Deck 15: Cybercrime and the Future of Crime

ملء الشاشة (f)
exit full mode
سؤال
______ refers to crime that is committed using a computer.

A) Trojan horse
B) Bot crime
C) Cybercrime
D) Identity theft
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Why is botnet crime a type of cybercrime that is difficult to fight?

A) because "bot-herders" are particularly clever in avoiding police
B) Because most computer owners do not know their computers have been infected
C) Because botnets do not leave a trace
D) Because hackers send out many botnets at one time
سؤال
Which of the following countries are continually accused of cyberspuing on the United States?

A) China and North Korea
B) South Korea and Japan
C) Egypt and Turkey
D) France and Russia
سؤال
The internet was originally created in the United States for the ______.

A) Department of Justice
B) Department of Education
C) Department of Defense
D) Department of Homeland Security
سؤال
People who illegally reproduce and use software and subsequently cost manufacturers billions of dollars a year in lost revenue are called ______.

A) cyberpunks
B) cyber zombies
C) neuromancer
D) software pirates
سؤال
All of the following are a part of Wall's (2001) typology of cybercrime except ______.

A) cyberdeceptions
B) cyberhackers
C) cyberpornography
D) cybertrespass
سؤال
It is estimated that ______ percent of computer crimes are committed by "insiders" or employees.

A) 20
B) 50
C) 80
D) 95
سؤال
The illegal production of computer software is a big business in ______ countries.

A) North American
B) Southeast Asian
C) Western European
D) Middle Eastern
سؤال
All of the following are examples of cybercrime except ______.

A) high-tech espionage
B) telecommunications fraud
C) bullying
D) online pedophilia
سؤال
Spernow's (1995) typology of cybercrime includes all of the following except for ______.

A) cyberviolence
B) insider crime
C) high-tech espionage
D) malicious hacking
سؤال
According to Wall (2001), which of the following refers to crossing boundaries into other people's property?

A) cyberdeceptions
B) cyberviolence
C) cyberpornography
D) cybertrespass
سؤال
According to Wall (2001), which of the following applies to crimes such as credit card fraud and priacy?

A) cyberdeceptions
B) cyberviolence
C) cyberpornography
D) cybertrespass
سؤال
According to Wall (2001), which of the following refers to breaching laws on obscenity and decency?

A) cyberdeceptions
B) cyberviolence
C) cyberpornography
D) cybertrespass
سؤال
According to Wall (2001), doing psychological harm to or inciting harm against others is known as ______.

A) cyberdeceptions
B) cyberviolence
C) cyberpornography
D) cybertrespass
سؤال
What is the term for ill-intentioned hackers who attempt to break into computer systems?

A) crackers
B) insiders
C) pilferers
D) bait-and-switchers
سؤال
______ involve programming a computer to continuously send fake authentication messages to a targeted server, keeping it constantly busy and forcing out legitimate users.

A) Password phishing
B) Web spoofing
C) Denial of service attacks
D) Sniffers
سؤال
Software programs such as Cracker are used to assist in which of the following types of attacks?

A) denial of service attacks
B) e-mail bombs
C) dictionary attacks
D) worms
سؤال
______ creates a false (shadow) version of a website that is controlled by the attacker.

A) Web spoofing
B) Worms
C) Password phishing
D) Sniffers
سؤال
Which of the following refers to a subprogram that contains a virus, bomb, or other harmful feature?

A) web spoofing
B) worms
C) password phishing
D) Trojan horse
سؤال
______ entails a cracker stealing password, account, or credit card education.

A) Phishing
B) Worms
C) Trojan horse
D) Key loggers
سؤال
Which of the following are similar to viruses that reproduce themselves and subvert computer systems?

A) phishing
B) worms
C) Trojan horse
D) key loggers
سؤال
______ are used to gain passwords to access accounts.

A) Phishing
B) Sniffer programs
C) Trojan horse
D) Key loggers
سؤال
What are vaccines?

A) computer hackers who develop harmful programs
B) computer programs that perform a task, such as printing a message or destroying data, on a certain date
C) rogue programs that copy themselves onto other programs
D) computer programs that seek out and destroy viruses
سؤال
Which of the following best describes computer hackers who develop harmful programs?

