Answers to Multiple-Choice and Fill in the Blanks Questions

Chapter 1 Answers

Multiple-Choice

1. Which of the following best defines computer forensics?

Answer: B. Computer forensics is the use of digital evidence to solve a crime.

2. A Chain of Custody form is used to document which of the following?

Answer: C. Anyone who has been in contact with evidence in a case.

3. Which of the following can be of evidentiary value to a computer forensics examiner?

Answer: D. All of the above.

4. Which of the following statements best describes a bit-stream imaging tool?

Answer: D. Both A and B are correct.

5. Which of the following are benefits of e-mail evidence?

Answer: D. All of the above.

6. Which of the following statements is not true about photo images?

Answer: B. Images cannot be easily found using bit-stream imaging tools, like FTK.

7. Which of the following terms best describes hiding, altering, or destroying evidence related to an investigation?

Answer: A. Spoliation of evidence.

8. The Computer Analysis and Response Team (CART) is a unit of which government agency?

Answer: B. FBI.

9. Which of the following acts established the Department of Homeland Security and mandated that the United States Secret Service establish Electronic Crime Task Forces nationwide?

Answer: D. The U.S. PATRIOT Act.

10. Which of the following is not true about Regional Computer Forensics Laboratories (RCFLs)?

Answer: A. RCFLs can be used by criminal defense lawyers.

Fill in the Blanks

1. An algorithm is a set of steps used to solve a problem.

2. Computer forensics is the use of digital evidence in a criminal investigation.

3. Computer security is the prevention of unauthorized access to computers and their associated resources.

4. A defendant can prove his innocence with the use of exculpatory evidence.

5. The process of scrambling plaintext into an unreadable format using a mathematical formula is called encryption.

6. The world’s largest international police organization is called INTERPOL.

7. Short-term, volatile memory, the contents of which disappear when a computer is powered down is called random access memory.

8. A skimmer is a device used to capture the information stored in the magnetic stripe of an ATM, credit or debit card.

9. A web server delivers HTML documents and related resources in response to client computer requests.

10. InfraGard is a public-private agency of the FBI, which promotes the exchange of information between the private and public sectors on issues related to terrorism, intelligence, and security matters.

Chapter 2 Answers

Multiple-Choice

1. Which of the following values are found in binary?

Answer: A. 0 or 1.

2. Which of the following values are found in hexadecimal?

Answer: B. 0-9 and A-F.

3. A nibble represents how many bits?

Answer: B. 4.

4. Which of the following best describes an actuator arm on a hard disk?

Answer: D. It contains a read/write head, which modifies the magnetization of the disk.

5. What is the name of the non-volatile storage that can generally not be modified and is involved in the boot process?

Answer: D. ROM.

6. Which of the following refers to the rigid disk where files are stored magnetically? Answer: D. Platter.

7. Which of the following file systems was developed for use on the Xbox? Answer: D. FATX.

8. Which of the following contains the permissions associated with files? Answer: C. Access control list.

9. Which of the following best describes the information contained in the MFT? Answer: D. All of the above.

10. Which of the following Windows features allows the user to extend virtual memory using a removable flash device?

Answer: C. ReadyBoost.

Fill in the Blanks

1. A bit can possess one of two values: 1 or 0.

2. Hexadecimal is the base 16 numbering system, which includes numbers 0 to 9 and letters A to F.

3. A byte is comprised of eight bits and is the smallest addressable unit in memory.

4. The Master Boot Record is used by the BIOS to start the boot process.

5. Disk Geometry refers to the structure of a hard disk in terms of platters, tracks, and sectors.

6. FAT12 file system was introduced in 1980 as the first version of FAT and is the file system found on floppy disks.

7. The journal uses tracked changes to files for fast and efficient restoration of files when there is a system failure or power outage.

8. Windows Registry is a hierarchical database that stores system configuration information. The Registry is comprised of two elements—keys and values.

9. Defragmentation is the process of eliminating the amount of fragmentation in a file system to make file chunks (512K blocks) closer together and increase free space areas on a disk.

10. Event Viewer is a Windows application used to view event logs.

Chapter 3 Answers

Multiple-Choice

1. Which of the following facilitates the communication between a computer’s CPU and hard disks?

Answer: C. Disk controller.

2. Which of the following is true of a disk clone?

Answer: D. Both A and B.

3. Which of the following is true of solid state drives?

Answer: A. They have no moving parts.

