Deck 11: Internet Deviance

ملء الشاشة (f)
exit full mode
سؤال
Experts fear that if Internet gambling were legal,compulsive gamblers would probably

A)get more help.
B)gamble less.
C)go bankrupt.
D)break the law.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A Trojan is

A)a Greek military strategy.
B)a hacker code.
C)a protective software.
D)a key logger
سؤال
Joe engaged in an online affair,but when he was caught by his wife,he insisted it was not an affair.He was likely to use all of the following reasons to deny guilt,EXCEPT that

A)no real sex took place.
B)it was merely fun.
C)it only involved a relationship to a machine.
D)no one was hurt by the affair.
سؤال
All of the following are characteristics of cyberporn surfers,except for ________.

A)teenagers
B)whites
C)males
D)married
سؤال
Internet gambling seems to be more convenient,solitary,and anonymous.These features also make it more ________.

A)addictive
B)deviant
C)profitable
D)legal
سؤال
Which of the following statements about Internet gambling is true?

A)Internet gamblers bet about $2 billion a year.
B)Internet gambling is largely legal in the United States.
C)Internet gambling is illegal throughout the world.
D)Internet gambling legalization is an unsettled issue in the United States.
سؤال
The text's authors call the Internet the "wild frontier of deviance" because

A)Internet deviance involves many violent acts.
B)Internet deviance can be carried out with impunity.
C)the Internet itself is somewhat deviant.
D)so much imaginative deviance is taking place.
سؤال
Which of the following is the most often an outcome of cybersex?

A)finding a partner offline
B)masturbation
C)depression
D)better sex
سؤال
All of the following are reasons why online infidelity is very appealing EXCEPT that it

A)is anonymous.
B)is convenient,allowing one to find partners all over the world from their keyboard.
C)leads to real-life liaisons most of the time.
D)is a form of escapism.
سؤال
Which of the following is one reason why the United States cannot stop Internet gambling within their borders?

A)the lack of law enforcement
B)the lack of laws
C)too many compulsive Internet gamblers
D)organized crime involvement
سؤال
Cyberdeviance can be split into two broad types: disrupting a computer network as a target and

A)using the computer as a tool to commit deviant acts.
B)using the computer to keep records of deviance.
C)creating a method of hacking.
D)creating a computer network to commit deviance.
سؤال
If consumers are sent bogus e-mails that appear to come from legitimate banks or e-commerce sites in order to gain personal information,they are victims of ________.

A)hacking
B)plucking
C)phishing
D)pilfering
سؤال
Men who visit and use child pornography sites are considered

A)innocent partakers of fantasies.
B)pedophiles.
C)normal Internet users.
D)harmless visitors.
سؤال
All of following are reasons for people to take part in cybersex,except for

A)anonymity.
B)ease and convenience.
C)resolving marital problems.
D)strong sexual fantasies.
سؤال
Which of the following statements about cyberdeviance is true?

A)High tech has enabled law enforcement agencies to catch and convict at least 25 percent of online identity thieves.
B)The majority of identity thefts are inside jobs.
C)Most cyberporn enthusiasts are teenagers.
D)Cyberstalking is more benign and less harmful than off-line,traditional stalking.
سؤال
Most people consider online affairs just as real as offline affairs because

A)they involve the deviant use of a computer.
B)all fantasies about sex turn into reality.
C)a physical sexual act usually takes place.
D)they can lead to marital discord and divorce.
سؤال
Most identity theft is done by

A)Eastern European countries.
B)organization or corporate insiders.
C)bright teenagers.
D)cyber-pornographers.
سؤال
Many companies are unwilling participants in identity theft.All of the following are practices that facilitate identity theft if not implemented,EXCEPT for

A)using key logging monitoring programs.
B)maintaining personnel security.
C)installing a firewall.
D)using hard-to-guess passwords.
سؤال
Legalizing Internet gambling would

A)end organized crime involvement in Internet gambling.
B)largely end Internet gambling.
C)produce needed tax revenue.
D)make Internet gambling a local and not a national problem.
سؤال
About ________ billion dollars are spent each year on Internet gambling.

