Deck 11: Internet Deviance
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/80
Play
Full screen (f)
Deck 11: Internet Deviance
1
Experts fear that if Internet gambling were legal,compulsive gamblers would probably
A)get more help.
B)gamble less.
C)go bankrupt.
D)break the law.
A)get more help.
B)gamble less.
C)go bankrupt.
D)break the law.
C
2
A Trojan is
A)a Greek military strategy.
B)a hacker code.
C)a protective software.
D)a key logger
A)a Greek military strategy.
B)a hacker code.
C)a protective software.
D)a key logger
D
3
Joe engaged in an online affair,but when he was caught by his wife,he insisted it was not an affair.He was likely to use all of the following reasons to deny guilt,EXCEPT that
A)no real sex took place.
B)it was merely fun.
C)it only involved a relationship to a machine.
D)no one was hurt by the affair.
A)no real sex took place.
B)it was merely fun.
C)it only involved a relationship to a machine.
D)no one was hurt by the affair.
D
4
All of the following are characteristics of cyberporn surfers,except for ________.
A)teenagers
B)whites
C)males
D)married
A)teenagers
B)whites
C)males
D)married
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
5
Internet gambling seems to be more convenient,solitary,and anonymous.These features also make it more ________.
A)addictive
B)deviant
C)profitable
D)legal
A)addictive
B)deviant
C)profitable
D)legal
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following statements about Internet gambling is true?
A)Internet gamblers bet about $2 billion a year.
B)Internet gambling is largely legal in the United States.
C)Internet gambling is illegal throughout the world.
D)Internet gambling legalization is an unsettled issue in the United States.
A)Internet gamblers bet about $2 billion a year.
B)Internet gambling is largely legal in the United States.
C)Internet gambling is illegal throughout the world.
D)Internet gambling legalization is an unsettled issue in the United States.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
7
The text's authors call the Internet the "wild frontier of deviance" because
A)Internet deviance involves many violent acts.
B)Internet deviance can be carried out with impunity.
C)the Internet itself is somewhat deviant.
D)so much imaginative deviance is taking place.
A)Internet deviance involves many violent acts.
B)Internet deviance can be carried out with impunity.
C)the Internet itself is somewhat deviant.
D)so much imaginative deviance is taking place.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is the most often an outcome of cybersex?
A)finding a partner offline
B)masturbation
C)depression
D)better sex
A)finding a partner offline
B)masturbation
C)depression
D)better sex
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
9
All of the following are reasons why online infidelity is very appealing EXCEPT that it
A)is anonymous.
B)is convenient,allowing one to find partners all over the world from their keyboard.
C)leads to real-life liaisons most of the time.
D)is a form of escapism.
A)is anonymous.
B)is convenient,allowing one to find partners all over the world from their keyboard.
C)leads to real-life liaisons most of the time.
D)is a form of escapism.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is one reason why the United States cannot stop Internet gambling within their borders?
A)the lack of law enforcement
B)the lack of laws
C)too many compulsive Internet gamblers
D)organized crime involvement
A)the lack of law enforcement
B)the lack of laws
C)too many compulsive Internet gamblers
D)organized crime involvement
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
11
Cyberdeviance can be split into two broad types: disrupting a computer network as a target and
A)using the computer as a tool to commit deviant acts.
B)using the computer to keep records of deviance.
C)creating a method of hacking.
D)creating a computer network to commit deviance.
A)using the computer as a tool to commit deviant acts.
B)using the computer to keep records of deviance.
C)creating a method of hacking.
D)creating a computer network to commit deviance.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
12
If consumers are sent bogus e-mails that appear to come from legitimate banks or e-commerce sites in order to gain personal information,they are victims of ________.
A)hacking
B)plucking
C)phishing
D)pilfering
A)hacking
B)plucking
C)phishing
D)pilfering
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
13
Men who visit and use child pornography sites are considered
A)innocent partakers of fantasies.
B)pedophiles.
C)normal Internet users.
D)harmless visitors.
A)innocent partakers of fantasies.
B)pedophiles.
C)normal Internet users.
D)harmless visitors.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
14
All of following are reasons for people to take part in cybersex,except for
A)anonymity.
B)ease and convenience.
C)resolving marital problems.
D)strong sexual fantasies.
