A) The Law Commission
B) The Serious Crime Act
C) Computer Fraud and Abuse Act
D) Computer Misuse Act
Correct Answer
verified
Multiple Choice
A) Computer Obsession Complex
B) Internet Addiction Disorder
C) Hacker Drive Syndrome
D) Computer Addiction Disorder
Correct Answer
verified
Multiple Choice
A) male activity
B) female activity
C) African-American activity
D) elderly activity
Correct Answer
verified
Multiple Choice
A) upper-class, older Asian males living in suburban areas
B) middle-class, Black males most likely attending college
C) lower-class, white females living close to institutions with technology
D) middle-class, white males who are most likely in high school
Correct Answer
verified
Multiple Choice
A) Hegemonic masculinity
B) Boy culture
C) Misogynistic discernment
D) NaΓ―ve meritocracy
Correct Answer
verified
Multiple Choice
A) Nmap
B) Metasploit
C) Wireshark
D) Bleem
Correct Answer
verified
Multiple Choice
A) Hackers
B) Technophiles
C) War Games
D) Swordfish
Correct Answer
verified
Multiple Choice
A) Theft of proprietary/confidential information
B) Theft of computer resources
C) Systems sabotage
D) Denial of service attacks
Correct Answer
verified
Multiple Choice
A) Societal Factors
B) Masculine Environment
C) Masculine Language
D) Biological factors
Correct Answer
verified
Multiple Choice
A) drug addiction
B) dementia
C) Asperger's syndrome
D) autism
Correct Answer
verified
Multiple Choice
A) a means of global domination
B) a neutral term for software developers
C) the act of coughing after clearing dust from computer parts.
D) an innovative, free use of technology
Correct Answer
verified
Multiple Choice
A) The Mentor
B) Commander X
C) Crash Override
D) Acid Burn
Correct Answer
verified
Multiple Choice
A) computer
B) mailbox
C) phone
D) servers
Correct Answer
verified
Multiple Choice
A) labelling process
B) learning process
C) socialization process
D) cultural process
Correct Answer
verified
Multiple Choice
A) Dark web activity
B) Reddit posts
C) DEF CON attendance
D) Amount of 4chan users
Correct Answer
verified
Multiple Choice
A) Distribution of 'malicious software'
B) Systems alteration and destruction
C) Website defacement and 'spoofing'
D) Theft of computer resources
Correct Answer
verified
Multiple Choice
A) Steven Levy
B) Steve Wozniak
C) Richard Stallman
D) Linus Torvalds
Correct Answer
verified
Multiple Choice
A) Theft of proprietary/confidential information
B) Denial of service attacks
C) Theft of computer resources
D) Website defacement and 'spoofing'
Correct Answer
verified
Showing 1 - 18 of 18
Related Exams