Exam 11: Cyberdeviance
Exam 1: Perspectives on Deviance22 Questions
Exam 2: Theories of Criminal Deviance77 Questions
Exam 3: Why is Certain Behavior Deviant?42 Questions
Exam 4: Crime in the Streets—Against the Person50 Questions
Exam 5: Crime in the Streets—Against Property41 Questions
Exam 6: Assaults Against Children and Spouses46 Questions
Exam 7: Deviance and Organizations55 Questions
Exam 8: Deviant Drug Use43 Questions
Exam 9: Mental Disorders41 Questions
Exam 10: Suicide22 Questions
Exam 11: Cyberdeviance39 Questions
Exam 12: Sexual Deviance and Sexual Harassment46 Questions
Select questions type
What is not a characteristic of lamers, leeches, and posers?
(Multiple Choice)
4.8/5
(37)
The computer underground is composed of actors adhering to one of five roles: hackers, crackers, phreakers, warez d00dz, or lamers, leeches, and posers.
(True/False)
4.8/5
(36)
___________ is the oldest of the electronically distributed computer underground publications.
(Short Answer)
4.8/5
(39)
The term ____________, as it is used among crackers, phreaks, and warez d00dz, indicates that a given individual is a wanna-be and not skilled as yet.
(Short Answer)
4.9/5
(34)
What makes the computer underground a subculture? What types of specialized vocabulary do members of the computer underground use? Describe the commonly held beliefs shared by the participants in the computer underground. How do members of the computer underground communicate?
(Essay)
4.9/5
(34)
John "Cap'n Crunch" Draper is known as the "father of phreaking."
(True/False)
4.7/5
(38)
Those individuals who have a deeper and more technically oriented interest in the "telco" are known as ___________.
(Short Answer)
4.7/5
(35)
In a sadomasochism chatroom, a "handle" or user nickname that begins with a capital letter indicates that the user play a ______________ in cyber-relationships.
(Short Answer)
4.8/5
(39)
The computer underground has their own specialized way of dressing.
(True/False)
4.9/5
(39)
Those individuals who break security systems are known as hackers.
(True/False)
4.8/5
(33)
Who are the different actors that participate in the computer underground? Describe each of the participants.
(Essay)
4.7/5
(48)
All members of the computer underground share certain beliefs and norms except:
(Multiple Choice)
4.8/5
(32)
On a __________ callers can call in, listen to a recorded message, and then leave a message for the owner.
(Multiple Choice)
4.7/5
(32)
The most common belief held by members of the computer underground is that all information should be free or shared.
(True/False)
4.9/5
(33)
In what ways might the Internet contribute to dysfunctional or addictive sexual behavior of individuals?
(Essay)
4.9/5
(29)
Lamers, leeches, and posers are generally thought of as wannabes.
(True/False)
4.9/5
(30)
Software which has been copied and cracked on the same day that it is released for retail sale is known as _________________.
(Short Answer)
4.8/5
(33)
Showing 21 - 39 of 39
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)