A)1
B)6
C)44
D)61
سؤال
How many nationwide cyberattacks have taken place against the United States?

A)0
B)1
C)6
D)14
سؤال
The anonymity of the Internet discourages discrimination because it

A)discourages prejudice against minorities through education.
B)hides the group-identifying cues of gender and ethnicity.
C)hides the deviants who promote hate.
D)receives minority protections from the U.S. government.
سؤال
The key factor that allows people to express their anti-minority feelings and beliefs is

A)the number of computers available.
B)anonymity.
C)freedom.
D)prejudice.
سؤال
Which of the following are NOT characteristics of the typical hacker profile?

A)They are males.
B)They come from dysfunctional families.
C)They have deviant personalities.
D)They associate with a peer group.
سؤال
Which of the following would be an example of cyberterrorism?

A)flying an airplane into the World Trade Center
B)the London suicide bombers
C)the disruption of the nation's air traffic system
D)giving an impassioned speech at a local mosque
سؤال
The most common type of cyberdeviance is ________.

A)terrorism
B)pornography
C)viruses
D)child pornography and exploitation
سؤال
Which of the following figures reflects the yearly number of cybercrimes around the world in 2002?

A)300,000
B)700,000
C)1,300,000
D)5,100,000
سؤال
A global perspective on cyberdeviance reveals that cyberdeviance is

A)mostly confined to the United States.
B)truly global and borderless.
C)largely shaped by the global economy.
D)mostly the result of offline deviance in other places in the world.
سؤال
The repeated harassment of others through the Internet is called ________.

A)cyberterrorism
B)a hate crime
C)cyberstalking
D)discrimination
سؤال
Cyberstalking is sometimes more disturbing and dangerous than traditional stalking because

A)e-mail messages can be meaner than in-person contact.
B)cyberstalkers have greater access to personal data.
C)most victims are recent immigrants from other countries.
D)e-mail contact usually lead to personal confrontation.
سؤال
The free exchange website Pirate Bay has ties to which of the following organizations?

A)Creative Commons
B)The Federal Trade Commission
C)The Missionary Church of Kopimism
D)The Hipatia Group
سؤال
Which of the following is the reason why no terrorist has launched a cyberattack upon the United States?

A)The United States has good defenses against such an attack.
B)Cyberterrorists have lost interest in attacking the United States.
C)Cyberterrorists still do not possess specialized knowledge of the U.S. computer infrastructure.
D)Cyberterrorists are more interested in identity theft to raise money for offline terrorist acts.
سؤال
All of the following are features of cyberstalking,EXCEPT that cyberstalkers

A)can harass people anywhere in the world.
B)can cause people serious emotional and physical harms through the spread of rumors online.
C)usually cyberstalk persons they know.
D)usually make themselves known to the persons they are tormenting.
سؤال
The Anti-Defamation League and the Poverty Law Center

A)track prejudice online and promote tolerance.
B)offer filtering programs to protect children.
C)enforce hate crime laws.
D)promote Internet freedom of speech.
سؤال
Which of the following types of hacking are the most well known?

A)exploring networks
B)planting viruses
C)changing user names and passwords
D)manipulation of web pages
سؤال
All of the following are true about expressing hate online,EXCEPT that the deviants

A)usually follow up their expression of hate by practicing discrimination.
B)use the Internet to express their personal hatred toward a minority.
C)can begin cyberstalking the victims.
D)usually choose to hate someone they know.
سؤال
To many sociologists,hackers strongly resemble

A)career criminals.
B)cyberterrorists.
C)identity thieves.
D)juvenile delinquents.
سؤال
All of the following are examples of using the computer-as opposed to the computer network-as a tool to commit a deviant act,EXCEPT

A)cyberporn.
B)stalking.
C)identity theft.
D)cyberterrorism
سؤال
The Internet Crime Complaint Center (IC3)is a sector belonging to which of the following institutions?

