(True/False)
4.7/5
(31)
__________________is a new breed of offenses typically involving the theft and/or destruction of information, resources, or funds utilizing computers, computer networks, or the Internet.
(Short Answer)
4.8/5
(39)
Cybercriminals who aim their malicious attacks at disrupting, defacing, and destroying technology that they find offensive are known as____________________.
(Multiple Choice)
4.9/5
(32)
When an identity thief creates false e-mails and/or Web sites that look legitimate but are designed to gain illegal access to a victim's personal information, it is called:
(Multiple Choice)
4.9/5
(31)
The widespread use of computers and the Internet has ushered in the age of information technology in most industrialized societies.
(True/False)
4.7/5
(30)
Using the Internet to steal someone's identity and/or impersonate the victim in order to conduct illicit transactions such as committing fraud using the victim's name is known as ______________.
(Short Answer)
4.9/5
(30)
Sharing files with friends who did not pay for them is an example of:
(Multiple Choice)
4.9/5
(33)
_________ crimes are challenging for criminologists to explain because they defy long-held assumptions about the cause of crime.
(Short Answer)
4.8/5
(24)
Using cyberspace for acts of violence, including spying and disrupting an enemy's computer network is known as ___________________.
(Short Answer)
4.9/5
(35)
While many wonder how people can be so easily duped, the government's Internet fraud center receives 200,000 complaints yearly, and Internet scams result in over ____ in losses each year.
(Multiple Choice)
4.9/5
(33)
Because of a new portion of the D.A.R.E. program, cyberbullying has decreased by nearly 27% in recent years.
(True/False)
4.7/5
(33)
Showing 1 - 20 of 95
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)