Exam 13: Technology and Crime
Exam 1: What Is Criminology51 Questions
Exam 2: Where Do Theories Come From51 Questions
Exam 3: Classical and Neoclassical Thought54 Questions
Exam 4: Biological Roots in Criminal Behavior52 Questions
Exam 5: Psychology and Psychiatric Foundations of Criminal Behavior56 Questions
Exam 6: Social Structure Theories51 Questions
Exam 7: Theories of Social Process and Social Development46 Questions
Exam 8: Social Conflict Theories56 Questions
Exam 9: Crimes Against Persons51 Questions
Exam 10: Crimes Against Property61 Questions
Exam 11: White-Collar and Organized Crime61 Questions
Exam 12: Public Order and Drug Crimes60 Questions
Exam 13: Technology and Crime75 Questions
Exam 14: Globalization and Terrorism72 Questions
Select questions type
In which of these areas are cyberthreats least likely?
Free
(Multiple Choice)
4.9/5
(47)
Correct Answer:
D
What is the main difference in the two broad categories of identity theft?
Free
(Multiple Choice)
5.0/5
(34)
Correct Answer:
D
Computer hacking began with the rise of mass-market personal computers in the late 1970s.
Free
(True/False)
4.7/5
(42)
Correct Answer:
False
The sequential record of system activities surrounding an event,a(n)_______,enables investigators to reconstruct,review,and examine what happened during a computer crime after the fact.
(Short Answer)
4.8/5
(29)
The situation in which prosecution was impeded by the inability of many state and local police departments to skillfully investigate cybercrimes has been changing because of
(Multiple Choice)
4.9/5
(38)
A computer virus is a program designed to invade a computer system and modify its operation or alter the information it stores.
(True/False)
4.8/5
(42)
Identify theft has indirect costs,such as costs related to prevention and mitigation.
(True/False)
4.9/5
(35)
Someone who uses computers for exploration or exploitation is known as a(n)________.
(Short Answer)
4.8/5
(40)
The combination of computer hardware and software that attempts to duplicate a skilled investigator's decision-making processes when analyzing evidence and recognizing patterns is known as a(n)________.
(Short Answer)
4.8/5
(37)
What effects do you think the use of DNA evidence will have on the justice system in the United States in the long run?
(Essay)
4.9/5
(32)
The contrast between cyberspace and the physical and social reality of the real world is summed up in the term
(Multiple Choice)
4.9/5
(31)
Computer-related crime and cybercrime are two names for the same thing.
(True/False)
4.7/5
(35)
When investigators use biological residue found at a crime scene for genetic comparison to aid in identifying criminal suspects,they are using ________.
(Short Answer)
4.8/5
(28)
Do you agree with President Barack Obama that "the cyberthreat is one of the most serious economic and national security challenges we face as a nation"?
(Essay)
4.9/5
(34)
Showing 1 - 20 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)