Finalquiz Logo

Q&A Hero

  • Home
  • Plans
  • Login
  • Register
Finalquiz Logo
  • Home
  • Plans
  • Login
  • Register

Home » Law » Page 271

Law

Q: The 2002 National Institutes of Health study surveyed drinking among the 8 million college and university students in the United States. What percentage of students were shown to drink in binges?a. 44% b. 55% . 40% d. 30%

Q: What is the most widely abused and misused drug in America and in many other countries? a. alcohol b. meth c. marijuana d. cocaine

Q: Medical use of marijuana is permitted in some states. Although medical users can be prosecuted under federal laws, a. in 2010 the Justice Department said it would not prosecute medical users b. in 2010 the Justice Department said it would prosecute medical users c. in 2010 the U.S. Supreme Court said it would not prosecute medical users d. in 2010 the U.S. Supreme Court said it would prosecute medical users

Q: Identify one element making wire fraud different from bank fraud, and state why the element exists.

Q: Describe the elements of a "scheme or artifice" under federal criminal statutes.

Q: State the elements of identity theft crimes.

Q: The principal laws protecting intellectual property are the federal copyright, patent, and trademark laws, as well as state trade secret laws. Define, compare, and contrast two of these types of laws.

Q: Why do fraud convictions require action done knowingly? How is this an important part of some of the federal laws regarding fraud?

Q: What constitutes "cyber crime?" How are states and the federal government addressing it?

Q: What are the differences between bribery and extortion? What are the similarities? Provide an example of a crime which includes both bribery and extortion.

Q: What is the definition of white collar crime? What are some examples of this type of crime? Can you think of any famous white collar criminals? Who are they and what was their crime?

Q: Explain what is involved in the crime known as insider trading. Why is the government interested in controlling this type of behavior?

Q: Name two federal criminal statutes frequently used to convict white-collar criminals.

Q: Giving something of value ("quid") for something else is called .

Q: Theft based on stealing a real person's identification information or theft based on creating a fictitious person's identification is called .

Q: Unlawful access to a computer or computer system with intent to commit a crime, or unlawful access to a computer or computer system maintained by a government unit is called .

Q: Criminal acts implemented through use of a computer or other form of electronic communication. is called .

Q: A person's deliberate, willful, and malicious burning of a building or personal property is called .

Q: The federal fraud act and the wire fraud act are frequently used to convict white collar criminals.

Q: The primary criminal laws aimed at property fraud are the federal copyright and patent acts and federal and state trade secret acts.

Q: The receipt of unlawful payment to an official may prove , and also could prove bribery.

Q: Congress has power to punish most large fraud schemes under the commerce clause.

Q: Fraud is in essence a crime of .

Q: Among the crimes created to protect stock markets and financial markets of the U.S. is the crime of insider

Q: A class or type of criminal conduct that has solely economic gain to the criminal as its goal is the definition of crime.

Q: The Claims Act makes it a crime to present a claim to the U.S. government that is false or fraudulent.

Q: The federal government has passed many criminal laws directed at health care fraud, such as the False Claims Statute.

Q: Using deceitful acts to cheat another is called .

Q: Linda decides she needs some furnishings for her room, but is currently out of work and out of cash. She's maxed out on her credit cards, but in the mail a solicitation from a credit card company arrives, addressed to Linda's roommate. Linda sees an opportunity, goes online to apply posing as the roommate. Two weeks later, the new credit card arrives and off goes Linda to the stores. Linda argues that since the solicitation was for her roommate, then she could not have stolen her identity (and anyway, she meant to pay her back). The police ignore Linda and charge with the use of for each time she signed a sale's slip. a. false identification b. "synthetic" identification c. theft d. mail fraud

