Deck 11: Cyberdeviance

Full screen (f)
exit full mode
Question
Who are the different actors that participate in the computer underground? Describe each of the participants.
Use Space or
up arrow
down arrow
to flip the card.
Question
What makes the computer underground a subculture? What types of specialized vocabulary do members of the computer underground use? Describe the commonly held beliefs shared by the participants in the computer underground. How do members of the computer underground communicate?
Question
In what ways might the Internet contribute to dysfunctional or addictive sexual behavior of individuals?
Question
Describe the range of pornography types on-line
Question
Those individuals who break security systems are known as hackers.
Question
The computer underground is composed of actors adhering to one of five roles: hackers, crackers, phreakers, warez d00dz, or lamers, leeches, and posers.
Question
The goal of a cracker is to make a program or system perform with optimum efficiency.
Question
John "Cap'n Crunch" Draper is known as the "father of phreaking."
Question
Warez d00dz distribute pirated software strictly for monetary gain.
Question
Lamers, leeches, and posers are generally thought of as wannabes.
Question
One rich source of jargon construction is the hackish tendency to anthropomorphize hardware and software, which is the tendency to attribute the characteristics of gods, animals, or things to humans.
Question
The most common belief held by members of the computer underground is that all information should be free or shared.
Question
The most common form of communication between members is through the bulletin boards and newsgroups.
Question
The computer underground has their own specialized way of dressing.
Question
Downloading pornographic images involving children is a federal crime.
Question
The term ___________ was originally intended to be a complimentary recognition of one's computer skills.
Question
___________ is the oldest of the electronically distributed computer underground publications.
Question
Those individuals who have a deeper and more technically oriented interest in the "telco" are known as ___________.
Question
In a sadomasochism chatroom, a "handle" or user nickname that begins with a capital letter indicates that the user play a ______________ in cyber-relationships.
Question
Software which has been copied and cracked on the same day that it is released for retail sale is known as _________________.
Question
The term ____________, as it is used among crackers, phreaks, and warez d00dz, indicates that a given individual is a wanna-be and not skilled as yet.
Question
A __________ is a technical name for what is commonly known as a "chat line" or "conference system."
Question
Typing in all caps often means that someone is _________.
Question
Which of the following is not considered a participant in the computer underground?

A) crackers
B) phreakers
C) elite
D) warez d00dz
E) both b and c
Question
The first issue released in 1985 makes this the oldest of the electronically distributed computer underground publications:

A) Phrack Inc.
B) The Hacker Quarterly
C) Activist Times, Incorporated
D) Legion of Doom/Hackers Technical Journal
E) none of the above
Question
Hackers prefer to be known as:

A) wizards
B) computer geniuses
C) computer wizards
D) both b and c
E) both a and c
Question
What is not a common definition of what a hacker is?

A) a person who tries to discover sensitive information by exploring other's computers
B) an explorer of computer systems
C) a programming theorist
D) a programming master
Question
A cracker is one who:

A) specializes in exploiting the phone system
B) specializes in breaking security on a system
C) pirates software
D) uses the programs of others to do their work
Question
The term "lamer" is used most often by crackers, phreakers, and warez d00dz to describe individuals who:

A) consume knowledge without generating new software
B) is not skilled as yet
C) want to be like them but do not understand what it really takes to do what they do
D) are "plugged-in"
E) all of the above
Question
Some of the methods in which the computer underground creates their own jargon are:

A) verb doubling
B) overgeneralization
C) the 'f'-convention
D) both a and b
Question
What is not a characteristic of a cracker?

A) tend to gather in small, tight-knit, secretive groups
B) tend to develop and implement computer viruses
C) manipulates or damages computer files
D) distributes pirated commercial software
Question
Phreaking is a term used to describe the:

A) different means of receiving telephone services without being billed by telephone companies
B) act of destroying computer files
C) act of communicating on bridges, loops, and voice mail boxes
D) abuse of the telephone network in pursuit of the latest computer game or application
Question
What is not a characteristic of lamers, leeches, and posers?

A) very technically oriented with telephone systems
B) wanna-be
C) likely to use programs that attack and damage the computers of others
D) someone who is just getting into the computer underground
E) both a and c
Question
Soundalike slang is:

A) used to turn a word into a question
B) the use of rhymes or puns in order to convert an ordinary word or phrase into something more
C) known as techspeak
D) all of the above
E) none of the above
Question
All members of the computer underground share certain beliefs and norms except:

A) all information should be shared
B) the belief in the acquisition of knowledge
C) information should be free
D) the freedom to browse computer systems
E) none of the above
Question
On a __________ callers can call in, listen to a recorded message, and then leave a message for the owner.