A)anonymity.
B)ease and convenience.
C)resolving marital problems.
D)strong sexual fantasies.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following statements about cyberdeviance is true?
A)High tech has enabled law enforcement agencies to catch and convict at least 25 percent of online identity thieves.
B)The majority of identity thefts are inside jobs.
C)Most cyberporn enthusiasts are teenagers.
D)Cyberstalking is more benign and less harmful than off-line,traditional stalking.
A)High tech has enabled law enforcement agencies to catch and convict at least 25 percent of online identity thieves.
B)The majority of identity thefts are inside jobs.
C)Most cyberporn enthusiasts are teenagers.
D)Cyberstalking is more benign and less harmful than off-line,traditional stalking.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
16
Most people consider online affairs just as real as offline affairs because
A)they involve the deviant use of a computer.
B)all fantasies about sex turn into reality.
C)a physical sexual act usually takes place.
D)they can lead to marital discord and divorce.
A)they involve the deviant use of a computer.
B)all fantasies about sex turn into reality.
C)a physical sexual act usually takes place.
D)they can lead to marital discord and divorce.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
17
Most identity theft is done by
A)Eastern European countries.
B)organization or corporate insiders.
C)bright teenagers.
D)cyber-pornographers.
A)Eastern European countries.
B)organization or corporate insiders.
C)bright teenagers.
D)cyber-pornographers.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
18
Many companies are unwilling participants in identity theft.All of the following are practices that facilitate identity theft if not implemented,EXCEPT for
A)using key logging monitoring programs.
B)maintaining personnel security.
C)installing a firewall.
D)using hard-to-guess passwords.
A)using key logging monitoring programs.
B)maintaining personnel security.
C)installing a firewall.
D)using hard-to-guess passwords.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
19
Legalizing Internet gambling would
A)end organized crime involvement in Internet gambling.
B)largely end Internet gambling.
C)produce needed tax revenue.
D)make Internet gambling a local and not a national problem.
A)end organized crime involvement in Internet gambling.
B)largely end Internet gambling.
C)produce needed tax revenue.
D)make Internet gambling a local and not a national problem.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
20
About ________ billion dollars are spent each year on Internet gambling.
A)1
B)6
C)44
D)61
A)1
B)6
C)44
D)61
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
21
How many nationwide cyberattacks have taken place against the United States?
A)0
B)1
C)6
D)14
A)0
B)1
C)6
D)14
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
22
The anonymity of the Internet discourages discrimination because it
A)discourages prejudice against minorities through education.
B)hides the group-identifying cues of gender and ethnicity.
C)hides the deviants who promote hate.
D)receives minority protections from the U.S. government.
A)discourages prejudice against minorities through education.
B)hides the group-identifying cues of gender and ethnicity.
C)hides the deviants who promote hate.
D)receives minority protections from the U.S. government.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
23
The key factor that allows people to express their anti-minority feelings and beliefs is
A)the number of computers available.
B)anonymity.
C)freedom.
D)prejudice.
A)the number of computers available.
B)anonymity.
C)freedom.
D)prejudice.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following are NOT characteristics of the typical hacker profile?
A)They are males.
B)They come from dysfunctional families.
C)They have deviant personalities.
D)They associate with a peer group.
A)They are males.
B)They come from dysfunctional families.
C)They have deviant personalities.
D)They associate with a peer group.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following would be an example of cyberterrorism?
A)flying an airplane into the World Trade Center
B)the London suicide bombers
C)the disruption of the nation's air traffic system
D)giving an impassioned speech at a local mosque
A)flying an airplane into the World Trade Center
B)the London suicide bombers
C)the disruption of the nation's air traffic system
D)giving an impassioned speech at a local mosque
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
26
The most common type of cyberdeviance is ________.
A)terrorism
B)pornography
C)viruses
D)child pornography and exploitation
A)terrorism
B)pornography
C)viruses
D)child pornography and exploitation
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following figures reflects the yearly number of cybercrimes around the world in 2002?
A)300,000
B)700,000
C)1,300,000
D)5,100,000
A)300,000
B)700,000
C)1,300,000
D)5,100,000
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
28
A global perspective on cyberdeviance reveals that cyberdeviance is
A)mostly confined to the United States.
B)truly global and borderless.
C)largely shaped by the global economy.