A) time bombs
B) viruses
C) vaccines
D) cyberpunks
سؤال
Which of the following best describes rogue programs that copy themselves into other programs or disks?

A) time bombs
B) viruses
C) vaccines
D) cyberpunks
سؤال
______ are computer programs that perform a task, such as printing a message or destroying data, on a certain date.

A) Time bombs
B) Viruses
C) Vaccines
D) Cyberpunks
سؤال
A majority of children who are victims of online predator are ______.

A) younger than 9 years old
B) 9 to 13 years old
C) 14 to 17 years old
D) older than 17 years old
سؤال
______ are the unanticipated, unintended, hidden functions of social change.

A) Manifest functions
B) Latent functions
C) Cultural lag
D) Hacker's ethics
سؤال
The idea that change takes place unevenly is referred to as ______.

A) manifest functions
B) latent functions
C) cultural lag
D) hacker's ethics
سؤال
______ are the anticipated or intended consequences of, for instance, new technology.

A) Manifest functions
B) Latent functions
C) Cultural lag
D) Hacker's ethics
سؤال
______ attempts to identify future developments (trends or events that might influence crime).

A) Environment scanning
B) Focus groups
C) Qualitative methodology
D) Triangulation
سؤال
______ are procedures that ask a panel of experts to predict the future.

A) Boosters
B) Delphi techniques
C) Hot products
D) Police Futurists International
سؤال
______ attempts to describe how present developments might appear in the future.

A) Boosters
B) Delphi techniques
C) Hot products
D) Scenario writing
سؤال
What is the purpose of Police Futurists International?

A) It is an organization that exists for the purpose of predicting the future of policing.
B) It is an organization that follows the trends of governmental policies.
C) It is an organization that follows the trends of street crime versus white collar crime.
D) It is an organization that responds to the increasing needs of the FBI.
سؤال
What does the term "biometric spoofing" mean?

A) Criminals in the future may be able to use the same technology as crime fighters to commit crimes.
B) There will be an increase in scams related to virtual worlds, such as Second Life.
C) Robotics and cloning will lead the way in crime.
D) Mathematical models and quantitative data can predict computer crimes.
سؤال
Bennett (1987) in Crimewarps, made all of the following predictions except for ______.

A) the computer will be the biggest generator of crime in the future
B) the concentraiton of crime in the U.S. will shift to the South
C) low birth rates and high work rates will leave homes ungaurded during the day
D) industries with older workers will experience less theft
سؤال
All of the following were identified as predictions in Digital Crime and Digital Terrorism (2006) except that ______.

A) organized crime groups will increasingly use the computer as a criminal instrument
B) espionage will continue to evolve
C) cyber terrorism will be the largest computer problem
D) some hacker groups will evolve into networked criminal enterprises
سؤال
British Home Office predictions include all of the following except for ______.

A) virtual-reality addition may increase
B) drugs will no longer pose challenges for crime control
C) alcopops and designer alcoholic drinks will continue to increase in popularity in underage drinkers
D) decreases in the use of cash will continue to result in greater theft involving credi cards and checks
سؤال
______ are items that are in high demand to be stolen.

A) Hot products
B) Crackers
C) Spoofs
D) Alcopops
سؤال
Which of the following theories provies some explanation of cybercrime?

