Exam 12: Computer Crime
Exam 1: Introduction64 Questions
Exam 2: Crimes Against Consumers68 Questions
Exam 3: Unsafe Products68 Questions
Exam 4: Environmental Crime61 Questions
Exam 5: Institutional Corruption: Mass Media and Religion61 Questions
Exam 6: Securities Fraud61 Questions
Exam 7: Corporate Fraud62 Questions
Exam 8: Fiduciary Fraud60 Questions
Exam 9: Crimes by the Government60 Questions
Exam 10: Corruption of Public Officials61 Questions
Exam 11: Medical Crime62 Questions
Exam 12: Computer Crime63 Questions
Exam 13: Conclusions62 Questions
Select questions type
Match the key terms to the descriptions below. Use each description only once.
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(27)
According to Cressey, embezzlers go through a process that includes all of the following except:
(Multiple Choice)
4.8/5
(32)
According to the text, the broad but somewhat more specific definition of computer crime can be described as:
(Multiple Choice)
4.8/5
(32)
Examine both domestic and international computer espionage and give examples of each. Why do you think it is more difficult to determine the extent of international espionage?
(Essay)
4.8/5
(34)
So-called first generation phone "phreaks" used their talents to steal from checking accounts.
(True/False)
4.9/5
(45)
A reason for the Nigerian scam is that it has a well-educated populace.
(True/False)
4.9/5
(40)
The easiest way into a computer is through the ________________ door.
(Short Answer)
4.9/5
(35)
Malicious hacking, affecting national security, has affected all of the following except:
(Multiple Choice)
4.9/5
(35)
Which one of the following crimes could not be classified as a computer crime?
(Multiple Choice)
4.9/5
(32)
Showing 41 - 60 of 63
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)