California Cyberbullying Laws Quiz
18 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is a program used to access the internet?

  • Spooling
  • Phishing
  • Search Engine (correct)
  • Wireless Carrier
  • What is the term for a website that allows users to be part of a virtual community?

  • Phishing
  • Search Engine
  • Social Network (correct)
  • Spooling
  • What is the term for a globally connected network?

  • Phishing
  • Worldwide Web (correct)
  • Spooling
  • Search Engine
  • What is the term for an internet connection without a cable or wire?

    <p>Wireless Connections</p> Signup and view all the answers

    Which division within the LAPD is primarily responsible for investigating unauthorized computer accesses?

    <p>Computer Crimes Unit</p> Signup and view all the answers

    What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?

    <p>To assist officers in identifying computer-related crimes and terminology</p> Signup and view all the answers

    Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?

    <p>In LAPD E-Forms on the Department's Local Area Network (LAN)</p> Signup and view all the answers

    Which section of the California Penal Code addresses crimes involving unauthorized computer access, commonly referred to as 'hacking'?

    <p>Section 502(c)</p> Signup and view all the answers

    What is the term used to describe the act of impersonating another person through electronic means for the purpose of harming, intimidating, threatening, or defrauding another person?

    <p>False Personation</p> Signup and view all the answers

    Which section of the California Penal Code covers the crime of Cyber Stalking?

    <p>Section 646.9</p> Signup and view all the answers

    In what circumstances would the Computer Crimes Unit handle a Grand Theft or Petty Theft investigation?

    <p>When the theft involves file encrypting ransomware</p> Signup and view all the answers

    Which organization operates the Internet Crime Complaint Center (IC3)?

    <p>Federal Bureau of Investigation (FBI)</p> Signup and view all the answers

    Which law enforcement agency should a victim outside of the City of Los Angeles be referred to if the suspect lives in the City of Los Angeles?

    <p>Local law enforcement agency (LEA)</p> Signup and view all the answers

    What type of scam involves offering items for sale on online auction sites that either do not exist or selling one item to multiple buyers?

    <p>Auction Fraud</p> Signup and view all the answers

    Which term refers to the unauthorized access to another's computer?

    <p>Hacking</p> Signup and view all the answers

    Which of the following information is NOT requested in the text?

    <p>Whether the victim downloaded their IP activity</p> Signup and view all the answers

    What is one of the questions that the text asks about the victim's social media account?

    <p>What is the victim's account log on ID?</p> Signup and view all the answers

    What information is requested about the company's 'Information Technology (IT)' person?

    <p>The contact information of the IT person</p> Signup and view all the answers

    More Like This

    California Cyberbullying Laws
    18 questions
    California Cyberbullying Laws
    54 questions
    California Cyberbullying Laws
    18 questions
    California Cyberbullying Laws Quiz
    60 questions
    Use Quizgecko on...
    Browser
    Browser