A) social disorganiztion
B) strain
C) differential association
D) cultural lag
سؤال
Whole units of the Chinese military spend their entire time stealing secrets of government and private corporation computers.
سؤال
The computer is a tool that can be used in the commission of a variety of crimes.
سؤال
Software pirates, those who illegally reproduce and use software, cost manufacturers billions of dollars a year in lost revenue.
سؤال
Most cybercrimes are reported to the police.
سؤال
Online pedophiles tend target young "wannabe" hackers and participants in chat rooms.
سؤال
Individuals involved in high-tech espionage are often industrial spies who sell their knowledge to rivals or foreign bidders.
سؤال
Key loggers are secret programs that record a user's keystrokes.
سؤال
Both viruses and works can spread with no assistance.
سؤال
Network scanning programs are used to find vulnerable networked computers.
سؤال
"Phone-phreaking" refers to automatic speed dialers used by computer hackers.
سؤال
Experts suggest that parents should play a more proactive role in monitoring their child's use of the internet.
سؤال
Stalking online is usually of adolescents and not young children.
سؤال
Many predators use romance and seduction to corner their victims, and a surprising number are not known to the youth in person.
سؤال
Virus attacks can cripple internet operations.
سؤال
Trojan horses, worms, logic bombs, and eavesdropping sniffers can all be used to compromise the integrity of or deny access to data.
سؤال
Cybercrime is not a separate type of crime.
سؤال
The latent functions of social change are the anticipated or intended consequences of new technology.
سؤال
Latent functions are the anticipated or intended consequences of, for instance, new technology.
سؤال
Manifest functions are the unanticipated, unintended, hidden functions of this same change.
سؤال
The replacement of human mental processes by machines is referred to as cybernetics.
سؤال
Mathematical models use qualitative case studies to forecast crime trends.
سؤال
Delphi techniques are procedures that ask a panel of experts to predict the future.
سؤال
Scenario writing attempts to describe how present developments might appear in the future.
سؤال
According to crime predictions, urban robbery rates will most likely decline.
سؤال
Electronic tagging, DNA analysis, and recognition systems based on retinas or fingerprints could all be used to tackle crime in the twenty-first century.
سؤال
Crimewarps predicts that a reduction in rates of AIDS will increase demand for streetwalkers.
سؤال
Crimewarps predicts that the growth in the elderly population will increase medical quackery and insurance fraud.
سؤال
Financial crime by employees will be the largest computer problem in the future.
سؤال
More women in the work-force and increased leisure activity outside the home will create new opportunities for criminals.
سؤال
According to the British Home Office predictions, virtual-reality addiction may decrease.
سؤال
TVs, tablets, and smartphones are examples of hot products.
سؤال
Most traditional theories do not specifically address computer crimes.
سؤال
According to Ogburn (1922), computers can change communications, commerce, and even dating behavior far more quickly than the capability of societal values and norms to keep pace.
سؤال
Cybercrime is considered a separate type of crime.
سؤال
Malicious hackers seek forbidden knowledge and support the hacker's ethic.
سؤال
Types of attacks on computers have generated their own argot.
سؤال
Environmental scanning and surveys are used to predict the future of crime.
سؤال
Define cybercrime.
سؤال
What is cyberviolence?
سؤال
Identify Wall's (2007) three types of online offending.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/98
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 15: Cybercrime and the Future of Crime
1
______ refers to crime that is committed using a computer.

A) Trojan horse
B) Bot crime
C) Cybercrime
D) Identity theft
C
2
Why is botnet crime a type of cybercrime that is difficult to fight?

A) because "bot-herders" are particularly clever in avoiding police
B) Because most computer owners do not know their computers have been infected
C) Because botnets do not leave a trace
D) Because hackers send out many botnets at one time
B
3
Which of the following countries are continually accused of cyberspuing on the United States?

A) China and North Korea
B) South Korea and Japan
C) Egypt and Turkey
D) France and Russia
A
4
The internet was originally created in the United States for the ______.

A) Department of Justice
B) Department of Education
C) Department of Defense
D) Department of Homeland Security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
5
People who illegally reproduce and use software and subsequently cost manufacturers billions of dollars a year in lost revenue are called ______.

A) cyberpunks
B) cyber zombies
C) neuromancer
D) software pirates
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
6
All of the following are a part of Wall's (2001) typology of cybercrime except ______.

A) cyberdeceptions
B) cyberhackers
C) cyberpornography
D) cybertrespass
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
7
It is estimated that ______ percent of computer crimes are committed by "insiders" or employees.

A) 20
B) 50
C) 80
D) 95
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
8
The illegal production of computer software is a big business in ______ countries.

A) North American
B) Southeast Asian
C) Western European
D) Middle Eastern
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
9
All of the following are examples of cybercrime except ______.

A) high-tech espionage
B) telecommunications fraud
C) bullying
D) online pedophilia
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
10
Spernow's (1995) typology of cybercrime includes all of the following except for ______.

A) cyberviolence
B) insider crime
C) high-tech espionage
D) malicious hacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
11
According to Wall (2001), which of the following refers to crossing boundaries into other people's property?

