Deck 15: Recent Forms of Deviance

Full screen (f)
exit full mode
Question
_____is ganging up on an individual by several offenders to force someone out of the workplace through rumors, innuendo, and humiliation:

A) Hazing
B) Bullying
C) Mobbing
D) Jostling
Use Space or
up arrow
down arrow
to flip the card.
Question
Rapper Kanye West disrespected Taylor Swift at the MTV Video Music Awards by:

A) making jokes at her expense
B) calling her bad names
C) accusing her of plagiarism
D) none of the above
Question
What is considered as "classy" at one time may later be considered "old fashioned" or cheesy now.
Question
Childhood obesity is a form of child abuse.
Question
Computer security is both offensive as well as defensive.
Question
After professional tennis player Serena Williams lost a match at the U.S. open, she did the following to one of the judges:

A) used profanity against the judge
B) claimed that she may shove a tennis ball down the judge's throat
C) provided a lukewarm apology for her actions
D) all of the above
Question
Thomas Jefferson copied a list of 110 "Rules of Civility and Decent Behavior in Company."
Question
Piracy often occurs off the coast of _____ (but also in other waters).

A) Tobago
B) Nigeria
C) Somalia
D) Portugal
Question
According to a survey by Workplace Bullying Institute, at least _____ percent of women were reported as bullies:

A) 37
B) 40
C) 29
D) 15
Question
Bullying is intentional, repeated hurtful acts, words, or other behavior, such as name calling, threatening and/or shunning committed by one or more children against another and an imbalance in real or perceived power between the bully and victim.
Question
Which of the following is a myth about sex offending?

A) Victims do not know their offenders.
B) Sex offenders have a high recidivism rates.
C) Most offenders are male teachers.
D) All of the above
Question
The act of facilitating arrangements for illegal sex through social networking sites is called "sexting".
Question
Behaviors, beliefs, or physical traits that are so far outside the norm that they elicit extremely strong negative sanctions is called:

A) extreme deviance
B) severe deviance
C) brutal deviance
D) excessive deviance
Question
Piracy is a war-like act committed by an oppressive government.
Question
The U.S. government instituted a civilian office, headed by the CIA that would coordinate an effort to restrict access to government computers and protect systems that run the stock exchanges, clear global banking transactions and manage the air traffic control system.
Question
Bullying can occur in all of the following places except:

A) schools
B) churches
C) home
D) None of the above
Question
Concerning sex offending, victims do not typically know the offenders, and most of these crimes are committed by people who have low recidivism rates once released from custody or treatment.
Question
Organizations and/or individuals who break into computers to gain access to information are called:

A) hackers
B) breakers
C) hecklers
D) computer thieves
Question
Individuals are taught "manners" or "social etiquettes" as a child. Which of the following is NOT an example of "social etiquettes?"

A) Respecting your elders
B) Listening to your parents
C) Picking your nose in public
D) All of the above
Question
The consequences of bullying include anxiety, sleep deprivation, loss of concentration, and stress headaches.
Question
In 2009, the World Net Daily compiled a list of nearly _____ teachers who have been accused or convicted of assaulting students.

A) 500
B) 250
C) 125
D) 220
Question
When individuals acquire the norms, values, and attitudes of their group(s), this is called the:

A) reform process
B) transformation process
C) socialization process
D) developmental process
Question
How has the use of computers in social networking influenced sex crimes?
Question
Explain the common myths surrounding sex offenses.
Question
Explain four environmental requirements suggested by the Olweus program.
Question
When ships are robbed and held for ransom, it is called:

A) laundering
B) piracy
C) larceny
D) none of the above
Question
Which of the following is an example of extreme deviance:

A) Picking your nose in public
B) Believing that you were kidnapped by aliens
C) Coughing without covering your mouth
D) Talking to yourself in public
Question
How common is bullying in the workplace? Are males or females more likely to be victims of workplace bullying? Explain your answer.
Question
Obesity is defined as a ___________________ of 30 or greater. It is calculated as a combination of weight and height.

