California Cyberbullying Laws Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is a program used to access the internet?

  • Spooling
  • Phishing
  • Search Engine (correct)
  • Wireless Carrier

What is the term for a website that allows users to be part of a virtual community?

  • Phishing
  • Search Engine
  • Social Network (correct)
  • Spooling

What is the term for a globally connected network?

  • Phishing
  • Worldwide Web (correct)
  • Spooling
  • Search Engine

What is the term for an internet connection without a cable or wire?

<p>Wireless Connections (C)</p> Signup and view all the answers

Which division within the LAPD is primarily responsible for investigating unauthorized computer accesses?

<p>Computer Crimes Unit (B)</p> Signup and view all the answers

What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?

<p>To assist officers in identifying computer-related crimes and terminology (B)</p> Signup and view all the answers

Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?

<p>In LAPD E-Forms on the Department's Local Area Network (LAN) (B)</p> Signup and view all the answers

Which section of the California Penal Code addresses crimes involving unauthorized computer access, commonly referred to as 'hacking'?

<p>Section 502(c) (D)</p> Signup and view all the answers

What is the term used to describe the act of impersonating another person through electronic means for the purpose of harming, intimidating, threatening, or defrauding another person?

<p>False Personation (C)</p> Signup and view all the answers

Which section of the California Penal Code covers the crime of Cyber Stalking?

<p>Section 646.9 (A)</p> Signup and view all the answers

In what circumstances would the Computer Crimes Unit handle a Grand Theft or Petty Theft investigation?

<p>When the theft involves file encrypting ransomware (B)</p> Signup and view all the answers

Which organization operates the Internet Crime Complaint Center (IC3)?

<p>Federal Bureau of Investigation (FBI) (C)</p> Signup and view all the answers

Which law enforcement agency should a victim outside of the City of Los Angeles be referred to if the suspect lives in the City of Los Angeles?

<p>Local law enforcement agency (LEA) (B)</p> Signup and view all the answers

What type of scam involves offering items for sale on online auction sites that either do not exist or selling one item to multiple buyers?

<p>Auction Fraud (C)</p> Signup and view all the answers

Which term refers to the unauthorized access to another's computer?

<p>Hacking (D)</p> Signup and view all the answers

Which of the following information is NOT requested in the text?

<p>Whether the victim downloaded their IP activity (C)</p> Signup and view all the answers

What is one of the questions that the text asks about the victim's social media account?

<p>What is the victim's account log on ID? (B)</p> Signup and view all the answers

What information is requested about the company's 'Information Technology (IT)' person?

<p>The contact information of the IT person (D)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Related Documents

More Like This

California Cyberbullying Laws
18 questions
California Cyberbullying Laws
54 questions
California Cyberbullying Laws
18 questions
California Cyberbullying Laws Quiz
50 questions
Use Quizgecko on...
Browser
Browser