Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Criminal Justice
Study Set
Criminology The Core Study Set 1
Quiz 14: Crimes of the New Millennium: Cyber Crime, Technology, and Transnational Organized Crimes
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 61
Short Answer
A __________________ involves placing deceptive information online to get unsuspecting investors interested in a stock while those spreading the information sell previously purchased stock at an inflated price.
Question 62
Multiple Choice
After getting a taste for illegal activity, Jody and David decide to participate in other illegal cybercrimes. They decide to use the university listserv to email all students and faculty at the university notifying them that their account has been hacked and to email their name and password back to the sender. This is an example of ______.
Question 63
Short Answer
______________ fraud consists of the illegal buying and selling of merchandise on the Internet.
Question 64
Short Answer
A malicious software program may also be called _________________
Question 65
Short Answer
A computer program that looks like a benign application but contains illicit codes that can damage the system operations is called a ______________________
Question 66
Multiple Choice
Which of the following is an Asian transnational group involved in manufacturing and trafficking methamphetamine who originated in Thailand?
Question 67
Short Answer
Using the Internet to impersonate the victim in order to conduct illicit transactions such as fraud is called ________________
Question 68
Short Answer
A ____________ occurs when negative information is spread online about a stock, driving down its price and enabling people to buy it at an artificially low price.
Question 69
Short Answer
In the case of MGM Studios, INC v. Grokster, Ltd. found that peer-to-peer ______________ sites are another form of illegal copyright infringement and are punishable by fines and or confinement.
Question 70
Short Answer
Malicious attacks aimed at disrupting, defacing, and destroying technology are referred to as _______________.
Question 71
Short Answer
A _________________ is a program that is secretly attached to a computer system, monitors the network's work output, and waits for a particular signal, such as a date, to appear.
Question 72
Short Answer
Illegally removing small sums from the balances of a large number of accounts and converting them for person use is a term known as _______________________.
Question 73
Short Answer
The use of computer networks for criminal profits, copyright infringements, identity theft, and Internet securities are examples of cyber-crimes called ___________________.
Question 74
Short Answer
Extorting money from an Internet service user by threatening to prevent the user from having access to the service is called a _______________________
Question 75
Multiple Choice
Jody is a 21-year-old college student from Wheeling, WV. She attends a local state university with her boyfriend, David, and the two are set to graduate next May with degrees in criminal justice. Answer the following questions: One of Jody's friends on the volleyball team regularly downloads music from the Internet and has gotten Jody to participate in the activity as well. Although Jody knows this is illegal, she is participating in a cybercrime called______.
Question 76
Short Answer
Criminal conspiracies that cross national and international borders and involve the planning and execution of illicit ventures by groups or networks in more than one country is known as _______.
Question 77
Short Answer
Computer _____________ are programs that attack computer networks by self-replicating and sending themselves to other users, generally via email without the aid of the operator.