Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Counseling
Q:
Laura just got a new laptop but was unaware that it didn"t come loaded with Adobe reader. Her boyfriend gives her access to his employee homepage and suggests that she use one of the licenses from his office because sometimes he does work at home. What crime has Laura committed?a. identity theftb. software piracyc. copyright infringement d. internet fraud
Q:
About a month ago, Laura ordered an autographed star wars poster from a memorabilia website but she hasn"t gotten it yet despite checking with the company and inquiring with UPS. The company says they shipped the poster. What type of crime might Laura be a victim of?a. phishingb. etailing fraud c. e-piracyd. cyber war
Q:
In the field of public health, "monitoring" (in order to measure crime) is referred to as a(n):
a. index system
b. surveillance system
c. classification system
d. data system
Q:
Laura picked up her phone one evening to find that the Microsoft help desk was calling. She had been having trouble with a slow running computer for a while but hadn"t yet contacted Microsoft to get help for the problem. She was so pleased to hear that they saw her IP address online and found Malware on her computer and they were calling all of their clients to assist them in removing it. Laura had previously been a victim of a phishing scheme so she was prepared not to give any information to the help desk just in case they weren"t legitimate but they didn"t ask for her credit card information or social security number. She figured they were really going to help.The Microsoft Help desk has asked Laura to go to a website and verify her information she they can help fix her computer. She sees all of her information on that web page and she doesn"t have to give them any information. What type of crime has Laura become a victim of?a. etailing fraud b. e-piracyc. phishing d. warez
Q:
According to the textbook, which two series of crime measures seek to assess the magnitude, nature, and impact of crime in the Nation?
a. UCR and NIBRS
b. UCR and NCVS
c. UCR and Part I Crimes
d. UCR and ADAM
Q:
Which of the following is a weakness of the NCVS?
a. by using a six month time frame, you decrease the likelihood of subjects forgetting about their victimization
b. it finds out the number of unreported crimes
c. people that have been victims repeatedly in a six-month period may not recall each one
d. all of the above
Q:
Chaz joined the group that protests animal testing because he truly believes that animals should be protected fromhumankind. One piece of legislation that may help Chaz's cause isa. the endangered species act of 1993.b. clean water act of 1972.c. emergency Planning and Community act of 1986. d. oil pollution act of 1990.
Q:
Telescoping refers to:
a. when respondents may not accurately recall when an incident occurred
b. when only certain victims are interviewed
c. when only certain crimes are reported
d. none of the above
Q:
Chaz is an environmentalist to the core. He believes in reducing his carbon footprint, recycling, and being good to theearth and its inhabitants. He is a vegetarian and doesn"t think products should be tested on animals. Chaz even works for the Environmental Protection Agency.Chaz has become involved with a group that protests animal testing by setting fire to the land surrounding the testing facilities. What category of crime is Chaz involved in?a. green crime b. illegal loggingc. political terrorism d. securitization
Q:
Which of the following are not accounted for by the NCVS?
a. crimes committed upon those 12 and over in a household
b. items stolen from your car
c. crimes that have commercial establishments as victims
d. all of the above
Q:
Abraham knows the FBI is tailing him, but he doesn"t know why and believes it is illegal. What recourse does hehave as an American citizen?a. He can file a petition that his 4thamendment rights have been violated.b. None. Conducting surveillance of "lone wolves" is legal under the USAPA.c. Confront the FBI; USAPA is only allowed to monitor computers and phones. d. File a complaint with the police and get a restraining order.
Q:
Before Abraham was born his father came to the United States for a job with Microsoft. He remembers when he was a youth the death squads and the terror that was felt by all where he grew up. What type of terrorism did Abraham's father likely experience?a. state sponsored terrorism b. evolutionary terrorismc. nationalist terrorism d. political terrorism
Q:
The NVCS is based on a nationally representative sample of:
a. arrests
b. offenders
c. households
d. types of crime
Q:
The most widely known victim survey is the:
a. NIBRS
b. UCR
c. NCVS
d. DAWN
Q:
Which instrument asks people whether or not they have been the victim of a crime?
a. self reported survey
b. victim survey
c. computer-based survey
d. random survey
Q:
Abraham is an American citizen born to Saudi Arabian parents. His father used to know people that had ties to Al Qaeda but he doesn"t speak with them anymore. Recently, Abraham's his father seems to do a lot of business on the computer and telephone at night but his uncle has just arrived for a visit so they are probably just catching up with old friends. One day as Abraham is driving to school, he notices two men in a non-descript car that seem to be following him. The next week, he notices some kind of tracking device hanging from the underside of the car bumper.If Abraham's father is back in touch with the people that have ties to Al Qaeda, and may even be working withthem, which goal of terrorism do they most likely align with?a. retributive terrorism b. nationalist terrorismc. state sponsored terrorism d. revolutionary terrorism
Q:
When crimes are selectively reported to police and selectively recorded by police, this falls under which method of reporting crime?
a. UCR
b. Incident based reports
c. NCVS
d. NIBRS
Q:
Which term best describes "one or more offenses committed by the same offender, or group of offenders acting in concert, at the same time and place"?