A) bridge
B) loop
C) telco
D) voice-mail box
E) none of the above
Question
Which is not one of the characteristics that distinguishes the computer underground as a subculture:

A) they have a special vocabulary
B) they have a specialized way of dressing
C) behavior is learned through contacts with members of the group
D) they have a set of shared beliefs and norms
E) none of the above
Question
Some of the basic propositions of the hacker ethic are:

A) access to computers should be unlimited and total
B) all information should be free
C) mistrust authority
D) all of the above
E) both b and c
Question
Hackers are commonly seen by the public as:

A) those who commit the criminal or mischievous acts that involve computers
B) computer wizards
C) expert
D) enthusiast
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/39
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Cyberdeviance
1
Who are the different actors that participate in the computer underground? Describe each of the participants.
The computer underground is a term used to describe the community of individuals who engage in illegal or unauthorized activities related to computers and technology. The participants in the computer underground can include:

1. Hackers: These are individuals who use their technical skills to gain unauthorized access to computer systems or networks. They may do this for various reasons, such as to steal information, disrupt operations, or simply for the challenge and thrill of breaking into secure systems.

2. Crackers: Similar to hackers, crackers also seek to gain unauthorized access to computer systems, but they specifically focus on bypassing security measures, such as copy protection or digital rights management, to illegally access software, media, or other digital content.

3. Phreakers: Phreaking is the practice of exploring and exploiting the telecommunication systems, such as phone networks, to make free calls, manipulate phone services, or engage in other unauthorized activities related to telecommunications technology.

4. Script Kiddies: These are individuals who lack the technical expertise of hackers or crackers but use pre-written scripts or tools to carry out cyber attacks or other malicious activities. They often do so without fully understanding the implications of their actions.

5. Whistleblowers: While not necessarily engaging in illegal activities themselves, whistleblowers may participate in the computer underground by leaking confidential or sensitive information from organizations or governments to expose wrongdoing or misconduct.

It's important to note that not all participants in the computer underground engage in illegal activities, and some may use their skills for ethical hacking, cybersecurity research, or other legitimate purposes. However, the term generally refers to those who operate outside the boundaries of legal and ethical behavior in the digital realm.
2
What makes the computer underground a subculture? What types of specialized vocabulary do members of the computer underground use? Describe the commonly held beliefs shared by the participants in the computer underground. How do members of the computer underground communicate?
The computer underground is considered a subculture because it is a distinct and separate group within the larger computer and technology community. Members of the computer underground often have their own set of values, norms, and beliefs that set them apart from mainstream computer users. They often engage in activities that are considered illegal or unethical, such as hacking, cracking, and sharing pirated software.

Members of the computer underground use specialized vocabulary to communicate with each other. This includes terms such as "hacker," "cracker," "phreaker," "warez," "script kiddie," and "zero-day exploit." These terms are used to describe different roles and activities within the subculture.

Commonly held beliefs shared by participants in the computer underground include a distrust of authority, a belief in the freedom of information, and a desire to push the boundaries of technology. They often see themselves as rebels or outlaws who are challenging the status quo and pushing the limits of what is possible with technology.

Members of the computer underground communicate through various channels, including online forums, chat rooms, encrypted messaging apps, and in-person meetups. They often use pseudonyms or handles to protect their identities and maintain a level of anonymity. This allows them to freely discuss their activities and share information without fear of repercussions from law enforcement or other authorities.
3
In what ways might the Internet contribute to dysfunctional or addictive sexual behavior of individuals?
The Internet can contribute to dysfunctional or addictive sexual behavior in several ways. Firstly, the easy access to pornography and explicit sexual content online can lead to desensitization and escalation of sexual fantasies, leading individuals to seek out more extreme or deviant forms of sexual behavior. This can contribute to a cycle of addiction and compulsive sexual behavior.

Additionally, the anonymity and privacy of the Internet can make it easier for individuals to engage in risky or taboo sexual behaviors without fear of judgment or consequences. This can lead to a lack of boundaries and an increased likelihood of engaging in harmful or destructive sexual activities.

Furthermore, the constant availability of sexual content and opportunities for online sexual interactions can lead to a preoccupation with sexual thoughts and behaviors, interfering with daily functioning and relationships. This can contribute to a pattern of dysfunctional and addictive sexual behavior.