4. Which of the following is volatile memory that is used for processes that are currently running on a computer?

Answer: A. RAM.

5. Which of the following refers to two or more disks, used in conjunction with one another to provide increased performance and reliability through redundancy?

Answer: D. RAID.

6. FireWire is based upon which of the following standards?

Answer: C. IEEE 1394.

7. Which of the following memory cards is most likely to be found in Sony electronics? Answer: D. Memory Stick.

8. The reflective surfaces on a CD burned flat by a laser are referred to as which of the following? Answer: A. Lands.

9. Which of the following is a high-capacity optical disc that can be used to store high-definition video?

Answer: C. BD.

10. Which of the following is a UNIX command that produces a raw data image of a storage medium, like a hard drive or magnetic tape, in a forensically sound manner?

Answer: D. dd.

Fill in the Blanks

1. Boot Camp is a utility that is included with Mac OS X 10.6 (Snow Leopard) that allows the user to run Windows operating system on an Intel-based Mac.

2. Integrated Drive Electronics is a drive interface, connector and controller, which is largely based on IBM PC standards, for devices like hard disk drives, tape drives, and optical drives.

3. Serial ATA is an interface that connects devices, like hard disk drives to host bus adapters.

4. A disk image is actually one file or a group of files that contain bit-for-bit copies of a hard drive but cannot be used for booting a computer or other operations.

5. The Host Protected Area is a region on a hard disk that will often contain code associated with the BIOS for booting and recovery purposes.

6. Garbage collection is a memory management process that removes unused files to make more memory available.

7. Fault tolerance means that if one component in a system, like a hard disk drive, fails, then the system will continue to operate.

8. A write-blocker is a hardware device that allows an individual to read data from a device, like a hard drive, without writing to that device.

9. The less reflective surfaces on a CD that have not been burned by a laser are called pits.

10. A floppy disk is a thin, flexible, plastic computer storage disc that is housed in a rigid plastic rectangular casing.

Chapter 4 Answers

Multiple-Choice

1. Which of the following fire extinguishers are suitable for electrical fires?

Answer: D. ABC.

2. Which of the following indicates the routing information for a bank branch?

Answer: C. ABA.

3. Which UNIX search utility does not use regular expressions but interprets characters literally and is therefore faster than GREP?

Answer: A. FGREP.

4. Which of the following best describes using a predetermined list of words to decrypt data or authenticate a user?

Answer: A. Dictionary attack.

5. Which of the following formats is the forensic disk image file format developed by Guidance Software?

Answer: D. E01.

6. Which of the following formats is the forensic disk image file format developed by ASRData’s Expert Witness?

Answer: C. SMART.

7. Which of the following best describes what electronically stored information (ESI) can include?

Answer: D. All of the above.

8. Which of the following organizations is an independent body that provides forensic lab guidelines and certification?

Answer: B. ASCLD/LAB.

9. Which of the following refers to the first six digits of a credit card number?

Answer: A. Issuer Identification Number.

10. Which of the following is not a forensic file image format?

Answer: D. UPS.

Fill in the Blanks

1. The open source file format, developed by Simson Garfinkel and supported by Autopsy® and Sleuth Kit® forensics software, is called Advanced Forensics Format.

2. An ATM skimmer is used to capture data from the magnetic stripe on credit cards or ATM cards.

3. A cellphone jammer is a device that prevents cellular telephone users from connecting with other cellular telephones by blocking all radio signals.

4. The programming language, developed by Guidance Software, which allows EnCase® users to create their own customized function and features in EnCase®, is called EnScript.

5. File carving is the process of identifying a file by certain characteristics, such as a file header or footer, rather than by the file extension or metadata.

6. When unneeded data is eliminated from a photo, this is referred to as lossless compression.

7. A virtual machine is a computer running software that allows for an instance of an operating system, or multiple operating systems, without making any changes to the user’s computer.

8. Uninterruptable power supply is a power supply containing a battery that will maintain power in the event of a power outage.

9. A parasite is a point-of-sale skimmer.

10. An evidence locker is a metal cabinet with individual compartments that can be locked individually.

Chapter 5 Answers

Multiple-Choice

1. Which of the following can be used to share large files with other Internet users?

Answer: A. BitTorrent.

2. IRC is the acronym for which of the following?

Answer: D. Internet Relay Chat.