D)mostly the result of offline deviance in other places in the world.
A)mostly confined to the United States.
B)truly global and borderless.
C)largely shaped by the global economy.
D)mostly the result of offline deviance in other places in the world.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
29
The repeated harassment of others through the Internet is called ________.
A)cyberterrorism
B)a hate crime
C)cyberstalking
D)discrimination
A)cyberterrorism
B)a hate crime
C)cyberstalking
D)discrimination
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
30
Cyberstalking is sometimes more disturbing and dangerous than traditional stalking because
A)e-mail messages can be meaner than in-person contact.
B)cyberstalkers have greater access to personal data.
C)most victims are recent immigrants from other countries.
D)e-mail contact usually lead to personal confrontation.
A)e-mail messages can be meaner than in-person contact.
B)cyberstalkers have greater access to personal data.
C)most victims are recent immigrants from other countries.
D)e-mail contact usually lead to personal confrontation.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
31
The free exchange website Pirate Bay has ties to which of the following organizations?
A)Creative Commons
B)The Federal Trade Commission
C)The Missionary Church of Kopimism
D)The Hipatia Group
A)Creative Commons
B)The Federal Trade Commission
C)The Missionary Church of Kopimism
D)The Hipatia Group
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following is the reason why no terrorist has launched a cyberattack upon the United States?
A)The United States has good defenses against such an attack.
B)Cyberterrorists have lost interest in attacking the United States.
C)Cyberterrorists still do not possess specialized knowledge of the U.S. computer infrastructure.
D)Cyberterrorists are more interested in identity theft to raise money for offline terrorist acts.
A)The United States has good defenses against such an attack.
B)Cyberterrorists have lost interest in attacking the United States.
C)Cyberterrorists still do not possess specialized knowledge of the U.S. computer infrastructure.
D)Cyberterrorists are more interested in identity theft to raise money for offline terrorist acts.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
33
All of the following are features of cyberstalking,EXCEPT that cyberstalkers
A)can harass people anywhere in the world.
B)can cause people serious emotional and physical harms through the spread of rumors online.
C)usually cyberstalk persons they know.
D)usually make themselves known to the persons they are tormenting.
A)can harass people anywhere in the world.
B)can cause people serious emotional and physical harms through the spread of rumors online.
C)usually cyberstalk persons they know.
D)usually make themselves known to the persons they are tormenting.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
34
The Anti-Defamation League and the Poverty Law Center
A)track prejudice online and promote tolerance.
B)offer filtering programs to protect children.
C)enforce hate crime laws.
D)promote Internet freedom of speech.
A)track prejudice online and promote tolerance.
B)offer filtering programs to protect children.
C)enforce hate crime laws.
D)promote Internet freedom of speech.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following types of hacking are the most well known?
A)exploring networks
B)planting viruses
C)changing user names and passwords
D)manipulation of web pages
A)exploring networks
B)planting viruses
C)changing user names and passwords
D)manipulation of web pages
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
36
All of the following are true about expressing hate online,EXCEPT that the deviants
A)usually follow up their expression of hate by practicing discrimination.
B)use the Internet to express their personal hatred toward a minority.
C)can begin cyberstalking the victims.
D)usually choose to hate someone they know.
A)usually follow up their expression of hate by practicing discrimination.
B)use the Internet to express their personal hatred toward a minority.
C)can begin cyberstalking the victims.
D)usually choose to hate someone they know.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
37
To many sociologists,hackers strongly resemble
A)career criminals.
B)cyberterrorists.
C)identity thieves.
D)juvenile delinquents.
A)career criminals.
B)cyberterrorists.
C)identity thieves.
D)juvenile delinquents.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
38
All of the following are examples of using the computer-as opposed to the computer network-as a tool to commit a deviant act,EXCEPT
A)cyberporn.
B)stalking.
C)identity theft.
D)cyberterrorism
A)cyberporn.
B)stalking.
C)identity theft.
D)cyberterrorism
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
39
The Internet Crime Complaint Center (IC3)is a sector belonging to which of the following institutions?
A)the National Institute of Justice
B)the United States National Guard
C)the CIA
D)the FBI
A)the National Institute of Justice
B)the United States National Guard
C)the CIA
D)the FBI
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following forms of hacking has the fewest implications for greater society?