A) cyberdeceptions
B) cyberviolence
C) cyberpornography
D) cybertrespass
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
12
According to Wall (2001), which of the following applies to crimes such as credit card fraud and priacy?

A) cyberdeceptions
B) cyberviolence
C) cyberpornography
D) cybertrespass
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
13
According to Wall (2001), which of the following refers to breaching laws on obscenity and decency?

A) cyberdeceptions
B) cyberviolence
C) cyberpornography
D) cybertrespass
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
14
According to Wall (2001), doing psychological harm to or inciting harm against others is known as ______.

A) cyberdeceptions
B) cyberviolence
C) cyberpornography
D) cybertrespass
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
15
What is the term for ill-intentioned hackers who attempt to break into computer systems?

A) crackers
B) insiders
C) pilferers
D) bait-and-switchers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
16
______ involve programming a computer to continuously send fake authentication messages to a targeted server, keeping it constantly busy and forcing out legitimate users.

A) Password phishing
B) Web spoofing
C) Denial of service attacks
D) Sniffers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
17
Software programs such as Cracker are used to assist in which of the following types of attacks?

A) denial of service attacks
B) e-mail bombs
C) dictionary attacks
D) worms
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
18
______ creates a false (shadow) version of a website that is controlled by the attacker.

A) Web spoofing
B) Worms
C) Password phishing
D) Sniffers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following refers to a subprogram that contains a virus, bomb, or other harmful feature?

A) web spoofing
B) worms
C) password phishing
D) Trojan horse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
20
______ entails a cracker stealing password, account, or credit card education.

A) Phishing
B) Worms
C) Trojan horse
D) Key loggers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following are similar to viruses that reproduce themselves and subvert computer systems?

A) phishing
B) worms
C) Trojan horse
D) key loggers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
22
______ are used to gain passwords to access accounts.

A) Phishing
B) Sniffer programs
C) Trojan horse
D) Key loggers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
23
What are vaccines?

A) computer hackers who develop harmful programs
B) computer programs that perform a task, such as printing a message or destroying data, on a certain date
C) rogue programs that copy themselves onto other programs
D) computer programs that seek out and destroy viruses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following best describes computer hackers who develop harmful programs?

A) time bombs
B) viruses
C) vaccines
D) cyberpunks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which of the following best describes rogue programs that copy themselves into other programs or disks?

A) time bombs
B) viruses
C) vaccines
D) cyberpunks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
26
______ are computer programs that perform a task, such as printing a message or destroying data, on a certain date.

A) Time bombs
B) Viruses
C) Vaccines
D) Cyberpunks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
27
A majority of children who are victims of online predator are ______.

A) younger than 9 years old
B) 9 to 13 years old
C) 14 to 17 years old
D) older than 17 years old
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
28
______ are the unanticipated, unintended, hidden functions of social change.

A) Manifest functions
B) Latent functions
C) Cultural lag
D) Hacker's ethics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
29
The idea that change takes place unevenly is referred to as ______.

A) manifest functions
B) latent functions
C) cultural lag
D) hacker's ethics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
30
______ are the anticipated or intended consequences of, for instance, new technology.

A) Manifest functions
B) Latent functions
C) Cultural lag
D) Hacker's ethics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
31
______ attempts to identify future developments (trends or events that might influence crime).

A) Environment scanning
B) Focus groups
C) Qualitative methodology
D) Triangulation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
32
______ are procedures that ask a panel of experts to predict the future.

A) Boosters
B) Delphi techniques
C) Hot products
D) Police Futurists International
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
33
______ attempts to describe how present developments might appear in the future.

A) Boosters
B) Delphi techniques
C) Hot products
D) Scenario writing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
34
What is the purpose of Police Futurists International?

A) It is an organization that exists for the purpose of predicting the future of policing.
B) It is an organization that follows the trends of governmental policies.
C) It is an organization that follows the trends of street crime versus white collar crime.
D) It is an organization that responds to the increasing needs of the FBI.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
35
What does the term "biometric spoofing" mean?

A) Criminals in the future may be able to use the same technology as crime fighters to commit crimes.
B) There will be an increase in scams related to virtual worlds, such as Second Life.
C) Robotics and cloning will lead the way in crime.
D) Mathematical models and quantitative data can predict computer crimes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
36
Bennett (1987) in Crimewarps, made all of the following predictions except for ______.

