Ch. 11 – Deviance Flashcards

Unlock all answers in this set

Unlock answers
question
Experts fear that if Internet gambling were legal, compulsive gamblers would probably
answer
break the law.
question
Which of the following is the most common outcome of cybersex?
answer
masturbation
question
All of the following are reasons why online infidelity is very appealing EXCEPT that it
answer
leads to real-life liaisons about 60 percent of the time.
question
All of the following are characteristics of cyberporn surfers, except for ________.
answer
teenagers
question
Which of the following statements about cyberdeviance is true?
answer
The majority of identity thefts are inside jobs. (p. 281)
question
The Anti-Defamation League and the Poverty Law Center
answer
track prejudice online and promote tolerance. (p. 288)
question
The text's author calls the Internet the "wild frontier of deviance" because
answer
Internet deviance can be carried out with impunity. (p. 280)
question
All of the following are true about expressing hate online, EXCEPT that the deviants
answer
usually follow up their expression of hate with actual discrimination. (p. 287)
question
All of the following are examples of using the computer as a tool to commit a deviant act, EXCEPT
answer
Cyberterrorism
question
Cyberdeviance can be split into two broad types, which is disrupting a computer network as a target and
answer
using the computer as a tool to commit deviant acts. (p. 280)
question
All of the following are features of cyberstalking, EXCEPT that cyberstalkers
answer
usually make themselves known to the persons they are tormenting. (p. 289)
question
The key factor that allows people to express their anti-minority feelings and beliefs is
answer
prejudice. (p. 288)
question
A Trojan is
answer
a name for spyware. (p. 281)
question
Which of the following are NOT characteristics of hackers?
answer
They have deviant personalities. (p. 291)
question
Net Nanny is
answer
a way to block children's access to pornography. (p. 285)
question
A global perspective on cyberdeviance reveals that cyberdeviance is
answer
truly global and borderless. (p. 292)
question
Legalizing Internet gambling would
answer
produce needed tax revenue. (p. 282-283)
question
Which of the following figures reflects the yearly number of cybercrimes around the world in 2002?
answer
1,300,000 (p. 293)
question
Most people consider online affairs just as real as offline affairs because
answer
they can lead to marital discord and divorce. (p. 286)
question
The most common type of cyberdeviance is ________.
answer
fraud
question
Two factors that have led to the tremendous rise of cyberdeviance is the phenomenal increase in the use of computers and
answer
the lack of law enforcement.
question
To many sociologists, hackers strongly resemble
answer
juvenile delinquents. (p. 291)
question
Joe engaged in an online affair, but when he was caught by his wife, he insisted in was not an affair. He was likely to use all of the following reasons to deny guilt, EXCEPT that
answer
no one was hurt by the affair. (p. 286)
question
Men who visit and use child pornography sites are considered
answer
pedophiles
question
Most identify theft is done by
answer
organization or corporate insiders. (p. 281)
question
Which of the following would be an example of cyberterrorism?
answer
the disruption of the nation's air traffic system (p. 291)
question
Internet gambling seems to be more convenient, solitary, and anonymous. These features also make it more ________.
answer
Addictive
question
Cyberstalking is sometimes more disturbing and dangerous than traditional stalking because
answer
cyberstalkers have greater access to personal data. (p. 289)
question
About ________ billion dollars are spent each year on Internet gambling.
answer
12
question
Many companies are unwilling participants in identity theft. All of the following are practices that facilitate identity theft if not implemented, EXCEPT for
answer
using hard-to-guess passwords. (p. 281)
question
If consumers are sent bogus e-mails that appear to come from legitimate banks or e-commerce sites in order to gain personal information, they are victims of ________.
answer
phishing
question
Which of the following is a relatively harmless form of hacking?
answer
hacking a famous person's cellphone and posting stored photos (p. 290)
question
Which of the following is the reason why no terrorist has launched a cyberattack upon the United States?
answer
Cyberterrorists still do not possess specialized knowledge of the U.S. computer infrastructure. (p. 292)
question
All of following are reasons for people to take part in cybersex, except for
answer
resolving marital problems. (p. 283-284)
question
Cyberporn has become a big business because
answer
customers can view porn in the privacy of their homes. (p. 285)
question
Which of the following statements about Internet gambling is true?
answer
Internet gambling is illegal in the United States. (p. 282)
question
The repeated harassment of others through the Internet is called ________.
answer
Cyberstalking
question
The anonymity of the Internet discourages discrimination because it (ASK IN CLASS)
answer
hides the group-identifying cues of gender and ethnicity.
question
Which of the following types of hacking are the most well known?
answer
planting viruses (p. 290)
question
Which of the following is one reason why the United States cannot stop Internet gambling?
answer
the lack of law enforcement (p. 282)
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New