Criminal Justice Chapter 18 Quiz
In which part of the world does software piracy appear to be most common?
Asia
A law enforcement agency that wants to compare a DNA profile they obtained from a crime scene with other DNA profiles around the country would use which of the following national database
CODIS
BLANK technology users with real-time fact-based information that can be accessed during real-world activity
augmented reality
BLANK includes criminal offenses committed through the use of altered genetic material
biocrimes
BLANK involves recognizing people by physical characteristics and personal traits
biometrics
BLANK applies scientific techniques to the detection and evaluation of criminal evidence
Criminalistics
Which biometric technique is considered nearly infallible from a scientific point of view and is increasingly preferred by criminal justice experts as a method of identification
DNA analysis
Which of the following biocrimes would be considered bioterrorism?
Infecting food crops with toxins
BLANK attempts to duplicate the decision-making processes used by skilled investigators in evidence analysis and pattern recognition
expert systems
A crime that employs advanced or emerging technology in its commission is known as a cybercrime
false
Alphonse Bertillion pioneered the use of fingerprints to identify offenders
false
Currently, law enforcement agencies are not permitted to collect DNA samples from criminal suspects who have been arrested for serious crimes until after they have been convicted
false
Forensic entomology techniques may be used to reconstruct the likeness of a decomposed or dismembered body
false
HITMAN is the latest technology used by the FBI to track and capture mafia-related criminals
false
The Department of Homeland security is particularly concerned about the possibility that weapons of mass destruction may enter the U.S. through our nation's airports
false
The U.S. has one of the highest rates of software piracy in the world
false
The most likely way for a criminal to break through a computer network's security system is by using a hacker with advanced programming skills
false
biometrics is an advanced technique designed to help determine the cause of injury or death
false
Which of the following is an example of an early form of biometric technology used to identity individuals?
fingerprinting
Which criminalistics technique is used to reconstruct the likeness of a decomposed or dismembered body?
forensic anthropology
The study of insect behavior to determine the time of death of a corpse is called
forensic entomology
BLANK is a category of cybercrime that includes stealing trade secrets or copyrighted information
information piracy
BLANK includes computer worms and Trojan horses
malware
Illegally copying a software program is known as software
piracy
The department of Homeland Security is particularly concerned that weapons of mass destruction and other contraband useful to terrorists might enter the U.S. in which way?
seaport shipping containers
In criminal justice, BLANk are particularly significant because they may create perceived injustices
sentinel events
BLANK is a nontechnical type of cyber intrusion that involves tricking people into breaking security procedures, such as persuading them to give out password details
social engineering
Which of the following is not a condition under which the procedures established by the Innocence Protection Act require a court to order DNA testing?
the statute of limitations for the underlying offense has not yet expired
What was the purpose of the SMILECon conference fro police officers?
to train police in the use of social media
BLANK technology is used to search cargo and luggage for particles left behind when narcotics and explosive contraband are packaged and handled
trace detection
Augmented reality provides information in real time
true
CODIS is a DNA database that allows law enforcement agencies to compare DNA profiles to identify suspects or link serial crimes
true
DNA analysis can prove either guilt or innocence
true
Illegally harvesting medical organs for transplantation is a type of biocrime
true
Social networking technologies can backfire and harm police during tactical situations
true
The Council of Europe cybercrime treaty focuses on standardizing cybercrime laws around the world
true
The most expensive security incidents involve financial fraud
true
The police shooting in Ferguson of teenager Michael Brown is an example of a sentinel event
true
The use of technology in the service of criminal investigation, the application of scientific techniques to the detection and evaluation of criminal evidence, is known as the field of criminalistics
true
BLANK is a form of high-technology fraud that uses official-looking e-mail messages to direct victims to phony websites
Phishing