A)the National Institute of Justice
B)the United States National Guard
C)the CIA
D)the FBI
سؤال
Which of the following forms of hacking has the fewest implications for greater society?

A)planting a worm
B)knocking out a phone network
C)hacking a famous person's cellphone and posting stored photos
D)stealing money through identity theft
سؤال
The reason the text's authors call the Internet the new, wild frontier of deviance today is because Internet deviants are more educated and clever.
سؤال
Many people use the Internet as a tool for expressing their hate of others.
سؤال
The anonymity of the Internet leads to more discrimination against members of minority groups.
سؤال
One benefit from the legalization of Internet gambling would be the ability to more carefully regulate the industry
سؤال
Traditional stalking is generally more dangerous than traditional cyberstalking.
سؤال
Cyberstalking is almost always directed toward people the deviant knows and does not like.
سؤال
Most persons visiting Internet porn sites are sex-crazed teenagers.
سؤال
The majority of people who visit Internet porn sites are married white males.
سؤال
Internet gambling is legal in a handful of states in the United States, despite limitations.
سؤال
A serious type of cyberdeviance involves targeting a computer network through hacking and cyberterrorism.
سؤال
Internet gambling is totally illegal in the United States.
سؤال
Two reasons why many persons enjoy cybersex are because it is anonymous and can lead to real sex.
سؤال
Trojan horses are a type of spyware programs that allow identity thieves to monitor a computer user's key strokes.
سؤال
Cyberstalking is more disturbing and dangerous than traditional stalking.
سؤال
Hacktivism involves accessing computer systems and files,by illegal means,for various political and socially conscientious purposes.
سؤال
Two factors that have led to the tremendous rise of cyberdeviance is the phenomenal increase in the use of computers and

A)an increased desire for deviant activities such as pornography.
B)organized crime.
C)lack of law enforcement.
D)fewer opportunities for offline deviance.
سؤال
Law enforcement agencies have not successfully caught and convicted any online identity thieves.
سؤال
Almost all hackers are interested in cracking and damaging computer networks and to otherwise show off their skills.
سؤال
Almost all Internet affairs result in the actual meeting and sex with the online partner.
سؤال
Married people excuse their online affairs by saying it is a relationship with an object and not a real person.
سؤال
A ______ could bring a country to its knees by disrupting or disabling its infrastructure.
سؤال
The main reason why the United States has not experienced a cyberattack is because terrorists have lost interest in doing so.
سؤال
The two factors that explain cyberdeviance's meteoric rise is the phenomenal increase in computer use and lack of law enforcement.
سؤال
The most widespread form of cyberdeviance around the world is pornography.
سؤال
_____________ is using the Internet or e-mails to repeatedly harass or threaten another person.
سؤال
___________ is popular because customers can view materials in the privacy of their homes.
سؤال
__________ people in the general public consider online affairs to be just as real as offline affairs.
سؤال
One disturbing use of the Internet is expressing __________ toward some minority group.
سؤال
Analyze the threat of a cyberterrorist attack against the United States.What would happen? How can the United States prevent such an attack,and would such prevention change the nature of the Internet? How so?
سؤال
Cyberspace is truly global and borderless.
سؤال
Cyberaggression is similar to cyberbullying,but the negative online interaction is repeated over a much longer term.
سؤال
__________ programs copy a computer user's keystroked and sends the information to the offender.
سؤال
__________ involves accessing computer systems and files,by illegal means,for various political and socially conscientious purposes.
سؤال
Two forms of cyberdeviance are using a computer as a __________ to commit acts of deviance and disrupting a computer network as a target.
سؤال
Cyberterrorists could bring the United States to its knees by disrupting or disabling its infrastructure.
سؤال
__________ is a scam that involves a caller pretending to have knowledge of an abduction of a family member.
سؤال
While often conducted for malicious purposes,__________ may also be relatively innocent and harmless,such as breaking into computer systems only for the challenge and then notifying system administrators how the break-in is done so that they can improve their network security.
سؤال
Most Americans who engage in Internet gambling do so by visiting otherwise legal __________ gaming websites.
سؤال
What can a global perspective tell us about cyberdeviance? Discuss which countries engage in cyberdeviance,and the historic trends that have been emerging since the 1990s.
سؤال
One common reason why people participate in cybersex is the relative __________ of finding sex partners.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/80
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Internet Deviance
1
Experts fear that if Internet gambling were legal,compulsive gamblers would probably