a. victim
b. offense
c. crime
d. incident
Q:
Unlike the UCR, NIBRS does not implement:
a. a higher level of sophistication in reporting
b. the hierarchy rule
c. single time reporting
d. all of the above
Q:
It is difficult to detect and control internet pornography. Congress has struggled to create legislation that will restrict usage without violating Amendment rights.a. First b. Fourthc. Sixth d. Eighth
Q:
Which term best describes "an individual act of burglary, auto theft, or bank robbery"?
a. victim
b. offense
c. crime
d. incident
Q:
The main difference between the UCR and NIBRS is:
a. the name of the crime report
b. reporting each crime incident rather than reporting the total number of certain crimes for each law enforcement agency
c. the method of gathering data
d. nothing, they are the same report
Q:
The United States Criminal Code provides penalties for a first time illegal copyright offender of years incarceration and a fine of $250,000.a. 3 b. 5c. 7 d. 10
Q:
is the term used to describe the illegal use of the internet to buy or sell merchandise online.a. Cyber theft b. Etailing fraudc. Market manipulation d. Denial of service attack
Q:
Which of the following are considered to be crime measurement "units of analysis"?
a. households
b. businesses
c. victims of assault
d. all of the above
Q:
Which of the following are referred to as a summary based measure of crime?
a. UCR
b. NCVS
c. NIBRS
d. ADAM
Q:
It is fair to say that the UCR is:
a. a mutually exclusive measure
b. not a truly reliable measure
c. an exhaustive measure
d. all of the above
Q:
is the term used to describe efforts of organized groups to download and sell copyrighted software in violation of its license.a. Warez b. Denial of service attackc. Market manipulation d. Cyber theft
Q:
Different measures of crime tend to focus on different types of crime, primarily because:
a. not all crimes can be measured the same way with any degree of reliability or validity
b. not all crimes can be measured
c. not all definitions of crime are suitable to measurement
d. none of the above
Q:
Since 1995, the New York Electronic Crimes Task Force has charged over 1000 individuals with electronic crime losses exceeding .a. $1 million b. $10 millionc. $1 billion d. $10 billion
Q:
involves hacking secure computer networks at the enemy's most sensitive military bases, defense contractors, and aerospace companies in order to steal important data or to access their defenses.a. Cyber terrorism b. Cyber espionagec. Cyber bullying d. Cyber stalking
Q:
If a burglar breaks into a house, rapes one of the occupants, and flees in the owners' car, which one of the crimes
will be counted in congruence with the hierarchy rule?
a. vehicle theft
b. breaking and entering
c. rape
d. all of the above
Q:
In what type of cyber crime are small amounts of money subtracted from customers' accounts and added to the account of the thief?a. Phishing b. Chiselingc. Salami slice fraud d. Trojan Horse
Q:
In an incident containing multiple crimes, the most serious one is counted in the UCR. This practice is known as the:
a. hierarchy rule
b. multiple offense rule
c. seriousness clause
d. selection method
Q:
Which type of cyber vandalism appears as a benign application which actually contains codes that can damage the system operations?a. Mydoom b. Trojan horsec. Malware d. Dhiseling
Q:
Part II offenses of the UCR are counted when:
a. the crime is reported to police
b. crimes resulting in an arrest and criminal charge
c. the crime is observed by police
d. crimes lead to prosecution in the form of a trial
Q:
Which of the following types of cyber crime was not discussed in the text?a. Cyber terrorism b. Phishingc. Etailing d. Chiseling
Q:
UCR crime data is reported broken down into how many parts?
a. one whole report
b. two parts
c. four different sections
d. three parts
Q:
A is one type of malicious software program that disrupts or destroys existing programs and networks.a. Computer worm b. Computer virusc. Trojan horse d. Cyber bully
Q:
is the illegal acquisition of personal information such as bank passwords and credit card numbers, by masquerading as a trustworthy person/business in what appears to be an official electronic communication. a. Etailing fraud b. Phishingc. Cyber theft d. Touting
Q:
Which of the following is a data series that has been collected since 1930?
a. USPS
b. DAWN
c. UCR
d. NICVS
Q:
Which of the following is not a type of internet securities fraud? a. Identity theft b. Market manipulation c. Fraudulent offerings of securities d. Illegal touting
Q:
With regard to measures of crime, the specific entities that researchers collect information about are known as:
a. policies
b. procedures
c. criminal codes
d. units of analysis
Q:
is the use of computer networks for undermining the social, economic, and political system of an enemy through the destruction of infrastructure.a. Cyber theft b. Cyber vandalismc. Cyber terrorism d. Cyber movement
Q:
Which of the following is not a general purpose of measuring crime?
a. monitoring
b. agency accountability
c. deterrence
d. research
Q:
The broad questions that influence all measures of crime include all of the following except:
a. what offenses should be measured
b. what units of analysis should be used
c. why do offenders commit crimes
d. what is the research or policy purpose in measuring crime
Q:
Cyber crime is challenging because:
a. it is difficult to detect through traditional law enforcement channels.