Q: Linda decides she needs some furnishings for her room, but is currently out of work and out of cash. She's maxed out on her credit cards, but in the mail a solicitation from a credit card company arrives, addressed to Linda's roommate. Linda sees an opportunity, goes online to apply posing as the roommate. Two weeks later, the new credit card arrives and off goes Linda to the stores.Once Linda's scheme is unmasked, she would be charged witha. "true name" identity theft b. "synthetic" identity theft c. cyber identity theftd. wire identity theft

Q: Linda decides she needs some furnishings for her room, but is currently out of work and out of cash. She's maxed out on her credit cards, but in the mail a solicitation from a credit card company arrives, addressed to Linda's roommate. Linda sees an opportunity, goes online to apply posing as the roommate. Two weeks later, the new credit card arrives and off goes Linda to the stores.Given Linda's method of applying for the credit card, she may also be charged witha. cyber crime b. identity theft c. wire fraudd. video voyeurism

Q: Mary has been going through some difficult times and needs some extra money. She works as fresh produce inspector in Florida, inspecting oranges for major growers. On her word, thousands of tons of oranges would have to be discarded for failing to pass a health inspection. She suggests to the owner that she could "fix" it so he need never worry about ever failing an inspection.On the other hand, Mary, based on the information in the preface, would be charged witha. extortionb. briberyc. fruit fraudd. None of these choices

Q: Mary has been going through some difficult times and needs some extra money. She works as fresh produce inspector in Florida, inspecting oranges for major growers. On her word, thousands of tons of oranges would have to be discarded for failing to pass a health inspection. She suggests to the owner that she could "fix" it so he need never worry about ever failing an inspection. The orange grower, based on the information in the preface, would be charged with a. extortion b. bribery c. fruit fraud d. None of these choices

Q: Mary has been going through some difficult times and needs some extra money. She works as fresh produce inspector in Florida, inspecting oranges for major growers. On her word, thousands of tons of oranges would have to be discarded for failing to pass a health inspection. She suggests to the owner that she could "fix" it so he need never worry about ever failing an inspection.The quid pro quo requirement was met in this instance because Marya. exercised some influence over the grower b. acted in an official capacity as an inspector c. took some oranges home with herd. failed to protect the consumer

Q: Craig and Jamie really love music, movies, and just about anything that can be played, watched or listened to on an electronic device. Craig downloads several songs and a couple movies, paying the movie and song companies for them. He then exports them to Jamie so that she may watch and listen at her leisure. Jamie pays Craig five dollars for the bundle. Ultimately Craig was convicted of a. intellectual property fraud b. computer fraud c. federal and state laws that protect trade secrets d. federal wire fraud laws

Q: Craig and Jamie really love music, movies, and just about anything that can be played, watched or listened to on an electronic device. Craig downloads several songs and a couple movies, paying the movie and song companies for them. He then exports them to Jamie so that she may watch and listen at her leisure. Jamie pays Craig five dollars for the bundle. Craig attempts to argue that Jamie and he are educators and intended all along to use the movies and music only in the classroom where would apply. a. federal copyright act b. the "fair use" doctrine c. federal and state laws that protect trade secrets d. federal wire fraud laws

Q: Craig and Jamie really love music, movies, and just about anything that can be played, watched or listened to on an electronic device. Craig downloads several songs and a couple movies, paying the movie and song companies for them. He then exports them to Jamie so that she may watch and listen at her leisure. Jamie pays Craig five dollars for the bundle. Craig would be in violation of federal copyright act when he a. transferred them to Jamie's computer b. took five dollars in payment from Jamie c. filed to inform the record and movie companies of the sale d. failed to pay income tax on the five dollar sale

Q: Craig and Jamie really love music, movies, and just about anything that can be played, watched or listened to on an electronic device. Craig downloads several songs and a couple movies, paying the movie and song companies for them. He then exports them to Jamie so that she may watch and listen at her leisure. Jamie pays Craig five dollars for the bundle. The movies and songs which Craig downloaded would not be a violation of a. federal copyright act b. the "fair use" doctrine c. federal and state laws that protect trade secrets d. federal wire fraud laws