Overall, the Internet can provide a breeding ground for dysfunctional or addictive sexual behavior by offering easy access to explicit content, enabling anonymity and privacy, and fostering a preoccupation with sexual activities. It is important for individuals to be aware of these potential risks and seek help if they find themselves struggling with compulsive or harmful sexual behaviors.
4
Describe the range of pornography types on-line
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
5
Those individuals who break security systems are known as hackers.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
6
The computer underground is composed of actors adhering to one of five roles: hackers, crackers, phreakers, warez d00dz, or lamers, leeches, and posers.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
7
The goal of a cracker is to make a program or system perform with optimum efficiency.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
8
John "Cap'n Crunch" Draper is known as the "father of phreaking."
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
9
Warez d00dz distribute pirated software strictly for monetary gain.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
10
Lamers, leeches, and posers are generally thought of as wannabes.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
11
One rich source of jargon construction is the hackish tendency to anthropomorphize hardware and software, which is the tendency to attribute the characteristics of gods, animals, or things to humans.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
12
The most common belief held by members of the computer underground is that all information should be free or shared.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
13
The most common form of communication between members is through the bulletin boards and newsgroups.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
14
The computer underground has their own specialized way of dressing.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
15
Downloading pornographic images involving children is a federal crime.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
16
The term ___________ was originally intended to be a complimentary recognition of one's computer skills.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
17
___________ is the oldest of the electronically distributed computer underground publications.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
18
Those individuals who have a deeper and more technically oriented interest in the "telco" are known as ___________.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
19
In a sadomasochism chatroom, a "handle" or user nickname that begins with a capital letter indicates that the user play a ______________ in cyber-relationships.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
20
Software which has been copied and cracked on the same day that it is released for retail sale is known as _________________.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
21
The term ____________, as it is used among crackers, phreaks, and warez d00dz, indicates that a given individual is a wanna-be and not skilled as yet.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
22
A __________ is a technical name for what is commonly known as a "chat line" or "conference system."
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
23
Typing in all caps often means that someone is _________.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following is not considered a participant in the computer underground?

A) crackers
B) phreakers
C) elite
D) warez d00dz
E) both b and c
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
25
The first issue released in 1985 makes this the oldest of the electronically distributed computer underground publications:

A) Phrack Inc.
B) The Hacker Quarterly
C) Activist Times, Incorporated
D) Legion of Doom/Hackers Technical Journal
E) none of the above
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
26
Hackers prefer to be known as:

A) wizards
B) computer geniuses
C) computer wizards
D) both b and c
E) both a and c
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
27
What is not a common definition of what a hacker is?

A) a person who tries to discover sensitive information by exploring other's computers
B) an explorer of computer systems
C) a programming theorist
D) a programming master
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
28
A cracker is one who:

A) specializes in exploiting the phone system
B) specializes in breaking security on a system
C) pirates software
D) uses the programs of others to do their work
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
29
The term "lamer" is used most often by crackers, phreakers, and warez d00dz to describe individuals who:

A) consume knowledge without generating new software
B) is not skilled as yet
C) want to be like them but do not understand what it really takes to do what they do
D) are "plugged-in"
E) all of the above
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
30
Some of the methods in which the computer underground creates their own jargon are:

A) verb doubling
B) overgeneralization
C) the 'f'-convention
D) both a and b
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
31
What is not a characteristic of a cracker?

A) tend to gather in small, tight-knit, secretive groups
B) tend to develop and implement computer viruses
C) manipulates or damages computer files
D) distributes pirated commercial software
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
32
Phreaking is a term used to describe the:

A) different means of receiving telephone services without being billed by telephone companies
B) act of destroying computer files
C) act of communicating on bridges, loops, and voice mail boxes
D) abuse of the telephone network in pursuit of the latest computer game or application
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
33
What is not a characteristic of lamers, leeches, and posers?

A) very technically oriented with telephone systems
B) wanna-be
C) likely to use programs that attack and damage the computers of others
D) someone who is just getting into the computer underground
E) both a and c
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
34
Soundalike slang is:

A) used to turn a word into a question
B) the use of rhymes or puns in order to convert an ordinary word or phrase into something more
C) known as techspeak
D) all of the above
E) none of the above
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
35
All members of the computer underground share certain beliefs and norms except:

A) all information should be shared
B) the belief in the acquisition of knowledge
C) information should be free
D) the freedom to browse computer systems
E) none of the above
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
36
On a __________ callers can call in, listen to a recorded message, and then leave a message for the owner.

A) bridge
B) loop
C) telco
D) voice-mail box
E) none of the above
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
37
Which is not one of the characteristics that distinguishes the computer underground as a subculture:

A) they have a special vocabulary
B) they have a specialized way of dressing
C) behavior is learned through contacts with members of the group
D) they have a set of shared beliefs and norms
E) none of the above
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
38
Some of the basic propositions of the hacker ethic are:

A) access to computers should be unlimited and total
B) all information should be free
C) mistrust authority
D) all of the above
E) both b and c
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
39
Hackers are commonly seen by the public as:

A) those who commit the criminal or mischievous acts that involve computers
B) computer wizards
C) expert
D) enthusiast
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 39 flashcards in this deck.