A)get more help.
B)gamble less.
C)go bankrupt.
D)break the law.
C
2
A Trojan is

A)a Greek military strategy.
B)a hacker code.
C)a protective software.
D)a key logger
D
3
Joe engaged in an online affair,but when he was caught by his wife,he insisted it was not an affair.He was likely to use all of the following reasons to deny guilt,EXCEPT that

A)no real sex took place.
B)it was merely fun.
C)it only involved a relationship to a machine.
D)no one was hurt by the affair.
D
4
All of the following are characteristics of cyberporn surfers,except for ________.

A)teenagers
B)whites
C)males
D)married
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
5
Internet gambling seems to be more convenient,solitary,and anonymous.These features also make it more ________.

A)addictive
B)deviant
C)profitable
D)legal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following statements about Internet gambling is true?

A)Internet gamblers bet about $2 billion a year.
B)Internet gambling is largely legal in the United States.
C)Internet gambling is illegal throughout the world.
D)Internet gambling legalization is an unsettled issue in the United States.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
7
The text's authors call the Internet the "wild frontier of deviance" because

A)Internet deviance involves many violent acts.
B)Internet deviance can be carried out with impunity.
C)the Internet itself is somewhat deviant.
D)so much imaginative deviance is taking place.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is the most often an outcome of cybersex?

A)finding a partner offline
B)masturbation
C)depression
D)better sex
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
9
All of the following are reasons why online infidelity is very appealing EXCEPT that it

A)is anonymous.
B)is convenient,allowing one to find partners all over the world from their keyboard.
C)leads to real-life liaisons most of the time.
D)is a form of escapism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following is one reason why the United States cannot stop Internet gambling within their borders?

A)the lack of law enforcement
B)the lack of laws
C)too many compulsive Internet gamblers
D)organized crime involvement
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
11
Cyberdeviance can be split into two broad types: disrupting a computer network as a target and

A)using the computer as a tool to commit deviant acts.
B)using the computer to keep records of deviance.
C)creating a method of hacking.
D)creating a computer network to commit deviance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
12
If consumers are sent bogus e-mails that appear to come from legitimate banks or e-commerce sites in order to gain personal information,they are victims of ________.

A)hacking
B)plucking
C)phishing
D)pilfering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
13
Men who visit and use child pornography sites are considered

A)innocent partakers of fantasies.
B)pedophiles.
C)normal Internet users.
D)harmless visitors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
14
All of following are reasons for people to take part in cybersex,except for

A)anonymity.
B)ease and convenience.
C)resolving marital problems.
D)strong sexual fantasies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following statements about cyberdeviance is true?

A)High tech has enabled law enforcement agencies to catch and convict at least 25 percent of online identity thieves.
B)The majority of identity thefts are inside jobs.
C)Most cyberporn enthusiasts are teenagers.
D)Cyberstalking is more benign and less harmful than off-line,traditional stalking.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
16
Most people consider online affairs just as real as offline affairs because

A)they involve the deviant use of a computer.
B)all fantasies about sex turn into reality.
C)a physical sexual act usually takes place.
D)they can lead to marital discord and divorce.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
17
Most identity theft is done by

A)Eastern European countries.
B)organization or corporate insiders.
C)bright teenagers.
D)cyber-pornographers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
18
Many companies are unwilling participants in identity theft.All of the following are practices that facilitate identity theft if not implemented,EXCEPT for

A)using key logging monitoring programs.
B)maintaining personnel security.
C)installing a firewall.
D)using hard-to-guess passwords.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
19
Legalizing Internet gambling would

A)end organized crime involvement in Internet gambling.
B)largely end Internet gambling.
C)produce needed tax revenue.
D)make Internet gambling a local and not a national problem.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
20
About ________ billion dollars are spent each year on Internet gambling.

