Match the following crimes with their definitions
1. Computer crime a. It encompasses abuses and misuses of computer systems or computers connected to the Internet that result in direct and/or concomitant losses.
2. Cyber crime b. It is defined as any criminal act in which a computer is involved, even peripherally.
3. Digital crime c. A generic term that denotes any criminal act, both Internet and non-Internet activity, which has been facilitated by computer use, and includes theft of components, counterfeiting, digital piracy or copyright infringement, hacking, and child pornography.
4. Phreaking d. It includes any criminal activity that involves the unauthorized access, dissemination, manipulation, destruction, or corruption of electronically stored data.
5. Computer-related crime e. It is a criminal activity in which telecommunications systems are manipulated and ultimately compromised.
Answer: 1. c
2. a
3. d
4. e
5. b
You might also like to view...
Your new volunteer position is to work with middle school youth in the computer lab. The Volunteer Coordinator has asked if you would be available to answer student questions during today's lab session. Becky wants to know if it is possible to add effects similar to the effects artists use when they paint. You tell her it is, and direct her to what tool?
a. the Color button b. the Pictures button c. the Slide Sorter view d. the Artistic Effects button
When you need to create a form to match a paper form that you are already using-or when you need to create a form that doesn't match the appearance of a form that you can create with a form tool or the Form Wizard-you can create a blank form in Query view.
Answer the following statement true (T) or false (F)
Which of the following is a Foundstone forensic tool for finding streamed files?
a. LNS b. Psexec c. Netcat d. Sfind
Explain the rules that apply to using domain names.
What will be an ideal response?