.... MC 1. (TCO 13) Text files are what type of file? 4 Points : Sequential Random access Binary Consecutive Instructor Explanation: Lecture / Chapter 13 Edit 3. MC 1. Delete (TCO 13) To create an input file object, what kind of type would you use? 4 Points : ifstream ofstream fstream instream Instructor Explanation: Lecture / Chapter 13.1 Introduction Edit 4. MC 1. Delete (TCO 13) To create an output file object, what kind of type would you use? 4 Points : ifstream ofstream fstream instream Instructor Explanation: Lecture / Chapter 13.1 Introduction Edit 5. MC 1. Delete (TCO 13) The header file that defines the classes for processing and manipulating files is called the _____. 4 Points : Instructor Explanation: Chapter 13.1 Introduction Edit 6. 7. 8. MC 2. Delete (TCO 13) What do the following statements accomplish? ifstream theFile; theFile.open( myFile.txt , ios::in); 4 Points : Opens myFile in read mode Opens myFile in append mode Creates an empty file named myFile Opens a file in input mode to write to Instructor Explanation: Lecture / Chapter 13 Edit 9. MC 2. Delete (TCO 13) What do the following statements accomplish? ofstream theFile; theFile.open( myFile.txt , ios::out); 4 Points : Opens myFile in read mode Opens myFile in append mode Creates an empty file named myFile Opens a file in input mode to write to Instructor Explanation: Lecture / Chapter 13 Edit...
Words: 2540 - Pages: 11
...The Choice Theory By Adrienne Clarey CIS170 Professor Nick George The Theory that I selected was the Choice Theory according to the choice theory the individual commits the crime because he or she make a rational choice to do so by weighing the risks and benefits of committing the act. If the risk (e.g.,) (apprehension and punishment) out weight the benefits, then the person will not commit the act, and vice versa. But in a more perfect world that might be true. I think that the criminal mind does not have a rational thought process, because even if the crime has a negative outcome the criminal will still commit the crime. I think that it is more of a personal satisfaction more than anything else. The theory is related to earlier drift theory (Matza: 1964) where people use the techniques of neutralization to drift in and out of delinquent behavior, and the Systematic Crime Theory (an aspect of Social Disorganization Theory developed by the Chicago School), where Edwin Sutherland proposed that the failure of families and extended kin groups expands the realm of relationships no longer controlled by the community, and undermines governmental controls. This leads to persistent "systematic" crime and delinquency. He also believed that such disorganization causes and reinforces the cultural traditions and cultural conflicts that support antisocial activity. The systematic quality of the behavior was a reference to repetitive, patterned or organized offending as...
Words: 592 - Pages: 3
...Crime Theories Kristyn Irene Hope Seiler Information Technology in Criminal Justice – CIS170 Strayer University Professor Carmen J. Flores November 5, 2012 There are many different theories when it comes to digital crime. Some of the theories are the choice theory, the deterrence theory, the psychological theory, the strain theory and the routine activities theory. In this paper I will discuss the one theory to be the cause of digital crime, why the theory chosen could be recognized as the most relevant in terms of being the cause of digital crime and two examples of non-digital crime that could be considered caused by this theory. The one theory that I believe that caused digital crime is the routine activities theory. This is related to crime in general by the way that the criminals had made a rational choice to commit the crime. The rational activities theory can be related to crime in general by that the criminals have the choice of what victim that they want to commit the crime on. There are many different ways to commit this crime digitally. Three of the ways are a motivated offender, a suitable target and the absence of a capable guardian. The three ways to commit a digital crime and a crime in general is the same three ways. In any crime you need a many different opportunities that need to be in place before the crime happens. The reason that rational activities theory could be recognized as the most relevant in terms of digital crime is because...
Words: 704 - Pages: 3
...Digital Computer Crime Matthew Moeller Dr. Neal Basta CIS170 April 21, 2015 Computer crimes are criminal activities that involve using a computer and a network to gain unauthorized access with the intent of deleting, altering, or damaging computer data. Due to them being extremely versatile, establishing criminal and noncriminal behavior when in use can be very difficult at times. The four most common categories of computer crimes are computer as a target, instrument of a crime, incidental to a crime, and prevalence. Computers can be the target of a criminal activity, a storage place for data about a criminal activity or the actual tool used to commit a crime. One of the most publicized crimes targeting computers involves unleashing a virus through email. A virus is a computer program that disrupts or destroys existing computer systems. A virus spreads rapidly around the world destroying computer files and costing companies and individuals millions in downtime or when the computers networks are shutdown. Most viruses are released by hackers as pranks. A hacker is someone who gains unauthorized access to a specific system. Sometimes hackers may target law enforcement or military computers and read or copy sensitive information. Some are concerned that terrorists will unleash viruses to cripple computer systems that control vital transportation networks. By using the computer as the instrument of a crime means that some other criminal objective is gained. Just like in the...
Words: 846 - Pages: 4
...Assignment 1: Digital Computer Crimes Brandy N Bledsoe Mark Stone CIS170 July 14, 2013 The computer is a doorway to a world of opportunity on the Internet that is not policed by any single law enforcement agency. The potential for financial gain along with the ease of commission has resulted in many crimes via the Internet that previously occurred via mail or over the telephone. These are the type of crimes that you do not expect as a normal everyday citizen; so many of these crimes are committed right underneath your nose. It is a wide variety of crimes that are classified under digital computer crimes. The following paragraphs will explain the four major categories of computer crimes, the most common forms of digital crime, how the computer as an instrument of a crime presents the biggest threat to the world and the roles and responses of the U.S. government. The first category of computer crimes is the computer as a target, this means that the criminal targets the network and or the device. These criminals possess the skill, technique and knowledge of computers; crimes found under this category are data alteration, network intruders, and denial-of-service as well as computer vandalism. In April of 2007, Russia launched cyber-attacks on Estonian parliament, banks, ministries and newspapers; these countries were in a disagreement over the placement of a bronze soldier statue. As a result of these attacks, the country was disabled and became crippled. The second category...
Words: 1501 - Pages: 7
...Free eChapters (FALL 2012) eChapters offer students immediate access to the first few chapters of their textbooks while they are waiting for the print book to arrive. eChapters help students to keep up with required reading and assignments until they receive their course material, without having to pay expedited shipping costs. eChapters that are available from the publisher are attainable free of charge. How do students gain access to free eChapters? Not all courses or textbooks have eChapters available. For all courses where eChapters are available, the files are located in the student’s Blackboard course shell under the Student Center. Below is a list of courses with eChapters loaded into the course shells, giving students free access as of the first day of classes. * = eChapters are forthcoming Course ID ACC100 ACC206 ACC303 ACC304 ACC305 ACC306 Text Title Accounting Principles – 9th edition Accounting Principles – 9th edition Intermediate Accounting 14e Intermediate Accounting 14e Intermediate Accounting 14e Microcomputer Applications for Accounting Excel 2010 Microsoft® Excel 2010: A Case Approach, Complete, 1st Edition, copyright 2011 SOUTH WESTERN FEDERAL TAXATION 2012: COMPREHENSIVE, 36th ed. South-Western Federal Taxation 2013: Corporations, Partnerships, Estates and Trusts, 36th Edition Cost Accounting 13th 09 ed. Advanced Accounting 4th 10th ed. Auditing & Assurance Services 13th 10 ed. Core Concepts of Government and Not for Profit Accounting 2nd ed., 2011 ed ACC...
Words: 3676 - Pages: 15