A)1
B)6
C)44
D)61
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
21
How many nationwide cyberattacks have taken place against the United States?

A)0
B)1
C)6
D)14
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
22
The anonymity of the Internet discourages discrimination because it

A)discourages prejudice against minorities through education.
B)hides the group-identifying cues of gender and ethnicity.
C)hides the deviants who promote hate.
D)receives minority protections from the U.S. government.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
23
The key factor that allows people to express their anti-minority feelings and beliefs is

A)the number of computers available.
B)anonymity.
C)freedom.
D)prejudice.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following are NOT characteristics of the typical hacker profile?

A)They are males.
B)They come from dysfunctional families.
C)They have deviant personalities.
D)They associate with a peer group.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which of the following would be an example of cyberterrorism?

A)flying an airplane into the World Trade Center
B)the London suicide bombers
C)the disruption of the nation's air traffic system
D)giving an impassioned speech at a local mosque
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
26
The most common type of cyberdeviance is ________.

A)terrorism
B)pornography
C)viruses
D)child pornography and exploitation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which of the following figures reflects the yearly number of cybercrimes around the world in 2002?

A)300,000
B)700,000
C)1,300,000
D)5,100,000
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
28
A global perspective on cyberdeviance reveals that cyberdeviance is

A)mostly confined to the United States.
B)truly global and borderless.
C)largely shaped by the global economy.
D)mostly the result of offline deviance in other places in the world.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
29
The repeated harassment of others through the Internet is called ________.

A)cyberterrorism
B)a hate crime
C)cyberstalking
D)discrimination
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
30
Cyberstalking is sometimes more disturbing and dangerous than traditional stalking because

A)e-mail messages can be meaner than in-person contact.
B)cyberstalkers have greater access to personal data.
C)most victims are recent immigrants from other countries.
D)e-mail contact usually lead to personal confrontation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
31
The free exchange website Pirate Bay has ties to which of the following organizations?

A)Creative Commons
B)The Federal Trade Commission
C)The Missionary Church of Kopimism
D)The Hipatia Group
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the following is the reason why no terrorist has launched a cyberattack upon the United States?

A)The United States has good defenses against such an attack.
B)Cyberterrorists have lost interest in attacking the United States.
C)Cyberterrorists still do not possess specialized knowledge of the U.S. computer infrastructure.
D)Cyberterrorists are more interested in identity theft to raise money for offline terrorist acts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
33
All of the following are features of cyberstalking,EXCEPT that cyberstalkers

A)can harass people anywhere in the world.
B)can cause people serious emotional and physical harms through the spread of rumors online.
C)usually cyberstalk persons they know.
D)usually make themselves known to the persons they are tormenting.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
34
The Anti-Defamation League and the Poverty Law Center

A)track prejudice online and promote tolerance.
B)offer filtering programs to protect children.
C)enforce hate crime laws.
D)promote Internet freedom of speech.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which of the following types of hacking are the most well known?

A)exploring networks
B)planting viruses
C)changing user names and passwords
D)manipulation of web pages
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
36
All of the following are true about expressing hate online,EXCEPT that the deviants

A)usually follow up their expression of hate by practicing discrimination.
B)use the Internet to express their personal hatred toward a minority.
C)can begin cyberstalking the victims.
D)usually choose to hate someone they know.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
37
To many sociologists,hackers strongly resemble

A)career criminals.
B)cyberterrorists.
C)identity thieves.
D)juvenile delinquents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
38
All of the following are examples of using the computer-as opposed to the computer network-as a tool to commit a deviant act,EXCEPT

A)cyberporn.
B)stalking.
C)identity theft.
D)cyberterrorism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
39
The Internet Crime Complaint Center (IC3)is a sector belonging to which of the following institutions?