3. Jabber and is the old name for an instant messaging protocol which is now called what?

Answer: C. XMPP.

4. Which of the following is the operating system developed by Google for use on mobile devices?

Answer: B. Android.

5. Which of the following includes the longitude and latitude of where a digital photograph was taken?

Answer: A. Geotag.

6. AMBER is the acronym for which of the following?

Answer: D. America’s Missing: Broadcasting Emergency Response.

7. What is the name of the unique identifier assigned by an Internet Service Provider (ISP) each time one of their clients connects to the Internet?

Answer: C. Dynamic IP address.

8. Which of the following is the name of the Trojan horse virus that uses a keystroke logger to steal bank and credit card information?

Answer: B. Zeus.

9. Which of the following could be considered spyware?

Answer: A. Persistent cookie.

10. Which of the following is a file that contains a history of websites visited using Microsoft Internet Explorer on a Windows computer?

Answer: C. index.dat.

Fill in the Blanks

1. An undercover investigation is the process used to acquire information without the individual or suspect knowing the true identity of the investigator.

2. An online proxy is when a user uses another computer to communicate with a third party, with the result that the third party cannot recognize the IP address of the originating communication.

3. XOR is a rudimentary encryption algorithm that is often found in computing.

4. Sometimes referred to as newsgroups, a usenet is an online distributed discussion board, which allows users to post messages and read postings.

5. The Real Time Crime Center is a data warehouse, developed and used by the New York Police Department’s more than 35,000 police officers to track and apprehend known and suspected criminals.

6. The Homeland Security Data Network was a network developed by Northrup Grumman that contains top-secret, classified, and unclassified information.

7. TwitPic is the name of the application that allows users to upload their photographs to Twitter.

8. An Application Programming Interface is a computer program that facilitates the interaction between two computer applications or programs.

9. An Internet Protocol address is a 32-bit number that uniquely identifies a host on the Internet.

10. A session cookie is a text file, sent to a browser, stored on a computer, and used to identify and authenticate an Internet user, which is removed when the user’s browser is closed.

Chapter 6 Answers

Multiple-Choice

1. Which time zone in the United States includes Arizona, Utah, Colorado, New Mexico, Wyoming, Idaho, and Montana?

Answer: A. Mountain Standard Time.

2. Which of the following is the standard time for computer systems?

Answer: D. Universal Time Coordinated.

3. Which of the following is a request to a service provider to retain the records relating to a suspect and is valid for 90 days before it may be extended?

Answer: B. Preservation Order.

4. Which of the following is a scientific methodology used to find keywords, patterns, or relevant content on a computer?

Answer: D. Predictive coding.

5. Which of the following refers to the practice of advancing time by one hour during the spring and then decrementing time by one hour during the fall?

Answer: B. Daylight Saving Time.

6. Which of the following witnesses will testify about his personal experience and knowledge and may not express an opinion on the ultimate issue?

Answer: B. Lay witness.

7. Which of the following witnesses will testify about his personal experience and knowledge and may express an opinion on the ultimate issue?

Answer: A. Expert witness.

8. Which of the following is added to clocks to allow for inconsistencies between the Earth’s rotation and the time recorded by our everyday devices?

Answer: D. Leap second.

9. Which of the following is the time recorded at 0° longitude and all time zones around the world are coordinated with this time?

Answer: C. Greenwich Mean Time.

10. Which of the following refers to computer glitches that can occur as a result of a leap second that is added to atomic clocks in order coordinate with the earth’s rotation?

Answer: A. Leap Second Bug.

Fill in the Blanks

1. Predictive coding is a scientific methodology used to find keywords, patterns, or relevant content on a computer.

2. The time recorded at 0° longitude is called Greenwich Mean Time.

3. The practice of advancing time by one hour during the spring, and then decrementing time by one hour during the fall is called Daylight Saving Time.

4. A lay witness testifies about his personal experience and knowledge.

5. A leap second is added to clocks to allow for inconsistencies between the Earth’s rotation and the time recorded by our everyday devices.

6. An expert witness may create an investigative report or review the findings of an investigative report and provide an interpretation of those findings based on their education, training, and knowledge.

7. Mountain Standard Time is the time zone in the United States that includes Arizona, Utah, Colorado, New Mexico, Wyoming, Idaho and Montana.

8. The computer glitches that can occur as a result of a leap second that is added to atomic clocks in order coordinate with the Earth’s rotation is referred to as the Leap Second Bug.