A)planting a worm
B)knocking out a phone network
C)hacking a famous person's cellphone and posting stored photos
D)stealing money through identity theft
A)planting a worm
B)knocking out a phone network
C)hacking a famous person's cellphone and posting stored photos
D)stealing money through identity theft
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
41
The reason the text's authors call the Internet the new, wild frontier of deviance today is because Internet deviants are more educated and clever.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
42
Many people use the Internet as a tool for expressing their hate of others.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
43
The anonymity of the Internet leads to more discrimination against members of minority groups.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
44
One benefit from the legalization of Internet gambling would be the ability to more carefully regulate the industry
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
45
Traditional stalking is generally more dangerous than traditional cyberstalking.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
46
Cyberstalking is almost always directed toward people the deviant knows and does not like.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
47
Most persons visiting Internet porn sites are sex-crazed teenagers.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
48
The majority of people who visit Internet porn sites are married white males.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
49
Internet gambling is legal in a handful of states in the United States, despite limitations.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
50
A serious type of cyberdeviance involves targeting a computer network through hacking and cyberterrorism.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
51
Internet gambling is totally illegal in the United States.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
52
Two reasons why many persons enjoy cybersex are because it is anonymous and can lead to real sex.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
53
Trojan horses are a type of spyware programs that allow identity thieves to monitor a computer user's key strokes.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
54
Cyberstalking is more disturbing and dangerous than traditional stalking.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
55
Hacktivism involves accessing computer systems and files,by illegal means,for various political and socially conscientious purposes.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
56
Two factors that have led to the tremendous rise of cyberdeviance is the phenomenal increase in the use of computers and
A)an increased desire for deviant activities such as pornography.
B)organized crime.
C)lack of law enforcement.
D)fewer opportunities for offline deviance.
A)an increased desire for deviant activities such as pornography.
B)organized crime.
C)lack of law enforcement.
D)fewer opportunities for offline deviance.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
57
Law enforcement agencies have not successfully caught and convicted any online identity thieves.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
58
Almost all hackers are interested in cracking and damaging computer networks and to otherwise show off their skills.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
59
Almost all Internet affairs result in the actual meeting and sex with the online partner.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
60
Married people excuse their online affairs by saying it is a relationship with an object and not a real person.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
61
A ______ could bring a country to its knees by disrupting or disabling its infrastructure.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
62
The main reason why the United States has not experienced a cyberattack is because terrorists have lost interest in doing so.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
63
The two factors that explain cyberdeviance's meteoric rise is the phenomenal increase in computer use and lack of law enforcement.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
64
The most widespread form of cyberdeviance around the world is pornography.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
65
_____________ is using the Internet or e-mails to repeatedly harass or threaten another person.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
66
___________ is popular because customers can view materials in the privacy of their homes.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
67
__________ people in the general public consider online affairs to be just as real as offline affairs.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
68
One disturbing use of the Internet is expressing __________ toward some minority group.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
69
Analyze the threat of a cyberterrorist attack against the United States.What would happen? How can the United States prevent such an attack,and would such prevention change the nature of the Internet? How so?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
70
Cyberspace is truly global and borderless.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
71
Cyberaggression is similar to cyberbullying,but the negative online interaction is repeated over a much longer term.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
72
__________ programs copy a computer user's keystroked and sends the information to the offender.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
73
__________ involves accessing computer systems and files,by illegal means,for various political and socially conscientious purposes.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
74
Two forms of cyberdeviance are using a computer as a __________ to commit acts of deviance and disrupting a computer network as a target.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
75
Cyberterrorists could bring the United States to its knees by disrupting or disabling its infrastructure.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
76
__________ is a scam that involves a caller pretending to have knowledge of an abduction of a family member.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
77
While often conducted for malicious purposes,__________ may also be relatively innocent and harmless,such as breaking into computer systems only for the challenge and then notifying system administrators how the break-in is done so that they can improve their network security.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
78
Most Americans who engage in Internet gambling do so by visiting otherwise legal __________ gaming websites.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
79
What can a global perspective tell us about cyberdeviance? Discuss which countries engage in cyberdeviance,and the historic trends that have been emerging since the 1990s.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
80
One common reason why people participate in cybersex is the relative __________ of finding sex partners.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck