Exam 11: Internet Deviance
Exam 1: What Is Deviant Behavior104 Questions
Exam 2: Positivist Theories89 Questions
Exam 3: Constructionist Theories94 Questions
Exam 4: Physical Violence115 Questions
Exam 5: Sexual Assault and Child Molestation91 Questions
Exam 6: Family Violence102 Questions
Exam 7: Suicide and Self-Harm96 Questions
Exam 8: Mental Disorder100 Questions
Exam 9: Heterosexual Deviance107 Questions
Exam 10: Gays and Other Targets of Stigma104 Questions
Exam 11: Internet Deviance80 Questions
Exam 12: Drug Use97 Questions
Exam 13: Drinking and Alcoholism85 Questions
Exam 14: Privileged Deviance88 Questions
Exam 15: Underprivileged Deviance85 Questions
Select questions type
Internet gambling seems to be more convenient,solitary,and anonymous.These features also make it more ________.
(Multiple Choice)
4.7/5
(41)
__________ programs copy a computer user's keystroked and sends the information to the offender.
(Short Answer)
4.7/5
(43)
What can a global perspective tell us about cyberdeviance? Discuss which countries engage in cyberdeviance,and the historic trends that have been emerging since the 1990s.
(Essay)
4.8/5
(40)
Married people excuse their online affairs by saying it is a relationship with an object and not a real person.
(True/False)
4.9/5
(41)
Two factors that have led to the tremendous rise of cyberdeviance is the phenomenal increase in the use of computers and
(Multiple Choice)
4.9/5
(43)
Which of the following is the most often an outcome of cybersex?
(Multiple Choice)
4.7/5
(31)
The repeated harassment of others through the Internet is called ________.
(Multiple Choice)
4.9/5
(37)
Almost all Internet affairs result in the actual meeting and sex with the online partner.
(True/False)
4.8/5
(39)
The majority of people who visit Internet porn sites are married white males.
(True/False)
4.8/5
(38)
Which of the following would be an example of cyberterrorism?
(Multiple Choice)
4.7/5
(33)
The two factors that explain cyberdeviance's meteoric rise is the phenomenal increase in computer use and lack of law enforcement.
(True/False)
4.8/5
(33)
Many companies are unwilling participants in identity theft.All of the following are practices that facilitate identity theft if not implemented,EXCEPT for
(Multiple Choice)
4.8/5
(41)
The anonymity of the Internet discourages discrimination because it
(Multiple Choice)
4.8/5
(35)
Law enforcement agencies have not successfully caught and convicted any online identity thieves.
(True/False)
4.8/5
(33)
All of the following are examples of using the computer-as opposed to the computer network-as a tool to commit a deviant act,EXCEPT
(Multiple Choice)
5.0/5
(25)
The Internet Crime Complaint Center (IC3)is a sector belonging to which of the following institutions?
(Multiple Choice)
4.9/5
(29)
A ______ could bring a country to its knees by disrupting or disabling its infrastructure.
(Short Answer)
4.8/5
(36)
Analyze the threat of a cyberterrorist attack against the United States.What would happen? How can the United States prevent such an attack,and would such prevention change the nature of the Internet? How so?
(Essay)
4.8/5
(28)
Showing 41 - 60 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)