9. Universal Time Coordinated is an international time standard that is based on longitude and uses a 24-hour clock format.

10. An preservation order is a request by law enforcement to maintain the records of a suspect pending the approval of a subpoena or warrant.

Chapter 7 Answers

Multiple-Choice

1. The person who initiates the lawsuit and is responsible for the cost of litigation is referred to as which of the following?

Answer: B. Plaintiff.

2. Which of the following courts will hear cases relating to the distribution of a deceased individual’s assets?

Answer: D. Probate court.

3. Which of the following amendments allows an individual to freely post their opinions online, as long as those opinions do not incite violence?

Answer: A. First Amendment.

4. Which of the following Amendments protects the individual from government agents performing an illegal search?

Answer: B. Fourth Amendment.

5. Which of the following best describes a court order that requires an individual to testify or make evidence available?

Answer: D. Subpoena.

6. Which of the following is a set of rules that determine the admissibility of evidence in both civil and criminal cases in federal court?

Answer: C. Federal Rules of Evidence.

7. Which of the following states that secondary evidence, or a copy, is inadmissible in court when the original exists?

Answer: D. Best Evidence Rule.

8. Which of the following entities has the power to propose legislation and initiate legal proceedings against member states?

Answer: B. European Commission.

9. What is the name of the court that interprets European law and is the highest court in the European Union?

Answer: A. Court of Justice of the European Union.

10. Which of the following best describes pre-trial testimony given under oath, where both defense and prosecution attorneys are present?

Answer: A. Deposition.

Fill in the Blanks

1. A group of people put under oath to hear arguments at trial and render a verdict of guilty or not guilty is referred to as a jury.

2. The Bill of Rights refers to the first 10 Amendments to the U.S. Constitution.

3. The Fourth Amendment means that a defendant is not required to take the witness stand.

4. Fruit of the poisonous tree is a metaphorical expression for evidence acquired from an illegal search.

5. Probable cause are the conditions under which law enforcement may obtain a warrant for a search or arrest when it is evident that a crime has been committed.

6. A statement other than one made by the declarant while testifying at the trial or hearing, offered in evidence to prove the truth of the matter asserted, is called hearsay.

7. The Daubert test means that evidence does not necessarily have to have general acceptance by the scientific community but does need to meet the requirements of FRE 702.

8. Discovery is the pre-trial phase in which both parties in a civil lawsuit must share evidence when requested, by means of interrogations, depositions, documents, and subpoenas from parties not part of the lawsuit.

9. Curtilage is the name given to the property surrounding a house.

10. Stingray is the generic name given to a device that acts like a cellphone tower to locate criminal suspects but can also be used to locate people in disaster areas, such as earthquakes.

Chapter 8 Answers

Multiple-Choice

1. Which of the following best describes malware that is disguised as a legitimate application or program?

Answer: C. Trojan.

2. Which of the following has a primary function of serving up HTML documents?

Answer: A. Web server.

3. What is the name of the folder in the Windows system folder that contains files used in the boot process and regularly opened by other programs?

Answer: D. Prefetch.

4. Which layer of the OSI Model can be viewed as closest to the user view?

Answer: B. Application layer.

5. Which layer of the OSI Model defines the wires that electrical impulses flow through involved in Internet communication?

Answer: D. Physical layer.

6. Which of the following is a protocol for connectionless data transmission on packet-switched internetworks? Its header has 14 fields. This protocol uses 32-bit addresses, which are usually represented in four octets of dotted decimal notation.

Answer: B. IPv4.

7. Which of the following enables a NIC to listen to communications broadcast on a network regardless of the intended recipient?

Answer: C. Promiscuous mode.

8. Which of the following defines the standard format for electronic mail?

Answer: C. SMTP.

9. What is the name of the folder in the Windows system folder that contains files used in the boot process and regularly opened by other programs?

Answer: D. Prefetch.

10. Which of the following organizations is responsible for the allocation of IP addresses globally?

Answer: C. IANA.

Fill in the Blanks

1. A packet is a block of data used in communications across the Internet.

2. Transmission Control Protocol is a communication standard that is used in conjunction with the Internet.

3. An Intrusion Detection System is hardware or software used to monitor network traffic for malicious activity.

4. User Datagram Protocol is a connectionless communication protocol that has limited packet recovery functionality and operates at the transport Layer.