Q: If a person, including a firefighter, is killed or suffers serious bodily injury as a result of the fire, the charged would be a. arson b. manipulative arson c. felony arson d. aggravated arson

Q: Arson is a. the easiest of the major crimes to commit b. difficult to detect c. the hardest to prove in court d. All of these choices

Q: A person's deliberate, willful, and malicious burning of a building or personal property is called a. arson b. fire starter c. flame initiator d. fraud

Q: A program that sends multiple possible passwords to enter a computer is called a. brute force b. gale force c. wired tactics d. strong arm tactics

Q: The principal problem in counterfeiting is , many of whom live in foreign countries and are producing counterfeit money that is difficult to detect. a. casual counterfeiters b. professional craftspeople c. amateur counterfeiters d. None of these choices

Q: Sophisticated color copiers allow what law enforcement officers call " " to print thousands of crude bills.a. casual counterfeitersb. professional craftspeoplec. amateur counterfeitersd. None of these choices

Q: In , a fictitious person's name or Social Security number are used to commit the theft.a. true name identity theft b. synthetic identity theft c. cyber identity theftd. wire identity theft

Q: Theft based on stealing a real person's identification information or theft based on creating a fictitious person's identification is calleda. identity theftb. synthetic identity theftc. cyber identity theftd. wire identity theft

Q: Any person who executes a scheme or artifice to defraud the United States in excess of $1,000,000 is guilty ofa. contract fraudb. significant fraud c. large-scale fraud d. major fraud

Q: A federal officer that threatens to use his official position to prevent the official act from occurring would be guilty of a. bribery b. bank fraud c. extortion d. property fraud

Q: The makes it a crime to present a claim to the U.S. government that is false or fraudulent and known to be false or fraudulent. a. False Claims Act b. Hobbs Act c. Pendelton Act d. Government Claims Act

Q: Fraud and corruption in governemnt comes in all of the follwoing forms except a. Contract Fraud b. False Claims c. Program Fraud d. Stock Market Fraud

Q: Theft, piracy, or counterfeiting of ideas, inventions, artistic works, and the like is called a. copyright laws b. trade secrets c. wire fraud d. intellectual property fraud

Q: Which of the following elements is included in wire fraud but NOT necessary in bank fraud? a. the wire communication must cross state lines b. the bank fraud must cross state lines c. the wire communication must cross international borders d. the bank fraud must cross international borders

Q: What is the name of the crime that occurs when an actual person's identity is stolen?a. true name identity theftb. synthetic identity theft c. cyber identity theftd. wire identity theft

Q: "Outsiders," "insiders" and "tippees" are a part of what type of crime?a. insider tradingb. wire fraud c. bank fraud d. identity theft

Q: Insider trading includes a person called thea. tippee b. tipper c. rippee d. ripper

Q: It has been estimated that the yearly cost of healthcare fraud is more thana. $13 billion b. $14 billion c. $15 billion d. $16 billion

Q: The U.S. Supreme Court has held that any "scheme of artifice" must include which of the following? a. a material falsehood b. a legal falsehood c. a criminal falsehood d. a falsehood

Q: What criminal charge is often used in fraud cases? a. theft by fraud or larceny by fraud b. theft by fraud c. larceny by fraud d. None of these choices

Q: The economic cost of white collar crimes is a. enormous b. slight c. the same as many other crimes d. less than many other crimes

Q: While the "white collar" language suggests the status of the wrongdoer, most definitions of the term focus on what rather than the identity of the criminal?a. the kind of behavior made criminalb. the socio-economic status of the criminalc. the thinking of the criminald. the social impact of the criminal

Q: Unlawful access to a computer or computer system with intent to commit a crime is known as a. computer trespass b. identity theft c. wire fraud d. video voyeurism

Q: Criminal acts implemented through use of a computer are known asa. cyber crime b. identity theft c. wire fraudd. video voyeurism

