Computer -- I don't understand the assignment

posted by .

THREE CRITICALLY IMPORTANT QUESTIONS REGARDING------- "computer crimes, hackers, crackers, and ethics: how is computing and information-technology crime different or not different from "normal" crime?"

-----------------------------
so basically my professor asking me to write any 3 questions about that topic right??


1. What is oftentimes the objective of a cyber criminal, and what is the objective of someone committing the same crime without a computer?

2. How do punishments for convicted criminals differ depending on whether the criminal used a terminal to conduct the crime?

3. Is there a general difference in the education level of a cyber criminal versus a "normal" criminal?

Respond to this Question

First Name
School Subject
Your Answer

Similar Questions

  1. Ethics

    Are hackers ethically wrong? i know they are but just asking for your opinion. Why they hack There many different reasons, for many different hackers. Some do it to see if they can beat security protocalls, like a game. Some do it
  2. computer

    THREE CRITICALLY IMPORTANT QUESTIONS REGARDING------- "computer crimes, hackers, crackers, and ethics: how is computing and information-technology crime different or not different from "normal" crime?
  3. technology in criminal justice

    provide examples of and discuss how less-than-lethal ammunition has revolutionized the way law enforcement deals with situations of civil disobedience and unrest. In addition, explain why there is no such thing as "non-lethal ammunition." …
  4. criminology

    what are the three major kinds of crime statistics used by criminologists?
  5. English

    Let's write down what you can do with the computer. 1. I use the computer to chat with netizens in chatrooms. 2. I use the computer to do paper work. 3. I use the computer to make documents with the word processor, Excel. 4. I use …
  6. CIS 105

    I need help with the following assignment: o Distinguish between computer data represented by the state of a computer’s electrical switches and the meaningful information that is displayed to the user. I have read the course material …
  7. COMPUTER

    Write a 200- to 350-word paper that describes the distinctions of data and information and briefly explains the process a computer uses to convert data into information. • Consider the following: Computers use a completely different …
  8. White Collar Crime

    I'm writing an essay for White Collar Crime and i'm stuck! the text book i was assigned has nothing on the 3 major areas of cost associated with white collar crime!I'm just looking for resources to use to answer the first part of the …
  9. Criminal Justice/White Collar Crime

    According to the text, the broad definition of computer crime can be described as: A. hardware and software crimes. B. viruses and worms. C. espionage and embezzlement. D. hacking and denial of service. I am stumped on this one cause …
  10. Education technology

    Which of the following is a sign that your computer may have been infected with malicious code?

More Similar Questions