Exam 11: Cyberdeviance

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

What is not a characteristic of lamers, leeches, and posers?

(Multiple Choice)
4.8/5
(37)

The computer underground is composed of actors adhering to one of five roles: hackers, crackers, phreakers, warez d00dz, or lamers, leeches, and posers.

(True/False)
4.8/5
(36)

___________ is the oldest of the electronically distributed computer underground publications.

(Short Answer)
4.8/5
(39)

The term ____________, as it is used among crackers, phreaks, and warez d00dz, indicates that a given individual is a wanna-be and not skilled as yet.

(Short Answer)
4.9/5
(34)

What makes the computer underground a subculture? What types of specialized vocabulary do members of the computer underground use? Describe the commonly held beliefs shared by the participants in the computer underground. How do members of the computer underground communicate?

(Essay)
4.9/5
(34)

John "Cap'n Crunch" Draper is known as the "father of phreaking."

(True/False)
4.7/5
(38)

Those individuals who have a deeper and more technically oriented interest in the "telco" are known as ___________.

(Short Answer)
4.7/5
(35)

In a sadomasochism chatroom, a "handle" or user nickname that begins with a capital letter indicates that the user play a ______________ in cyber-relationships.

(Short Answer)
4.8/5
(39)

Hackers prefer to be known as:

(Multiple Choice)
4.9/5
(42)

What is not a characteristic of a cracker?

(Multiple Choice)
4.8/5
(42)

The computer underground has their own specialized way of dressing.

(True/False)
4.9/5
(39)

Those individuals who break security systems are known as hackers.

(True/False)
4.8/5
(33)

Who are the different actors that participate in the computer underground? Describe each of the participants.

(Essay)
4.7/5
(48)

All members of the computer underground share certain beliefs and norms except:

(Multiple Choice)
4.8/5
(32)

On a __________ callers can call in, listen to a recorded message, and then leave a message for the owner.

(Multiple Choice)
4.7/5
(32)

The most common belief held by members of the computer underground is that all information should be free or shared.

(True/False)
4.9/5
(33)

In what ways might the Internet contribute to dysfunctional or addictive sexual behavior of individuals?

(Essay)
4.9/5
(29)

Lamers, leeches, and posers are generally thought of as wannabes.

(True/False)
4.9/5
(30)

Software which has been copied and cracked on the same day that it is released for retail sale is known as _________________.

(Short Answer)
4.8/5
(33)
Showing 21 - 39 of 39
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)