A)the National Institute of Justice
B)the United States National Guard
C)the CIA
D)the FBI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which of the following forms of hacking has the fewest implications for greater society?

A)planting a worm
B)knocking out a phone network
C)hacking a famous person's cellphone and posting stored photos
D)stealing money through identity theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
41
The reason the text's authors call the Internet the new, wild frontier of deviance today is because Internet deviants are more educated and clever.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
42
Many people use the Internet as a tool for expressing their hate of others.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
43
The anonymity of the Internet leads to more discrimination against members of minority groups.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
44
One benefit from the legalization of Internet gambling would be the ability to more carefully regulate the industry
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
45
Traditional stalking is generally more dangerous than traditional cyberstalking.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
46
Cyberstalking is almost always directed toward people the deviant knows and does not like.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
47
Most persons visiting Internet porn sites are sex-crazed teenagers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
48
The majority of people who visit Internet porn sites are married white males.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
49
Internet gambling is legal in a handful of states in the United States, despite limitations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
50
A serious type of cyberdeviance involves targeting a computer network through hacking and cyberterrorism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
51
Internet gambling is totally illegal in the United States.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
52
Two reasons why many persons enjoy cybersex are because it is anonymous and can lead to real sex.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
53
Trojan horses are a type of spyware programs that allow identity thieves to monitor a computer user's key strokes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
54
Cyberstalking is more disturbing and dangerous than traditional stalking.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
55
Hacktivism involves accessing computer systems and files,by illegal means,for various political and socially conscientious purposes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
56
Two factors that have led to the tremendous rise of cyberdeviance is the phenomenal increase in the use of computers and

A)an increased desire for deviant activities such as pornography.
B)organized crime.
C)lack of law enforcement.
D)fewer opportunities for offline deviance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
57
Law enforcement agencies have not successfully caught and convicted any online identity thieves.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
58
Almost all hackers are interested in cracking and damaging computer networks and to otherwise show off their skills.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
59
Almost all Internet affairs result in the actual meeting and sex with the online partner.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
60
Married people excuse their online affairs by saying it is a relationship with an object and not a real person.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
61
A ______ could bring a country to its knees by disrupting or disabling its infrastructure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
62
The main reason why the United States has not experienced a cyberattack is because terrorists have lost interest in doing so.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
63
The two factors that explain cyberdeviance's meteoric rise is the phenomenal increase in computer use and lack of law enforcement.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
64
The most widespread form of cyberdeviance around the world is pornography.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
65
_____________ is using the Internet or e-mails to repeatedly harass or threaten another person.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
66
___________ is popular because customers can view materials in the privacy of their homes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
67
__________ people in the general public consider online affairs to be just as real as offline affairs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
68
One disturbing use of the Internet is expressing __________ toward some minority group.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
69
Analyze the threat of a cyberterrorist attack against the United States.What would happen? How can the United States prevent such an attack,and would such prevention change the nature of the Internet? How so?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
70
Cyberspace is truly global and borderless.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
71
Cyberaggression is similar to cyberbullying,but the negative online interaction is repeated over a much longer term.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
72
__________ programs copy a computer user's keystroked and sends the information to the offender.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
73
__________ involves accessing computer systems and files,by illegal means,for various political and socially conscientious purposes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
74
Two forms of cyberdeviance are using a computer as a __________ to commit acts of deviance and disrupting a computer network as a target.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
75
Cyberterrorists could bring the United States to its knees by disrupting or disabling its infrastructure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
76
__________ is a scam that involves a caller pretending to have knowledge of an abduction of a family member.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
77
While often conducted for malicious purposes,__________ may also be relatively innocent and harmless,such as breaking into computer systems only for the challenge and then notifying system administrators how the break-in is done so that they can improve their network security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
78
Most Americans who engage in Internet gambling do so by visiting otherwise legal __________ gaming websites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
79
What can a global perspective tell us about cyberdeviance? Discuss which countries engage in cyberdeviance,and the historic trends that have been emerging since the 1990s.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
80
One common reason why people participate in cybersex is the relative __________ of finding sex partners.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.