Internet Deviance Chapter 11 Exam Questions - Deviant Behavior 11th Edition Test Bank with Answer Key by Alex Thio. DOCX document preview.
CHAPTER ELEVEN: INTERNET DEVIANCE
Multiple Choice Questions
1. Which of the following statements about cyberdeviance is true?
a) High tech has enabled law enforcement agencies to catch and convict at least 25 percent of online identity thieves.
b) The majority of identity thefts are inside jobs.
c) Most cyberporn enthusiasts are teenagers.
d) Cyberstalking is more benign and less harmful than off-line, traditional stalking.
Difficulty: 2
Page Reference: 280-281
2. The text’s author calls the Internet the “wild frontier of deviance” because
a) Internet deviance involves many violent acts.
b) Internet deviance can be carried out with impunity.
c) the Internet itself is somewhat deviant.
d) so much imaginative deviance is taking place.
Difficulty: 2
Page Reference: 288
3. Cyberdeviance can be split into two broad types, which is disrupting a computer network as a target and
a) using the computer as a tool to commit deviant acts.
b) using the computer to keep records of deviance.
c) creating a method of hacking.
c) creating a computer network to commit deviance.
Difficulty: 2
Page Reference: 289-290
4. All of the following are examples of using the computer as a tool to commit a deviant act, EXCEPT
a) cyberporn.
b) stalking.
c) identity theft.
d) cyberterrorism
Difficulty: 2
Page Reference: 289-290
5. If consumers are sent bogus e-mails that appear to come from legitimate banks or e-commerce sites in order to gain personal information, they are victims of ________.
- hacking
- plucking
- phishing
- pilfering
Difficulty: 2
Page Reference: 289-290
6. A Trojan is
a) a Greek military strategy.
b) a hacker code.
c) a name for spyware.
C) a key logger
Difficulty: 1
Page Reference: 281
7. Most identify theft is done by
a) Eastern European countries.
b) organization or corporate insiders.
c) bright teenagers.
d) cyber-pornographers.
Difficulty: 1
Page Reference: 280-281
8. Many companies are unwilling participants in identity theft. All of the following are practices that facilitate identity theft if not implemented, EXCEPT for
a) using key logging monitoring programs.
b) maintaining personnel security.
c) installing a firewall.
d) using hard-to-guess passwords.
Difficulty: 2
Page Reference: 290
9. Which of the following statements about Internet gambling is true?
a) Internet gamblers bet about $2 billion a year.
b) Internet gambling is largely legal in the United States.
c) Internet gambling is illegal throughout the world.
d) Internet gambling is illegal in the United States.
Difficulty: 2
Page Reference: 282-283
10. About ________ billion dollars are spent each year on Internet gambling.
- 1
- 6
- 12
- 50
Difficulty: 2
Page Reference: 282-283
11. Which of the following is one reason why the United States cannot stop Internet gambling?
a) the lack of law enforcement
b) the lack of laws
c) too many compulsive Internet gamblers
d) organized crime involvement
Difficulty: 1
Page Reference: 282-283
12. Legalizing Internet gambling would
a) end organized crime involvement in Internet gambling.
b) largely end Internet gambling.
c) produce needed tax revenue.
d) make Internet gambling a local and not a national problem.
Difficulty: 2
Page Reference: 282-283
13. Experts fear that if Internet gambling were legal, compulsive gamblers would probably
a) get more help.
b) gamble less.
c) go bankrupt.
d) break the law.
Difficulty: 1
Page Reference: 282-283
14. Internet gambling seems to be more convenient, solitary, and anonymous. These features also make it more ________.
a) addictive
b) deviant
c) profitable
d) legal
Difficulty: 2
Page Reference: 282-283
15. Which of the following is the most common outcome of cybersex?
a) finding a partner offline
b) masturbation
c) depression
d) better sex
Difficulty: 2
Page Reference: 283-284
16. All of following are reasons for people to take part in cybersex, except for
a) anonymity.
b) ease and convenience.
c) resolving marital problems.
d) strong sexual fantasies.
Difficulty: 2
Page Reference: 283-284
17. Cyberporn has become a big business because
a) men gain a better sexual experience than face-to-face sexual experiences.
b) more American men have become deviant.
c) organized crime is more involved.
d) customers can view porn in the privacy of their homes.
Difficulty: 1
Page Reference: 284-285
18. Net Nanny is
a) a pornographic website.
b) a way to block children’s access to pornography.
c) the name of the 1995 U.S. Senate bill that would prohibit making pornographic material available to children under 18.
d) a kind of Trojan that records keystrokes on pornographic websites.
Difficulty: 1
Page Reference: 285
19. All of the following are characteristics of cyberporn surfers, except for ________.
a) teenagers
b) whites
c) males
d) married
Difficulty: 2
Page Reference: 285-286
20. Men who visit and use child pornography sites are considered
a) innocent partakers of fantasies.
b) pedophiles.
c) normal Internet users.
d) harmless visitors.
Difficulty: 1
Page Reference: 286
21. Joe engaged in an online affair, but when he was caught by his wife, he insisted in was not an affair. He was likely to use all of the following reasons to deny guilt, EXCEPT that
a) no real sex took place.
b) it was merely fun.
c) it only involved a relationship to a machine.
d) no one was hurt by the affair.