b. it is rapidly evolving.
c. its control demands that agents of the justice system develop technical skills.
d. All of these
Q:
Which of the following is a fundamental variable in criminal justice and criminology?
a. timeliness
b. applicability
c. crime
d. arrest rates
Q:
The NIBRS has a relatively low level of sophistication and cost.
a. True
b. False
Q:
Afghanistan now supplies of the world's opium leaving the potential for eradicating global crime difficult.a. 60% b. 70%c. 80% d. 90%
Q:
Which United Nations agency is charged with addressing labor standards, employment and social protection issues and often finds themselves dealing with human trafficking issues?a. International Labor Organization b. Global Trafficking Committeec. Asian Gangs task force d. None of the above
Q:
Delinquency, victimless crimes and crimes rarely observed may be measured by self-report studies.
a. True
b. False
Q:
Methods of reporting crime are never updated and have been continually used since their inception.
a. True
b. False
Q:
Underground criminal societies based on Hong Kong control secret markets, bus routes, and are often involved in money laundering and drug traffickinga. Asian Gangs b. Yakuzac. Red Dragons d. Triads
Q:
Federal legislation that enables prosecutors to bring additional criminal or civil charges against people engaged in 2 or more acts prohibited by 24 existing federal and 8 state lawsa. ZETA b. RICOc. Travel Act d. The Federation
Q:
One important step in selecting a measure of crime is deciding what crimes will be included.
a. True
b. False
Q:
NIBRS reports each crime incident rather than the total number of certain crimes.
a. True
b. False
Q:
One reason it has proven difficult for law enforcement to combat drug cartels is:
a. They work in conjunction with transnational crime groups like the Russian Mob
b. The property where drugs are grown are disguised as migrant farms
c. They employ gangs to protect them and intimidate enemies
d. The Rico act has backfired on the U.S. government
Q:
Transnational Crime groups are often involved in;a. Human trafficking b. Gamblingc. Prostitution d. All of these
Q:
Enforcing environmental laws including the Clean Water Act of 1972 is done by?a. EWO b. EPAc. CFC d. PWA
Q:
The UCR accounts for all types of crime, even those crimes that are not observed.
a. True
b. False
Q:
For fear of being sued, governmental agencies rarely keep records that document their actions and areas of responsibility.
a. True
b. False
Q:
A single incident cannot include multiple offenses, but may have one offense and multiple offenders.
a. True
b. False
Q:
Illegal fishing is criminalized because fishermen are
a. Catching the fish before they have a chance to reproduce
b. Not paying the appropriate processing fees for the amount they catch
c. Discharging toxic materials back into the waterways after catching the fish
d. Destroying the chances for other fisherman to share in the profits
Q:
Worldwide, estimates for illegal logging activities account for products worth at least per year?.a. $1 billion b. $5 billionc. $10 billion d. $15 billion
Q:
Crimes must at a minimum have an offender, because without an offender there is no crime.
a. True
b. False
Q:
are violations of existing criminal laws designed to protect people, the environment or botha. Denial of Service attacks b. Habitat violationsc. Green Crime d. Mortgage fraud schemes
Q:
Researchers must decide on offenses, units and purposes before specifying measures of crime.
a. True
b. False
Q:
Discuss what your text refers to as "measuring crime for specific purposes." Compare these with the traditional methods.
Q:
The detection and enforcement of large scale corporate crime is primarily in the hands of?a. SEC b. USMc. DEA d. USSS
Q:
Subprime lenders made risky loans;
a. Assuming that real estate values would always be increasing
b. Resulting in mortgage companies experiencing financial distress and bankruptcy
c. Had to stave off regulators and fraudulently inflated assets and revenues
d. All of these
Q:
Discuss the improvements that have been made to UCR through the NIBRS and the Redesigned NCVS. Predict whether these changes will make a major difference in our understanding of crime in America.
Q:
Discuss the validity and reliability of self-report measures.
Q:
Identify the major efforts to gather information about drug abuse in the United States. How do these measures compare with one another? What are the strengths and weaknesses of each?
Q:
One major issue with the Subprime Mortgage Scandal was that;
a. Banks were unaware of the lending that was occurring
b. Victims caught up in the scandal would not normally qualify for bank loans
c. Banks falsified the information for their own benefit
d. None of the above
Q:
According to your text a is an investment fraud that involves the payment of purported returns to existing investors from funds contributed by new investorsa. Ponzi Scheme b. Rico Actc. Phishing Scheme d. Denial of Service attack
Q:
Compare and contrast UCR and NCVS with respect to the type of crime data they collect and how they collect it. Identify the strengths and weaknesses of each.
Q:
surveys are best at measuring crimes that do not have readily identifiable victims and those that are less observed by police.
Q:
One new crime trend facing the justice system is?a. Green Crime b. Illegal Pollutingc. Corporate enterprise crime d. Bank Securities Fraud
Q:
Bernard Madoff, Bear Stearn, and Lehman Brothers all have committed this type of crimea. Globalization b. Transnationalc. Green d. Corporate Enterprise