A) body mass index (BMI)
B) body accumulation index (BAI)
C) accumulation scale (AS)
D) mass Index (MI)
Question
Explain how the U.S. military has become increasingly dependent on computer hardware and software.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/30
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 15: Recent Forms of Deviance
1
_____is ganging up on an individual by several offenders to force someone out of the workplace through rumors, innuendo, and humiliation:

A) Hazing
B) Bullying
C) Mobbing
D) Jostling
C
2
Rapper Kanye West disrespected Taylor Swift at the MTV Video Music Awards by:

A) making jokes at her expense
B) calling her bad names
C) accusing her of plagiarism
D) none of the above
D
3
What is considered as "classy" at one time may later be considered "old fashioned" or cheesy now.
True
4
Childhood obesity is a form of child abuse.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
5
Computer security is both offensive as well as defensive.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
6
After professional tennis player Serena Williams lost a match at the U.S. open, she did the following to one of the judges:

A) used profanity against the judge
B) claimed that she may shove a tennis ball down the judge's throat
C) provided a lukewarm apology for her actions
D) all of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
7
Thomas Jefferson copied a list of 110 "Rules of Civility and Decent Behavior in Company."
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
8
Piracy often occurs off the coast of _____ (but also in other waters).

A) Tobago
B) Nigeria
C) Somalia
D) Portugal
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
9
According to a survey by Workplace Bullying Institute, at least _____ percent of women were reported as bullies:

A) 37
B) 40
C) 29
D) 15
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
10
Bullying is intentional, repeated hurtful acts, words, or other behavior, such as name calling, threatening and/or shunning committed by one or more children against another and an imbalance in real or perceived power between the bully and victim.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is a myth about sex offending?

A) Victims do not know their offenders.
B) Sex offenders have a high recidivism rates.
C) Most offenders are male teachers.
D) All of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
12
The act of facilitating arrangements for illegal sex through social networking sites is called "sexting".
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
13
Behaviors, beliefs, or physical traits that are so far outside the norm that they elicit extremely strong negative sanctions is called:

A) extreme deviance
B) severe deviance
C) brutal deviance
D) excessive deviance
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
14
Piracy is a war-like act committed by an oppressive government.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
15
The U.S. government instituted a civilian office, headed by the CIA that would coordinate an effort to restrict access to government computers and protect systems that run the stock exchanges, clear global banking transactions and manage the air traffic control system.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
16
Bullying can occur in all of the following places except:

A) schools
B) churches
C) home
D) None of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
17
Concerning sex offending, victims do not typically know the offenders, and most of these crimes are committed by people who have low recidivism rates once released from custody or treatment.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
18
Organizations and/or individuals who break into computers to gain access to information are called:

A) hackers
B) breakers
C) hecklers
D) computer thieves
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
19
Individuals are taught "manners" or "social etiquettes" as a child. Which of the following is NOT an example of "social etiquettes?"

A) Respecting your elders
B) Listening to your parents
C) Picking your nose in public
D) All of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
20
The consequences of bullying include anxiety, sleep deprivation, loss of concentration, and stress headaches.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
21
In 2009, the World Net Daily compiled a list of nearly _____ teachers who have been accused or convicted of assaulting students.

A) 500
B) 250
C) 125
D) 220
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
22
When individuals acquire the norms, values, and attitudes of their group(s), this is called the:

A) reform process
B) transformation process
C) socialization process
D) developmental process
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
23
How has the use of computers in social networking influenced sex crimes?
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
24
Explain the common myths surrounding sex offenses.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
25
Explain four environmental requirements suggested by the Olweus program.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
26
When ships are robbed and held for ransom, it is called:

A) laundering
B) piracy
C) larceny
D) none of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following is an example of extreme deviance:

A) Picking your nose in public
B) Believing that you were kidnapped by aliens
C) Coughing without covering your mouth
D) Talking to yourself in public
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
28
How common is bullying in the workplace? Are males or females more likely to be victims of workplace bullying? Explain your answer.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
29
Obesity is defined as a ___________________ of 30 or greater. It is calculated as a combination of weight and height.

A) body mass index (BMI)
B) body accumulation index (BAI)
C) accumulation scale (AS)
D) mass Index (MI)
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
30
Explain how the U.S. military has become increasingly dependent on computer hardware and software.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 30 flashcards in this deck.