Your textbook describes several ways in which cybercriminals can illegally access, manipulate, or steal computer data. Which of the following is NOT one of them?
A. Cybercriminals illegally transfer millions of dollars to their accounts.
B. Cybercriminals alter DNA (deoxyribonucleic acid) in records, thus hampering and sometimes destroying criminal investigations.
C. Cybercriminals often illegally enter computer systems and introduce viruses or worms.
D. Cybercriminals can alter computer records at financial, business, and educational institutions.
Answer: B
You might also like to view...
Distinguish forensic science from criminalistics
What will be an ideal response?
What is the term for the formal document charging a defendant with a crime?
What will be an ideal response?
Which ONE of the following statements does NOT correctly reflect the view of the Supreme Court concerning the rights of prisoners?
a. A prison inmate retains those First Amendment rights “that are not inconsistent with his status as a prisoner or with the legitimate penological objectives of the corrections system.” b. Prisons regulations cannot infringe the inmates’ free assembly and association. c. Prisoners must be granted the right of access to the courts. d. Prison officials have broad latitude to restrict visitation privileges if there is reason to believe that an inmate is receiving contraband being smuggled into the prison by visitors.
Which is the best interpretation of the 1991 Acevedo case?
A) Items that fall in the plain view of a lawfully present police officer may be seized and used as evidence in court. B) An officer may not search a vehicle without a search warrant. C) Officers may not move any item to get a better view of evidence otherwise hidden from view. D) An officer who has probable cause to believe that a container in a vehicle holds contraband may open the container and seize the contraband.