Exam 11: Internet Deviance
Exam 1: What Is Deviant Behavior104 Questions
Exam 2: Positivist Theories89 Questions
Exam 3: Constructionist Theories94 Questions
Exam 4: Physical Violence115 Questions
Exam 5: Sexual Assault and Child Molestation91 Questions
Exam 6: Family Violence102 Questions
Exam 7: Suicide and Self-Harm96 Questions
Exam 8: Mental Disorder100 Questions
Exam 9: Heterosexual Deviance107 Questions
Exam 10: Gays and Other Targets of Stigma104 Questions
Exam 11: Internet Deviance80 Questions
Exam 12: Drug Use97 Questions
Exam 13: Drinking and Alcoholism85 Questions
Exam 14: Privileged Deviance88 Questions
Exam 15: Underprivileged Deviance85 Questions
Select questions type
__________ is a scam that involves a caller pretending to have knowledge of an abduction of a family member.
Free
(Short Answer)
4.9/5
(35)
Correct Answer:
Virtual kidnapping
Many people use the Internet as a tool for expressing their hate of others.
Free
(True/False)
4.8/5
(36)
Correct Answer:
True
Cyberdeviance can be split into two broad types: disrupting a computer network as a target and
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
D
Most people consider online affairs just as real as offline affairs because
(Multiple Choice)
4.8/5
(32)
The key factor that allows people to express their anti-minority feelings and beliefs is
(Multiple Choice)
4.9/5
(39)
Joe engaged in an online affair,but when he was caught by his wife,he insisted it was not an affair.He was likely to use all of the following reasons to deny guilt,EXCEPT that
(Multiple Choice)
4.9/5
(40)
Which of the following types of hacking are the most well known?
(Multiple Choice)
4.9/5
(35)
Cyberaggression is similar to cyberbullying,but the negative online interaction is repeated over a much longer term.
(True/False)
4.8/5
(38)
A serious type of cyberdeviance involves targeting a computer network through hacking and cyberterrorism.
(True/False)
4.9/5
(40)
The reason the text's authors call the Internet the new, wild frontier of deviance today is because Internet deviants are more educated and clever.
(True/False)
4.8/5
(31)
If consumers are sent bogus e-mails that appear to come from legitimate banks or e-commerce sites in order to gain personal information,they are victims of ________.
(Multiple Choice)
4.8/5
(36)
Which of the following is one reason why the United States cannot stop Internet gambling within their borders?
(Multiple Choice)
4.9/5
(33)
Hacktivism involves accessing computer systems and files,by illegal means,for various political and socially conscientious purposes.
(True/False)
4.9/5
(32)
Two forms of cyberdeviance are using a computer as a __________ to commit acts of deviance and disrupting a computer network as a target.
(Short Answer)
4.9/5
(35)
__________ people in the general public consider online affairs to be just as real as offline affairs.
(Short Answer)
4.7/5
(41)
All of following are reasons for people to take part in cybersex,except for
(Multiple Choice)
4.8/5
(47)
Which of the following statements about cyberdeviance is true?
(Multiple Choice)
4.8/5
(37)
While often conducted for malicious purposes,__________ may also be relatively innocent and harmless,such as breaking into computer systems only for the challenge and then notifying system administrators how the break-in is done so that they can improve their network security.
(Short Answer)
4.9/5
(40)
Showing 1 - 20 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)