Criminology 12-14

¡Supera tus tareas y exámenes ahora con Quizwiz!

40. Legislation called _______________________ laws protect retailers and their employees from lawsuits if they arrest and detain a suspected shoplifter on reasonable grounds. a. merchant privilege b. booster c. right-to-protect d. service provider

ANSWER: a REFERENCES: Blue-Collar Crimes

41. Amateurs who cash bad checks because of some financial crisis but have little identification with a criminal subculture are called ______. a. naive check forgers b. systemic forgers c. systematic forgers d. simple forgers

ANSWER: a REFERENCES: Blue-Collar Crimes

63. Daniel Lee is a college professor at a mid-sized university in Maryland. He ran for city council and won in 2014 and his wife is the head of the PTA at his child's grade school. Both he, and his wife, are respected members of the community. ANSWER the following questions with this information. Dan's wife, Lisa, is caught shoplifting a purse from Macy's and is arrested. Given her social status, which of the following types of thieves would Lisa fall into? a. Snitch b. Booster c. Heel d. Fence

ANSWER: a REFERENCES: Blue-Collar Crimes

52. What was the significance of the Counterfeit Access Device and Computer Fraud and Abuse Law? a. It protected classified U.S defense and foreign relations information. b. It made identity theft a separate crime against the individual whose identity was stolen. c. It created a federal insurance program to assist victims of computer fraud. d. All of the above

ANSWER: a REFERENCES: Controlling Cybercrime

53. Which of the following is true about the Convention on Cybercrime, ratified in 2006? a. It was the first international treaty to address the definition and enforcement of cybercrime b. It has been signed by 70 nations c. It fails to address a common legal framework to eliminate jurisdictional hurdles d. All of the above

ANSWER: a REFERENCES: Controlling Cybercrime

31. The theft and/or destruction of information, resources, or funds via computers, computer networks, or the Internet. a. Cybercrime b. Organized crime c. Connected crime d. Technology crime

ANSWER: a REFERENCES: Crime in the Cyber Age

34. A term computer hackers and software pirates use to describe a game or application that is made available for use on the Internet in violation of its copyright protection. a. Warez b. Phishing c. Suarez d. Salami slice

ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit

35. The federal government has actively pursued members of the warez community through new legislation. Which of the following is one of these acts? a. Computer Fraud and Abuse Act b. Federal Lautenberg Act c. RICO Act d. Copyright Infringement Act

ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit

38. A type of computer crime which includes the unauthorized obtaining of information from a computer (hacking), including software that is copied for profit. a. Theft of information b. Manipulation c. Corporate espionage d. Skimming

ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit

63. After getting a taste for illegal activity, Jody and David decide to participate in other illegal cybercrimes. They decide to use the university listserv to email all students and faculty at the university notifying them that their account has been hacked and to email their name and password back to the sender. This is an example of ______. a. phishing b. cyber smear c. a pump and dump d. spear-phishing

ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit

64. Jody and David begin an etailing fraud scam on campus with the rest of Jody's friends on the volleyball team. Which of the following scenarios would most likely be considered etailing fraud? a. Jody and his friends purchase stereo equipment online and purchasing cheaper, but similar stereo equipment at a local store. After receiving the original purchase, they ship the cheaper version back to the online store for a full refund b. Jody obtains legitimate receipts for merchandise and enters a store, taking from the shelf the same merchandise and returns the stolen product for cash c. Jody has her friends purchase stock in a company and after purchasing at a low rate, she spread information via an online blog about the success of the company, increasing the stock price, and having her friends sell at an inflated rate d. David spread negative information about the university online in an attempt to hold the university ransom unless they agree to pay an agreed-upon sum of money for David to remove the slanderous information

ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit

48. David Smith pleaded guilty to state and federal charges and was sentenced to 20 months in prison for his 80 million dollar cyber attack in the form of a ______. a. computer worm b. Trojan horse c. slag code d. logic bomb

ANSWER: a REFERENCES: Cybervandalism: Cybercrime with Malicious Intent

49. Which of the following is false in regard to cyberbullying? a. Girls are more likely to post harmful videos or pictures, while boys are more likely to spread rumors. b. Adolescent girls are significantly more likely to have experienced cyberbullying than boys. c. Cyberbullying can happen via the computer or cellphone. d. 17 percent of students in a recent survey say they have harassed someone online.

ANSWER: a REFERENCES: Cybervandalism: Cybercrime with Malicious Intent

51. Lockhead Martin, the world's largest aerospace company, announced it detected a significant cyber attack against its information systems that was thwarted. According to the text, this is an example of _______. a. cyberespionage b. cyberspying c. cybervandalism d. cyberterrorism

ANSWER: a REFERENCES: Cyberwarfare: Cybercrime with Political Motives

56. The __________ Amendment right to free speech makes legal control of pornography quite difficult. a. First b. Second c. Fourth d. Sixth

ANSWER: a REFERENCES: Pornography

45. International trafficking in prostitution flourishes. Hundreds of thousands of children and women, primarily from _________, are abducted or lured by the promise of good jobs and, instead, end up in the sex trade in industrialized countries including the United States. a. Southeast Asia and Eastern Europe b. Western Europe and South Africa c. South Africa and Southeast Asia d. Eastern Europe and South Africa

ANSWER: a REFERENCES: Prostitution

55. ______________ involves using illegal means to cheat an organization, its consumers, or both, on a regular basis. a. Chiseling b. Notching c. Carving d. