Exam 14: The Investigation of Fraud and Computer-Related Crimes

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

______ involves the dissemination of pornographic images through e-mail, instant messages, newsgroups, bulletin boards, chat rooms, and other Internet networks.

Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
Verified

B

______ is a form of cyberbullying that often leads to criminal charges.

Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
Verified

B

Downloading or possession of pornographic images involves the viewing of images via the Internet.

Free
(True/False)
4.9/5
(38)
Correct Answer:
Verified

True

Discuss cyberbullying.

(Essay)
4.8/5
(39)

Which aspect of child pornography involves the creation of pornographic images through cell phones or web cameras?

(Multiple Choice)
4.8/5
(35)

What is an IP address?

(Multiple Choice)
4.8/5
(34)

______ is when someone who is entrusted with the money of a corporation keeps it for their own purposes.

(Multiple Choice)
4.7/5
(35)

Which of the following are NOT ways in which criminals may obtain personal information about someone else?

(Multiple Choice)
4.9/5
(38)

What are some investigative actions that the police can perform for check and credit card fraud?

(Essay)
4.8/5
(37)

______ are crimes where the computer system is the target.

(Multiple Choice)
4.8/5
(36)

In what ways do offenders not obtain prescription drugs?

(Multiple Choice)
5.0/5
(38)

What is not one of the most common methods by which offenders fraudulently use stolen cards or checks?

(Multiple Choice)
4.9/5
(35)

Discuss the investigation of child pornography.

(Essay)
4.8/5
(38)

Sextortion typically involves the victim sending compromising photos to a person who is claiming to be someone he/she is not. The person receiving the photos then threatens to distribute the photos unless the victim agrees to some demand.

(True/False)
4.8/5
(32)

Name the various computer-facilitated crimes discussed in the book and get into more detail about the nature and investigation of one of them.

(Essay)
4.8/5
(34)

There are security measures that are put in place to prevent the fraudulent use of checks and credit or debit cards.

(True/False)
4.9/5
(33)

Identity theft has a financial motive, though revenge and embarrassment can also be motivators.

(True/False)
4.8/5
(23)

Which of the following is NOT a type of identity theft?

(Multiple Choice)
5.0/5
(41)

______ occurs when anything of value is offered in exchange for influence in decisions or actions of the taker.

(Multiple Choice)
4.8/5
(37)

The FACT Act is meant to increase detection of identity theft.

(True/False)
4.8/5
(45)
Showing 1 - 20 of 41
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)