Exam 11: Internet Deviance

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

__________ is a scam that involves a caller pretending to have knowledge of an abduction of a family member.

Free
(Short Answer)
4.9/5
(35)
Correct Answer:
Verified

Virtual kidnapping

Many people use the Internet as a tool for expressing their hate of others.

Free
(True/False)
4.8/5
(36)
Correct Answer:
Verified

True

Cyberdeviance can be split into two broad types: disrupting a computer network as a target and

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

D

Most people consider online affairs just as real as offline affairs because

(Multiple Choice)
4.8/5
(32)

The key factor that allows people to express their anti-minority feelings and beliefs is

(Multiple Choice)
4.9/5
(39)

Joe engaged in an online affair,but when he was caught by his wife,he insisted it was not an affair.He was likely to use all of the following reasons to deny guilt,EXCEPT that

(Multiple Choice)
4.9/5
(40)

To many sociologists,hackers strongly resemble

(Multiple Choice)
4.9/5
(43)

Which of the following types of hacking are the most well known?

(Multiple Choice)
4.9/5
(35)

Cyberaggression is similar to cyberbullying,but the negative online interaction is repeated over a much longer term.

(True/False)
4.8/5
(38)

A serious type of cyberdeviance involves targeting a computer network through hacking and cyberterrorism.

(True/False)
4.9/5
(40)

The reason the text's authors call the Internet the new, wild frontier of deviance today is because Internet deviants are more educated and clever.

(True/False)
4.8/5
(31)

If consumers are sent bogus e-mails that appear to come from legitimate banks or e-commerce sites in order to gain personal information,they are victims of ________.

(Multiple Choice)
4.8/5
(36)

Which of the following is one reason why the United States cannot stop Internet gambling within their borders?

(Multiple Choice)
4.9/5
(33)

Hacktivism involves accessing computer systems and files,by illegal means,for various political and socially conscientious purposes.

(True/False)
4.9/5
(32)

Two forms of cyberdeviance are using a computer as a __________ to commit acts of deviance and disrupting a computer network as a target.

(Short Answer)
4.9/5
(35)

__________ people in the general public consider online affairs to be just as real as offline affairs.

(Short Answer)
4.7/5
(41)

All of following are reasons for people to take part in cybersex,except for

(Multiple Choice)
4.8/5
(47)

Which of the following statements about cyberdeviance is true?

(Multiple Choice)
4.8/5
(37)

The most common type of cyberdeviance is ________.

(Multiple Choice)
4.8/5
(34)

While often conducted for malicious purposes,__________ may also be relatively innocent and harmless,such as breaking into computer systems only for the challenge and then notifying system administrators how the break-in is done so that they can improve their network security.

(Short Answer)
4.9/5
(40)
Showing 1 - 20 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)