Exam 11: Cyberdeviance
Exam 1: Perspectives on Deviance22 Questions
Exam 2: Theories of Criminal Deviance77 Questions
Exam 3: Why is Certain Behavior Deviant?42 Questions
Exam 4: Crime in the Streets—Against the Person50 Questions
Exam 5: Crime in the Streets—Against Property41 Questions
Exam 6: Assaults Against Children and Spouses46 Questions
Exam 7: Deviance and Organizations55 Questions
Exam 8: Deviant Drug Use43 Questions
Exam 9: Mental Disorders41 Questions
Exam 10: Suicide22 Questions
Exam 11: Cyberdeviance39 Questions
Exam 12: Sexual Deviance and Sexual Harassment46 Questions
Select questions type
Typing in all caps often means that someone is _________.
Free
(Short Answer)
4.9/5
(33)
Correct Answer:
yelling
The goal of a cracker is to make a program or system perform with optimum efficiency.
Free
(True/False)
4.8/5
(43)
Correct Answer:
False
Hackers are commonly seen by the public as:
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
A
The term "lamer" is used most often by crackers, phreakers, and warez d00dz to describe individuals who:
(Multiple Choice)
4.7/5
(32)
The most common form of communication between members is through the bulletin boards and newsgroups.
(True/False)
4.8/5
(28)
Some of the methods in which the computer underground creates their own jargon are:
(Multiple Choice)
4.8/5
(41)
A __________ is a technical name for what is commonly known as a "chat line" or "conference system."
(Short Answer)
4.9/5
(33)
One rich source of jargon construction is the hackish tendency to anthropomorphize hardware and software, which is the tendency to attribute the characteristics of gods, animals, or things to humans.
(True/False)
4.9/5
(37)
Warez d00dz distribute pirated software strictly for monetary gain.
(True/False)
4.9/5
(30)
Which is not one of the characteristics that distinguishes the computer underground as a subculture:
(Multiple Choice)
4.9/5
(34)
The term ___________ was originally intended to be a complimentary recognition of one's computer skills.
(Short Answer)
4.9/5
(33)
The first issue released in 1985 makes this the oldest of the electronically distributed computer underground publications:
(Multiple Choice)
4.8/5
(25)
Downloading pornographic images involving children is a federal crime.
(True/False)
4.8/5
(34)
Which of the following is not considered a participant in the computer underground?
(Multiple Choice)
4.9/5
(36)
Showing 1 - 20 of 39
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)