5. Address Resolution Protocol is a method by which the network layer (Layer 3) of the OSI is linked to the data link layer (Layer 2).

6. A Browser Help Object is used to add functionality to a web browser and, the object starts every time the user opens the browser.

7. Dynamic Link Library files are Windows system files that contain procedures and drivers that are executed by a program.

8. An advanced persistent threat is a sophisticated, relentless, coordinated attack on a computer network with the goal of stealing intellectual property.

9. Packet sniffers are used to capture data packets on a wireless or wired network.

10. HyperText Transfer Protocol is a standard for requests and responses between a client and a server.

Chapter 9 Answers

Multiple-Choice

1. The equipment found at a cell site that facilitates the communication of a cellphone user across a cellular network is best described as which of the following?

Answer: B. Base Transceiver Station.

2. Which of the following best describes the role of the Base Station Controller?

Answer: C. Both A and B are correct.

3. Which of the following are details used by telecommunications carriers for billing purposes and can include phone numbers called, duration, dates, and times of calls and cell sites used?

Answer: D. Call detail records.

4. Which of the following will typically not be found on a GSM cellphone?

Answer: D. MEID.

5. The first three digits of the IMSI are referred to as which of the following?

Answer: A. Mobile Country Code.

6. Which of the following is a portable wireless router that provides Internet access for up to five Internet-enabled devices and communicates via a cellular network?

Answer: D. Mi-Fi.

7. Which of the following is a high mobility broadband communication that is suitable for use on trains and in other vehicles?

Answer: D. 4G LTE.

8. Which of the following is an international standard for signal communications, which uses TDMA and FDD (Frequency Division Duplex) communication methods?

Answer: A. GSM.

9. Which one of the following directories contains a list of contacts (names and telephone numbers) saved by a subscriber on a SIM Card?

Answer: D. EF_ADN.

10. Which of the following mobile operating systems is an open source operating system based on the Linux 2.6 Linux kernel and is owned by Google?

Answer: B. Android.

Fill in the Blanks

1. A cell is the geographic area within a cellular network.

2. A Mobile Switching Center is responsible for switching data packets from one network path to another on a cellular network.

3. A soft handoff is when a cellular communication is conditionally handed off from one base station to another, and the mobile equipment is simultaneously communicating with multiple Base Transceiver Stations.

4. An International Mobile Equipment Identity number uniquely identifies the Mobile Equipment or handset.

5. The database that contains information about a roaming subscriber is referred to as a Visitor Locator Register.

6. The Equipment Identity Register is used to track IMEI numbers and decide whether an IMEI is valid, suspect, or perhaps stolen.

7. Integrated Digital Enhanced Network is a wireless technology developed by Motorola, which combines two-way radio capabilities with digital cellphone technology.

8. Forbidden Public Land Mobile Network refers to cellular networks that a subscriber attempted to connect to but was not authorized to connect.

9. A Personal Unlock Key (PUK) is a code that is available from the carrier and allows a user to remove the PIN protection from the SIM Card.

10. A Public Safety Access Point is a call center that receives emergency requests from the public for police, medical, or firefighter services.

Chapter 10 Answers

Multiple-Choice

1. Which of the following takes data from a digital camera’s image sensor to create an unprocessed or minimally processed image?

Answer: D. RAW.

2. Which of the following refers to the process of removing unwanted portions of an image?

Answer: A. Cropping.

3. Which of the following is the prefix for digital images found on a Nikon camera?

Answer: B. DSCN.

4. A megapixel has how many pixels?

Answer: D. 1,000,000.

5. Which of the following is not an example of a raster graphic?

Answer: C. .eps.

6. Which of the following is an open standard RAW image format for digital photographs that was developed by Adobe?

Answer: A. DNG.

7. Which of the following is the smallest element of a raster image, which can be either a dot or a square?

Answer: C. Pixel.

8. Which of the following is a raster image file format that uses lossless data compression?

Answer: A. Tagged Image File Format (TIFF).

9. Which of the following is an organization that was founded by the FBI and publishes standards for the use of digital and multimedia evidence in the justice system?

Answer: D. SWGIT.

10. Which of the following is the root directory found in the file system of a digital camera that contains a series of subdirectories containing digital images?

Answer: C. DCIM.

Fill in the Blanks

1. The Joint Photographic Experts Group file format is the most common picture file found on a digital camera, smartphone, or tablet.