Difficulty: 2
Page Reference: 286-287
22. Most people consider online affairs just as real as offline affairs because
a) they involve the deviant use of a computer.
b) all fantasies about sex turn into reality.
c) a physical sexual act usually takes place.
d) they can lead to marital discord and divorce.
Difficulty: 2
Page Reference: 286-287
23. All of the following are reasons why online infidelity is very appealing EXCEPT that it
a) is anonymous.
b) allows finding partners all over the world.
c) leads to real-life liaisons about 60 percent of the time.
d) is a form of escapism.
Difficulty: 2
Page Reference: 286-287
24. All of the following are true about expressing hate online, EXCEPT that the deviants
a) usually follow up their expression of hate with actual discrimination.
b) use the Internet to express their personal hatred toward a minority.
c) can begin cyberstalking the victims.
d) usually choose to hate someone they know.
Difficulty: 2
Page Reference: 289
25. The repeated harassment of others through the Internet is called ________.
a) cyberterrorism
b) a hate crime
c) cyberstalking
d) discrimination
Difficulty: 1
Page Reference: 289
26. The key factor that allows people to express their anti-minority feelings and beliefs is
a) the number of computers available.
b) anonymity.
c) freedom.
d) prejudice.
Difficulty: 2
Page Reference: 288
27. The Anti-Defamation League and the Poverty Law Center
a) track prejudice online and promote tolerance.
b) offer filtering programs to protect children.
c) enforce hate crime laws.
d) promote Internet freedom of speech.
Difficulty: 1
Page Reference: 288
28. The anonymity of the Internet discourages discrimination because it
a) discourages prejudice against minorities through education.
b) hides the group-identifying cues of gender and ethnicity.
c) hides the deviants who promote hate.
d) receives minority protections from the U.S. government.
Difficulty: 2
Page Reference: 288
29. Cyberstalking is sometimes more disturbing and dangerous than traditional stalking because
a) e-mail messages can be meaner than in-person contacts.
b) cyberstalkers have greater access to personal data.
c) most of them are recent immigrants from other countries.
d) e-mail contacts usually leads to personal confrontation.
Difficulty: 2
Page Reference: 289
30. All of the following are features of cyberstalking, EXCEPT that cyberstalkers
a) can harass people anywhere in the world.
b) can cause people serious emotional and physical harms through the spread of rumors online.
c) usually cyberstalk persons they know.
d) usually make themselves known to the persons they are tormenting.
Difficulty: 2
Page Reference: 289
31. Which of the following types of hacking are the most well known?
a) exploring networks
b) planting viruses
c) changing user names and passwords
d) manipulation of web pages
Difficulty: 2
Page Reference: 290
32. Which of the following is a relatively harmless form of hacking?
a) planting a worm
b) knocking out a phone network
c) hacking a famous person’s cellphone and posting stored photos
d) stealing money through identity theft
Difficulty: 2
Page Reference: 290-291
33. To many sociologists, hackers strongly resemble
a) career criminals.
b) cyberterrorists.
c) identity thieves.
d) juvenile delinquents.
Difficulty: 2
Page Reference: 291
34. Which of the following are NOT characteristics of hackers?
a) They are males.
b) They come from dysfunctional families.
c) They have deviant personalities.
d) They associate with a peer group.
Difficulty: 2
Page Reference: 291
35. Which of the following would be an example of cyberterrorism?
a) flying an airplane into the World Trade Center
b) the London suicide bombers
c) the disruption of the nation’s air traffic system
d) giving an impassioned speech at a local mosque
Difficulty: 2
Page Reference: 291-292
36. Which of the following is the reason why no terrorist has launched a cyberattack upon the United States?
a) The United States has good defenses against such an attack.
b) Cyberterrorists have lost interest in attacking the United States.
c) Cyberterrorists still do not possess specialized knowledge of the U.S. computer infrastructure.
d) Cyberterrorists are more interested in identity theft to raise money for offline terrorist acts.
Difficulty: 2
Page Reference: 291-292
37. A global perspective on cyberdeviance reveals that cyberdeviance is
a) mostly confined to the United States.
b) truly global and borderless.
c) largely shaped by the global economy.
d) mostly the result of offline deviance in other places in the world.
Difficulty: 2
Page Reference: 292-293
38. The most common type of cyberdeviance is ________.
a) fraud
b) pornography
c) terrorism
d) child pornography and exploitation
Difficulty: 1
Page Reference: 292
39. Two factors that have led to the tremendous rise of cyberdeviance is the
phenomenal increase in the use of computers and
a) an increased desire for deviant activities such as pornography.
b) organized crime.
c) lack of law enforcement.
d) fewer opportunities for offline deviance.
Difficulty: 2
Page Reference: 293
40. Which of the following figures reflects the yearly number of cybercrimes around the world in 2002?
- 300,000
- 700,000
- 1,300,000
- 5,100,000
Difficulty: 2
Page Reference: 293
True/False Questions
1. Law enforcement agencies have not successfully caught and convicted online identity thieves.
True
False
Difficulty: 2
Page Reference: 280-281
2. The reason the text’s author calls the Internet the new, wild frontier of deviance today is because Internet deviants are more educated and clever.
