California Cyberbullying Laws Quiz

SelectiveEuphoria avatar
SelectiveEuphoria
·
·
Download

Start Quiz

Study Flashcards

50 Questions

Which of the following best defines phishing?

Requesting confidential information over the internet under false pretenses

What is a search engine?

A program that allows the user to search for information on the internet

What is the purpose of a web browser?

To access the internet

What is spooling?

Fraudulent emails in which the sender's email address and other parts of the email header are altered

What is a wireless connection?

An internet connection without a cable or wire

What is the purpose of a secure internet access?

To connect a device to the internet access point with a password

Which division in the LAPD has primary investigative responsibility for unauthorized computer accesses?

Computer Crimes Unit

What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?

To assist officers in identifying computer-related crimes and terminology

Who will review the directive and determine whether an audit or inspection will be conducted?

Internal Audits and Inspections Division

Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?

In LAPD E-Forms on the Department's Local Area Network (LAN)

What is the activation status of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?

Activated and currently in use

What is the subject of Administrative Order No. 4?

Computer-Related Crimes - Field Notebook Divider

Which of the following is a question that can be answered based on the given text?

What social media accounts were targeted?

Which of the following is NOT a question that can be answered based on the given text?

If the company has an 'Information Technology (IT)' person, what is that person's contact information?

Which of the following is a question that can be answered based on the given text?

What data was deleted, copied or altered?

Which of the following is NOT a question that can be answered based on the given text?

When did the victim last access the social media account?

Which of the following is a question that can be answered based on the given text?

What social media accounts were targeted?

Which of the following is NOT a question that can be answered based on the given text?

Does the victim have any server logs?

Which organization operates the Internet Crime Complaint Center (IC3)?

Federal Bureau of Investigation (FBI)

What action should be taken if a victim observes a scam or hoax on the internet but is not a direct victim of that hoax or scam?

Refer the victim to the IC3

What is the purpose of a preservation letter in a computer-related crime investigation?

To capture any subscriber information, data usage, etc., before it expires or is deleted

What is the definition of a denial of service (DOS) attack?

Taking over a website using a program installed on the computer

What is the purpose of an Internet Protocol (IP) address?

To identify a particular computer on the internet

Which organization provides access to the internet?

Internet Service Provider (ISP)

Which section of the California Penal Code addresses crimes related to unauthorized computer access, commonly referred to as 'hacking'?

Section 502(c)

Which type of crime involves the suspect tricking the victim into buying, selling, or shipping goods, money, or services through spoofed emails?

Grand Theft

Which crime involves the willful and malicious following or harassment of another person, including threats made through electronic communication?

Cyber Stalking

Which type of crime involves the impersonation of another actual person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?

False Personation

Which crime involves the use of an electronic communication device to address obscene language or threats to another person's safety or property?

Criminal Threats

Which crime involves the electronic distribution or publication of personal identifying information about another person, with the intent to place that person in reasonable fear for their safety?

Harassing Electronic Communication

What is the new limit for the Compensatory Time Off (CTO) bank for sworn employees?

800 hours

What is the purpose of the new Memorandum of Understanding (MOU)?

To address the budget deficit

Who ratified the new Memorandum of Understanding (MOU)?

All of the above

What happens when a sworn employee's CTO bank exceeds 600 hours?

They are required to take mandatory time off

Who is responsible for managing the overtime of sworn personnel?

Commanding officers (C/Os)

What is the purpose of actively monitoring overtime balances and reducing balances over 600 hours?

To ensure operational needs are met

Are special grants and reimbursable overtime activities included in the 800-hour CTO bank?

No

What is the purpose of the Administrative Order No. 7?

To address the budget deficit

What is the responsibility of sworn personnel in managing overtime?

To work with their C/Os to maintain a CTO bank at or below 600 hours

What is the purpose of the increased Compensatory Time Off (CTO) bank limit?

To address the budget deficit

According to Administrative Order No. 7, what action should be taken if a sworn employee's CTO bank exceeds 600 hours?

The employee should be given mandatory time off

Who should be contacted for questions regarding Administrative Order No. 7?

The Employee Relations Administrator

How often are C/Os provided with Sworn Overtime Monitoring Reports?

Bi-weekly

What is the purpose of providing C/Os with Sworn Overtime Monitoring Reports?

To monitor overtime balances

How much notice should be given to an employee before they are required to use CTO time?

24 hours

What should the Department consider when directing an employee to take mandatory time off?

The employee's deployment needs

What can the Department schedule in lieu of or in conjunction with vacation time for an employee with excess CTO hours?

Mandatory time off

What is the threshold for identifying a sworn employee with excessive CTO hours?

600 hours

Who is responsible for monitoring sworn employees' overtime balances?

The Commanding Officer

What type of reports can divisional timekeepers print regarding employees' balances?

Sworn Overtime Monitoring Reports

Quiz: Understanding Cyberbullying Laws in California Are you familiar with the cyberbullying laws in California? Test your knowledge with this informative quiz. Explore the jurisdiction and criteria for criminal charges, as well as the potential for civil action. Dive into the legal aspects surrounding cyberbullying in the state of California and enhance your understanding.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

California Cyberbullying Laws
18 questions
California Cyberbullying Laws
18 questions
California Cyberbullying Laws
18 questions
California Cyberbullying Laws Quiz
18 questions
Use Quizgecko on...
Browser
Browser