Info
Warning
Danger
/ Homework Answers / Computer Science / 1.Which of the following a type of fraud in which

Question

 

1.Which of the following is a type of fraud in which an auction site bidder is actually the seller with a fake identity, who bids high drive up the price?

a. Shill bidding

b. Bid shielding

c. Bid siphoning

d. None of the above

2. Which of the following occurs when a fraudulent buyer submits high bids to discourage other bidders, and then retracts the bids so people they know can get the item at a lower price?

a. Shill bidding

b. Bid shielding

c. Bid siphoning

d. None of the above

3. Which of the following occurs when a con artist lures bidders off legitimate auction sites by claiming to offer the same item at a lower price?

a. Shill bidding

b. Bid shielding

c. Bid siphoning

d. None of the above

4. Which of the following is the process to try to induce someone to provide you with personal information?

a. Cyberstalking

b. Looping

c. Phishing

d. Licensing

5. Which of the following involves using the Internet to harass, threaten, or intimidate another person?

a. Cyberstalking

b. Looping

c. Phishing

d. Licensing

6. A file on your computer that websites use to store information about you is a _________.

a. Cookie

b. Browser

c. Tab

d. None of the above

7. Which of the following is one way to protect yourself against identity theft?

a. Do not provide personal information to anyone if it is not absolutely necessary.

b. Use Firefox as your web browser.

c. Use Windows as your operating system.

d. None of the above.

8. Which country is described by experts as having the strictest cybercrime laws?

a. United States

b. Russia

c. France

d. None of the above

9. Which of these could be considered a course of conduct directed at a specific person that causes substantial emotional distress in such person and serves no legitimate purpose?

a. Phishing

b. Browsing

c. Harassment

d. None of the above

10. Why should a cybercrime law be specific?

a. To prevent defendants from finding loopholes

b. So it will be internationally recognized

c. So that multiple laws will not be necessary

d. None of the above

11. _____ theft and _______ fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception.

a. Cyber

b. Neutral

c. Identity

d. None of the above

12. The recommended Internet Explorer privacy setting is _________.

a. Medium

b. Medium high

c. Very high

d. None of the above

13. Firefox and Internet Explorer are examples of ____________.

a. Cookies

b. Web browsers

c. Websites

d. Proxy servers

14. When using a chat room, one way to protect yourself from online harassment is ______.

a. Not to use your real name

b. Not to use the chat room at night

c. Not to say too much in the chat room

d. None of the above

15. One way to protect yourself on auction sites is _____________.

a. Use a separate credit card with a low limit.

b. Bid late in the process.

c. Bid early in the process.

d. None of the above.

 

 

Solution
5 (1 Ratings )

Solved
Computer Science 1 Month Ago 2 Views
This Question has Been Answered!
Premium Content -