True
False
Difficulty: 1
Page Reference: 280-281
3. Trojan horses are a type of spyware programs that allow identity thieves to monitor a computer user’s key strokes.
True
False
Difficulty: 1
Page Reference: 281
4. Internet gambling is legal in several states in the United States.
True
False
Difficulty: 1
Page Reference: 282-283
5. One benefit from the legalization of Internet gambling would be the ability to more carefully regulate the industry.
True
False
Difficulty: 2
Page Reference: 282-283
6. Two reasons why many persons enjoy cybersex is because it is anonymous and can lead to real sex.
True
False
Difficulty: 1
Page Reference: 283-284
7. Most persons visiting Internet porn sites are sex-crazed teenagers.
True
False
Difficulty: 1
Page Reference: 284-285
8. Married people excuse their online affairs by saying it is a relationship with an object and not a real person.
True
False
Difficulty: 2
Page Reference: 286-287
9. Almost all Internet affairs result in the actual meeting and sex with the online partner.
True
False
Difficulty: 1
Page Reference: 286-287
10. Many people use the Internet as a tool for expressing their hate of others.
True
False
Difficulty: 1
Page Reference: 287-288
11. Internet hate and prejudice leads to more discrimination against members of minority groups.
True
False
Difficulty: 1
Page Reference: 287-288
12. Cyberstalking is more disturbing and dangerous than traditional stalking.
True
False
Difficulty: 2
Page Reference: 289
13. Cyberstalking is almost always directed toward people the deviant knows and does not like.
True
False
Difficulty: 2
Page Reference: 290
14. A serious type of cyberdeviance involves targeting a computer network through hacking and cyberterrorism.
True
False
Difficulty: 1
Page Reference: 291-292
15. Almost all hackers are interested in cracking and damaging computer networks and to otherwise show off their skills.
True
False
Difficulty: 1
Page Reference: 290-291
16. Cyberterrorists could bring the United States to its knees by disrupting or disabling its infrastructure.
True
False
Difficulty: 2
Page Reference: 291-292
17. The main reason why the United States has not experienced a cyberattack is because terrorists have lost interest in doing so.
True
False
Difficulty: 2
Page Reference: 291-292
18. Cyberspace is truly global and borderless.
True
False
Difficulty: 2
Page Reference: 292-293
19. The most widespread form of cyberdeviance around the world is pornography.
True
False
Difficulty: 2
Page Reference: 292-293
20. The two factors that explain why cyberdeviance’s meteoric rise is the phenomenal increase in computer use and the lack of law enforcement.
True
False
Difficulty: 2
Page Reference: 292-293
21. Internet gambling is illegal in the United States.
True
False
Difficulty: 1
Page Reference: 282-283
22. The majority of people who visit Internet porn sites are married white males.
True
False
Difficulty: 1
Page Reference: 284-285
23. Traditional stalking is generally more dangerous than traditional cyberstalking.
True
False
Difficulty: 1
Page Reference: 289-290
Fill-In Questions
1. Two forms of cyberdeviance are using a computer as a __________ to commit acts of deviance and disrupting a computer network as a target.
Difficulty: 1
Page Reference: 280
2. ___________ is popular because customers can view materials in the privacy of their homes.
Difficulty: 1
Page Reference: 284-285
3. One disturbing use of the Internet is expressing __________ toward some minority group.
Difficulty: 2
Page Reference: 287-288
4. _____________ is using the Internet or e-mails to repeatedly harass or threaten another person.
Difficulty: 1
Page Reference: 289-290
5. A ______ could bring a country to its knees by disrupting or disabling its infrastructure.
Difficulty: 1
Page Reference: 291-292
Essay
1. Discuss several reasons for the very rapid spread of cyberdeviance. What has led to such a dramatic increase in pornography, cyberstalking and cyberhate? What can be done, if anything, about these forms of deviance?
Difficulty: 3
Page Reference: 284-289
2. Describe your personal experiences with identity theft. Have you been a victim? What steps have you taken to protect your identity? How has fear of identity theft changed users’ feelings about the Internet?
Difficulty: 2
Page Reference: 280-281
3. Discuss the pros and cons of legalizing Internet gambling. Would doing so lead to more problems, especially for teenagers, or would it allow for more regulation of this industry?
Difficulty: 2
Page Reference: 282-283
4. Compare cyberaffairs to actual marital infidelity. Are online affairs innocent fantasies or actual betrayals of a marriage? How so?
Difficulty: 2
Page Reference: 286-287
5. Analyze the threat of a cyberterrorist attack against the United States. What would happen? How can the United States prevent such an attack, and would such prevention change the nature of the Internet? How so?
Difficulty: 2
Page Reference: 291-292
6. Cyberstalking is more harmful than traditional stalking. Discuss the validity of this statement.
Difficulty: 2
Page Reference: 289
Document Information
Connected Book
Deviant Behavior 11th Edition Test Bank with Answer Key
By Alex Thio