A) the computer will be the biggest generator of crime in the future
B) the concentraiton of crime in the U.S. will shift to the South
C) low birth rates and high work rates will leave homes ungaurded during the day
D) industries with older workers will experience less theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
37
All of the following were identified as predictions in Digital Crime and Digital Terrorism (2006) except that ______.

A) organized crime groups will increasingly use the computer as a criminal instrument
B) espionage will continue to evolve
C) cyber terrorism will be the largest computer problem
D) some hacker groups will evolve into networked criminal enterprises
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
38
British Home Office predictions include all of the following except for ______.

A) virtual-reality addition may increase
B) drugs will no longer pose challenges for crime control
C) alcopops and designer alcoholic drinks will continue to increase in popularity in underage drinkers
D) decreases in the use of cash will continue to result in greater theft involving credi cards and checks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
39
______ are items that are in high demand to be stolen.

A) Hot products
B) Crackers
C) Spoofs
D) Alcopops
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which of the following theories provies some explanation of cybercrime?

A) social disorganiztion
B) strain
C) differential association
D) cultural lag
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
41
Whole units of the Chinese military spend their entire time stealing secrets of government and private corporation computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
42
The computer is a tool that can be used in the commission of a variety of crimes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
43
Software pirates, those who illegally reproduce and use software, cost manufacturers billions of dollars a year in lost revenue.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
44
Most cybercrimes are reported to the police.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
45
Online pedophiles tend target young "wannabe" hackers and participants in chat rooms.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
46
Individuals involved in high-tech espionage are often industrial spies who sell their knowledge to rivals or foreign bidders.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
47
Key loggers are secret programs that record a user's keystrokes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
48
Both viruses and works can spread with no assistance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
49
Network scanning programs are used to find vulnerable networked computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
50
"Phone-phreaking" refers to automatic speed dialers used by computer hackers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
51
Experts suggest that parents should play a more proactive role in monitoring their child's use of the internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
52
Stalking online is usually of adolescents and not young children.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
53
Many predators use romance and seduction to corner their victims, and a surprising number are not known to the youth in person.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
54
Virus attacks can cripple internet operations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
55
Trojan horses, worms, logic bombs, and eavesdropping sniffers can all be used to compromise the integrity of or deny access to data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
56
Cybercrime is not a separate type of crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
57
The latent functions of social change are the anticipated or intended consequences of new technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
58
Latent functions are the anticipated or intended consequences of, for instance, new technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
59
Manifest functions are the unanticipated, unintended, hidden functions of this same change.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
60
The replacement of human mental processes by machines is referred to as cybernetics.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
61
Mathematical models use qualitative case studies to forecast crime trends.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
62
Delphi techniques are procedures that ask a panel of experts to predict the future.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
63
Scenario writing attempts to describe how present developments might appear in the future.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
64
According to crime predictions, urban robbery rates will most likely decline.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
65
Electronic tagging, DNA analysis, and recognition systems based on retinas or fingerprints could all be used to tackle crime in the twenty-first century.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
66
Crimewarps predicts that a reduction in rates of AIDS will increase demand for streetwalkers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
67
Crimewarps predicts that the growth in the elderly population will increase medical quackery and insurance fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
68
Financial crime by employees will be the largest computer problem in the future.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
69
More women in the work-force and increased leisure activity outside the home will create new opportunities for criminals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
70
According to the British Home Office predictions, virtual-reality addiction may decrease.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
71
TVs, tablets, and smartphones are examples of hot products.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
72
Most traditional theories do not specifically address computer crimes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
73
According to Ogburn (1922), computers can change communications, commerce, and even dating behavior far more quickly than the capability of societal values and norms to keep pace.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
74
Cybercrime is considered a separate type of crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
75
Malicious hackers seek forbidden knowledge and support the hacker's ethic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
76
Types of attacks on computers have generated their own argot.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
77
Environmental scanning and surveys are used to predict the future of crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
78
Define cybercrime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
79
What is cyberviolence?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
80
Identify Wall's (2007) three types of online offending.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 98 في هذه المجموعة.