Exam 15: Technology and Crime
Exam 1: What is Criminology?72 Questions
Exam 2: Where Do Theories Come From76 Questions
Exam 3: Classical and Neoclassical Thought78 Questions
Exam 4: Early Biological Perspectives on Criminal Behavior81 Questions
Exam 5: Biosocial and Other Contemporary Perspectives61 Questions
Exam 6: Psychological and Psychiatric Foundations of Criminal Behavior74 Questions
Exam 7: Social Structure Theories70 Questions
Exam 8: Theories of Social Process and Social Development76 Questions
Exam 9: Social Conflict Theories74 Questions
Exam 10: Criminal Victimization70 Questions
Exam 11: Crimes Against Persons74 Questions
Exam 12: Crimes Against Property63 Questions
Exam 13: White-Collar and Organized Crime77 Questions
Exam 14: Drug and Sex Crimes68 Questions
Exam 15: Technology and Crime72 Questions
Exam 16: Globalization and Terrorism73 Questions
Select questions type
Lawsuits challenging the constitutionality of the Communications Decency Act claimed that provisions of the act contravened __________ Amendment guarantees.
Free
(Multiple Choice)
4.7/5
(27)
Correct Answer:
A
____________used special dial-up access codes to avoid long-distance charges.
Free
(Short Answer)
4.9/5
(33)
Correct Answer:
Phone phreaks
Which of the following best describes the average hacker?
Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
A
The U.S. Constitution states that electronic documents and communications qualify for protection under the First and Fourth Amendments.
(True/False)
4.8/5
(29)
Threat analysis is the process of encoding information so that it is unreadable to all but its intended recipients.
(True/False)
4.9/5
(29)
The _____________ is a citizens' group that focuses on refining notions of privacy and legality as they relate to telecommunications and other communications-based media.
(Multiple Choice)
4.8/5
(32)
__________ is any violation of a federal or state computer-crime statute.
(Multiple Choice)
4.8/5
(25)
Illegally obtaining computerized information through the path of direct access is usually taken by
(Multiple Choice)
4.8/5
(42)
____________is the process by which information is encoded so that it is unreadable by all but its intended recipients.
(Short Answer)
4.9/5
(31)
Which is not one of the factors that may be used to determine whether a form of scientific evidence is reliable?
(Multiple Choice)
4.8/5
(33)
According to the 1994 federal DNA Identification Act, the FBI is authorized to establish DNA indexes for all but which of the following categories?
(Multiple Choice)
4.7/5
(35)
The Daubert ruling rejected the standards set in the previous case of __________.
(Short Answer)
4.8/5
(31)
Do you agree with President Barack Obama that "cybersecurity is one of the most serious economic and national-security challenges facing the United States"?
(Essay)
4.7/5
(36)
____________involves using official-looking e-mail messages to steal valuable information.
(Multiple Choice)
4.8/5
(38)
Why might cybercrime appeal to people who would not commit crimes like burglary or robbery?
(Essay)
4.8/5
(40)
Describe the characteristics of hackers and explain the categories of the basic typology that is based on psychological characteristics.
(Essay)
4.8/5
(43)
The __________ Act criminalized the willful infringement of copyrighted works.
(Multiple Choice)
4.8/5
(30)
An assessment of the potential disasters facing an organization is known as
(Multiple Choice)
4.7/5
(28)
A(n) __________ records the activities of computer operators surrounding each event in a transaction.
(Multiple Choice)
4.7/5
(34)
Showing 1 - 20 of 72
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)