2. When compression causes a reduction in picture quality, this is referred to as lossy.

3. A raster graphic is a pixelated image associated with pictures found on a computer or retrieved from a digital camera.

4. A vector graphic is comprised of curves, lines, or shapes based on mathematical formulae rather than pixels.

5. The Design rule for Camera File system was developed by the Japan Electronic Industry Development Association (JEIDA) to facilitate the exchange of images between digital still cameras and other devices for viewing digital photographs.

6. Color balancing describes the process of adjusting colors in an image to render them to more accurately reflect the original scene when the photograph was taken.

7. A Bitmap Image File is a raster image file format that is generally associated with a Windows PC.

8. Brightness adjustment is used to make an image lighter or darker in order to make the image easier to view.

9. A digital photograph is an image taken with a camera and stored as a computer file.

10. Exchangeable Image File Format is the metadata associated with digital pictures.

Chapter 11 Answers

Multiple-Choice

1. Which of the following devices includes a hard drive for backing up data?

Answer: B. AirPort Time Capsule.

2. Which of the following is also referred to as IEEE 1394 and allows for high-speed data transfer?

Answer: A. FireWire.

3. Which of the following is a feature of Mavericks OS X that allows the user to organize files with keywords?

Answer: D. Tags.

4. Which of the following uses Bluetooth Low Energy to identify the location of a user?

Answer: C. iBeacon.

5. Which of the following allows the user to restore iPhone settings to the original factory settings?

Answer: A. Recovery Mode.

6. Which of the following stores all of the user’s online passwords, using 256-bit AES encryption, on approved Macs and iOS devices registered to the user?

Answer: D. iCloud Keychain.

7. Which of the following is a virtual file for Mac OS that will grow in size as more files are added?

Answer: D. Sparse image.

8. Which of the following is a feature for the Apple Mac user to see incoming messages, respond to FaceTime requests or Website alerts without exiting an application?

Answer: B. Notifications

9. Which of the following is an object-oriented programming language that is based on the C language and was developed in the early 1980s by NeXT?

Answer: D. Objective-C.

10. Which of the following is a feature found in Mac OS X that quickly finds files, folders, and applications as soon as the user starts typing a name in the search field?

Answer: A. Spotlight.

Fill in the Blanks

1. Apple Configurator is the framework for enterprise deployment of the iPhone, iPad, and iPod.

2. FileVault is a volume encryption tool developed by Apple for use with Macintosh computers.

3. Hierarchical File System is the file system that was developed by Apple in 1985 to support its hard disk drive.

4. Location Services is a user preference that enables an iOS device, and a variety of applications running on the device, to determine your position based on cell sites, GPS, and Wi-Fi hotspots.

5. Recovery Mode allows the user to restore his iPhone settings to the original factory settings.

6. Sleepimage is the name of the file that is a copy of the contents of RAM that is copied to the computer’s hard drive when the computer goes into hibernate mode.

7. Vacuuming is a cleanup feature associated with SQLite databases that will permanently erase deleted records or tables.

8. Boot Camp is a tool which enables an Intel-based Macintosh to run multiple operating systems.

9. A iBeacon uses Bluetooth Low Energy (BLE) for identifying the location of a user.

10. Property Lists are configuration files found on a computer running the Mac operating system.

Chapter 12 Answers

Multiple-Choice

1. Which of the following best describes sending a sexually explicit message via MMS on a cellphone?

Answer: D. Sexting.

2. Which of the following refers to someone who advocates for herself and does not use legal representation?

Answer: A. Pro se.

3. Which of the following describes convincing a person to provide confidential information with the intention of later publicizing the information to embarrass the person?

Answer: A. Tricking.

4. Much like a blog, this online service is used to post hateful comments about peers or teachers that people dislike.

Answer: B. Bash board.

5. Which of the following terms refers to all members of an appellate court hearing an argument rather than just the required quorum?

Answer: A. En banc.

Fill in the Blanks

1. When an individual publishes confidential personal information with others online, or in an email, to embarrass another individual, it is known as outing.

2. A group that organizes to physically harm another person, and then video the event to share with others is involved with happy slapping.

3. Impersonation is when a person breaks into another person’s account and pretends to be that person.

4. Arguing online with another person using obscenities is called flaming.

5. When peers are asked to rank who they believe to be the ugliest in the class online, the peers are asked to contribute to an online poll.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.171.20