Q: Which of the following consequences could result from importation of a counterfeit product into the United States?a. prosecution under the criminal code of a stateb. civil suit and sanctionsc. federal prosecution under the mail fraud statuted. All of these choices

Q: Insider trading includes using information acquired by an insider and a. not available to the public to profit in a sale of securities b. paid for through bribery c. received by extorting a government official d. gained through illegal entry

Q: What are the two types of identity theft?a. true name and synthetic identity b. false name and synthetic identity c. true name and false identityd. synthetic name and true identity

Q: Bribery under the federal statute is similar to extortion because it is not necessary in an extortion prosecution to prove an official threatened to use his official authority if a. the extortion amount was not paid b. the extortion amount was paid c. the extortion was carried out d. None of these choices

Q: The term meaning giving something of value for something else is a. quid pro quo b. pro bono c. pro rata d. quid pro bono

Q: What is required of an official regarding the quid pro quo requirement? a. exercise of some influence b. an agreement on a specific official act c. multiple exercises of some influence d. an agreement on numerous specific official acts

Q: Offering a gift or payment to another with the specific intent to obtain some unlawful particular quid pro quo for the gift or payment is known as a. bribery b. bank fraud c. health care fraud d. intellectual property fraud

Q: Which of the following is not a type of fraud? a. material fraud b. bank fraud c. health care fraud d. intellectual property fraud

Q: Jeffrey Skilling was convicted of a. counterfeiting b. "honest services" fraudulent actions c. security fraud d. health fraud

Q: The reason fraud convictions require action done knowingly is because a. fraud is a crime of deceit b. fraud causes more harm than most other crimes c. too many people would be falsely convicted otherwise d. persons committing fraud do not always know what they are doing

Q: Laws protecting intellectual property do NOT include which of the following? a. copyright laws b. trade secrets c. wire fraud d. All of these choices

Q: A scheme to deprive another of the intangible right of honest services is known as aa. scheme of artifice b. scheme of neglect c. scheme of fraudd. scheme of deprivation

Q: Books, movies, and songs are protected by the a. federal copyright act b. the "fair use" doctrine c. federal and state laws that protect trade secrets d. federal wire fraud laws

Q: Deceitful means or acts used to cheat a person, corporation, or governmental agency is known as a. fraud b. forgery c. false statement d. false claims

Q: What federal statute makes it a federal crime to defraud a financial institution that is federally insured? a. false statement b. claims c. bank fraud d. wire fraud

Q: A class or type of criminal conduct that has solely economic gain to the criminal as its goal is known as a. white collar crime b. racketeering c. wire fraud d. bank fraud

Q: The federal identity theft statute requires the defendant know the identification document belongs to another person. a. True b. False

Q: Insider trading includes using information acquired by an insider and not available to the public to profit in a sale of securities. a. True b. False

1 2 3 … 1,947 Next »

Subjects

Accounting Anthropology Archaeology Art History Banking Biology & Life Science Business Business Communication Business Development Business Ethics Business Law Chemistry Communication Computer Science Counseling Criminal Law Curriculum & Instruction Design Earth Science Economic Education Engineering Finance History & Theory Humanities Human Resource International Business Investments & Securities Journalism Law Management Marketing Medicine Medicine & Health Science Nursing Philosophy Physic Psychology Real Estate Science Social Science Sociology Special Education Speech Visual Arts
Links
  • Contact Us
  • Privacy
  • Term of Service
  • Copyright Inquiry
  • Sitemap
Business
  • Finance
  • Accounting
  • Marketing
  • Human Resource
  • Marketing
Education
  • Mathematic
  • Engineering
  • Nursing
  • Nursing
  • Tax Law
Social Science
  • Criminal Law
  • Philosophy
  • Psychology
  • Humanities
  • Speech

Copyright 2025 FinalQuiz.com. All Rights Reserved