Exam 11: Internet Deviance

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Cyberstalking is almost always directed toward people the deviant knows and does not like.

(True/False)
4.8/5
(24)

___________ is popular because customers can view materials in the privacy of their homes.

(Short Answer)
4.8/5
(42)

The Anti-Defamation League and the Poverty Law Center

(Multiple Choice)
4.8/5
(36)

One common reason why people participate in cybersex is the relative __________ of finding sex partners.

(Short Answer)
4.8/5
(30)

A global perspective on cyberdeviance reveals that cyberdeviance is

(Multiple Choice)
4.8/5
(31)

Cyberterrorists could bring the United States to its knees by disrupting or disabling its infrastructure.

(True/False)
4.9/5
(25)

One benefit from the legalization of Internet gambling would be the ability to more carefully regulate the industry

(True/False)
4.8/5
(32)

__________ involves accessing computer systems and files,by illegal means,for various political and socially conscientious purposes.

(Short Answer)
4.8/5
(37)

The text's authors call the Internet the "wild frontier of deviance" because

(Multiple Choice)
5.0/5
(34)

Traditional stalking is generally more dangerous than traditional cyberstalking.

(True/False)
4.7/5
(39)

The main reason why the United States has not experienced a cyberattack is because terrorists have lost interest in doing so.

(True/False)
4.9/5
(29)

Most identity theft is done by

(Multiple Choice)
4.7/5
(34)

Experts fear that if Internet gambling were legal,compulsive gamblers would probably

(Multiple Choice)
4.7/5
(40)

The anonymity of the Internet leads to more discrimination against members of minority groups.

(True/False)
4.9/5
(30)

Which of the following forms of hacking has the fewest implications for greater society?

(Multiple Choice)
4.8/5
(36)

All of the following are features of cyberstalking,EXCEPT that cyberstalkers

(Multiple Choice)
4.8/5
(29)

How many nationwide cyberattacks have taken place against the United States?

(Multiple Choice)
4.8/5
(34)

_____________ is using the Internet or e-mails to repeatedly harass or threaten another person.

(Short Answer)
5.0/5
(43)

Trojan horses are a type of spyware programs that allow identity thieves to monitor a computer user's key strokes.

(True/False)
4.7/5
(41)

Two reasons why many persons enjoy cybersex are because it is anonymous and can lead to real sex.

(True/False)
4.9/5
(34)
Showing 21 - 40 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)