89%(88)78 out of 88 people found this document helpful
This preview shows page 63 - 69 out of 69 pages.
Correct Answer: c. As media and video games become more violent, crimes will become more violent. Question 4 1 out of 1 points
The Internet was originally created for which federal department? Selected Answer: b. Department of Defense Correct Answer: b. Department of Defense Question 5 1 out of 1 pointsThe Home Office attempted to model the historical trend of property crimes and found that: Selected Answer: d. all of the above Correct Answer: d. all of the above Question 6 1 out of 1 pointsA majority of children who are victims of online predator are: Selected Answer: c. 14 to 17 years old Correct Answer: c. 14 to 17 years old Question 7 1 out of 1 pointsWhat does the concept of "cultural lag" mean?
Selected Answer: a. Change takes place unevenly. Correct Answer: a. Change takes place unevenly. Question 8 1 out of 1 points___________refers to crime that is committed using a computer. Selected Answer: c. Cybercrime Correct Answer: c. Cybercrime Question 9 1 out of 1 points________________ is a view that illegal and potentially dangerous experimentation is a necessary part of the computer training for a creativenext generation of hackers. Selected Answer: a. Hacker's ethics Correct Answer: a. Hacker's ethics Question 10 1 out of 1 points
The future of crime depends on: Selected Answer: d. All of the above. Correct Answer: d. All of the above. Question 11 1 out of 1 pointsIn the future, a multitude of criminal groups will capitalize on the demand for: Selected Answer: b.drugs Correct Answer: b.drugs Question 12 1 out of 1 pointsAccording to the FBI, the highest financial losses were attributed to: Selected Answer: a. Nigerian letter scams Correct Answer: a. Nigerian letter scams Question 13 1 out of 1 points_________ integrates existing court, police, and FBI records into an off-the-shelf street map program that gives investigators visual leads on
whose doors to knock on first for valuable information on current cases or even emerging threats. Selected Answer: b. Project Pinpoint Correct Answer: b. Project Pinpoint Question 14 1 out of 1 pointsA bot-herder can do which of the following with compromised computers: Selected Answer: d. All of the above Correct Answer: d. All of the above Question 15 1 out of 1 pointsWhich of the following may be used to tackle crime in the twenty-first century? Selected Answer: b. Electronic tagging Correct Answer: b. Electronic tagging Question 16 1 out of 1 pointsIt is estimated that ______ percent of computer crimes are committed by "insiders" or employees.
Selected Answer: c. 80 Correct Answer: c. 80 Question 17 1 out of 1 pointsIn 2006, the FBI's Internet Crime Complaint Center found that ____________ was the most popular reported offense. Selected Answer: d. Internet auction fraud Correct Answer: d. Internet auction fraud Question 18 1 out of 1 pointsWhy is botnet crime a type of cybercrime that is difficult to fight?