Filters
Question type

Study Flashcards

Via the Internet,Rocco sabotages the computer system of Quik Chik'n Inc. ,a food manufacturer,with the purpose of altering the levels of ingredients of the company's products so that consumers of the food become ill.Rocco is


A) a cyberterrorist.
B) a network employee.
C) an entrapper.
D) a prosecutor.

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Mia offers Nevin,a building inspector,money to overlook the violations in her new warehouse.Nevin accepts the money and overlooks the violations. Mia is charged with the crime of bribery.The crime occurred when


A) Mia decided to offer the bribe.
B) Mia offered the bribe.
C) Nevin accepted the bribe.
D) Nevin overlooked the violations.

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

The sanctions imposed on criminal wrongdoers are the same as those applied in civil cases.

A) True
B) False

Correct Answer

verifed

verified

Luce receives from Mim a marimba stolen from Nell.To be criminally liable,Luce must know


A) Mim.
B) Nell.
C) that the marimba is stolen and Luce must intend to keep it.
D) what a marimba is.

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Quiana,an employee of Reservations-for-Less,Inc. ,pays Sven,an employee of Reservations-for-Less' competitor Travel Cheap,Inc. ,for a secret company pricing schedule.This may be


A) an effective marketing strategy.
B) commercial bribery.
C) creative legal bookkeeping.
D) money laundering.

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Gilda is accused of conspiracy to defraud.She is given an opportunity to object to the charge before a judge.She is also given the opportunity to confront and cross-examine witnesses and to present her own witnesses.These procedures represent


A) a reasonable expectation of privacy.
B) the prohibition against double jeopardy.
C) due process of law.
D) the privilege against self-incrimination.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Suzu,an employee of Ridgeline Credit Union,deposits into her personal account checks entrusted to Ridgeline through its ATM system by customers to deposit into their accounts.This is


A) burglary.
B) embezzlement.
C) larceny.
D) mail and wire fraud.

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

Criminal law spells out the duties that exist between persons or between citizens and their governments.

A) True
B) False

Correct Answer

verifed

verified

Sun-Hi,who operates a Pan-Asian restaurant in her apartment,is charged with criminal violations of the local health and building codes,state license regulations,and federal environmental statutes.The standard of proof to find a defendant who has been charged with a crime guilty is


A) a preponderance of the evidence.
B) a unanimous verdict.
C) beyond a reasonable doubt.
D) clear and convincing evidence.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Jordan reaches into Ken's pocket and takes his wallet-without his consent and without his immediate awareness.Unlike robbery,picking pockets does not involve


A) breaking and entering.
B) force or fear.
C) large amounts of cash.
D) weapons.

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Kelly is accused of receiving stolen property.She can refuse to provide information about her allegedly criminal activities


A) if she suspects the information will be used to prosecute her.
B) if the police do not promise to keep the information confidential.
C) if the information is "fruit of the poisonous tree."
D) under no circumstances.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Cameron is an accountant in the accounting department of Data Analytics Company.Cameron's son's college tuition is due within a week,or he cannot continue taking classes.To meet the due date,Cameron transfers funds from Data Analytics to a fictitious bank account,planning to repay the firm within one month.The transfer is discovered before the firm is repaid,and Cameron is arrested.What crime,or crimes,if any,has Cameron committed?

Correct Answer

verifed

verified

Cameron committed at least embezzlement....

View Answer

Cumulus Cloud Computing Services,Inc. ,suffers a security breach in its computer network.Before the company discovers the breach,the perpetrator obtains a large amount of confidential data,including corporate financial records,marketing plans,and other sensitive information.Has a crime been committed? If so,what are its elements? What steps might Cumulus take to ensure that going forward only authorized users access the data on its computers? Whose efforts-those of the federal government or Cumulus-are more important in securing the company's computer infrastructure,and why?

Correct Answer

verifed

verified

The breach of Cumulus's computer network...

View Answer

It is not a crime to defraud the public through the use of e-mail ads.

A) True
B) False

Correct Answer

verifed

verified

Corporations,like persons,can be liable for crimes.

A) True
B) False

Correct Answer

verifed

verified

It is a federal crime to use income obtained from racketeering activity to buy an interest in any enterprise.

A) True
B) False

Correct Answer

verifed

verified

Rhino causes a disturbance at Soufflé Café.He is arrested and charged with disorderly conduct,a misdemeanor.A misdemeanor is a crime punishable by


A) a fine only.
B) imprisonment up to one year.
C) imprisonment up to six months.
D) imprisonment up to ten days.

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

Individuals who are arrested must be informed of certain constitutional rights.

A) True
B) False

Correct Answer

verifed

verified

A misdemeanor is a crime punishable only by a fine.

A) True
B) False

Correct Answer

verifed

verified

Rose commits an act via e-mail against Savers Bank,a business in Texas,where the act is a cyber crime.Rose resides in Utah where the act is not a crime.Prosecution of Rose in Texas involves questions of


A) jurisdiction.
B) "maximum contacts."
C) the immunity of Internet service providers.
D) encryption.

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Showing 41 - 60 of 72

Related Exams

Show Answer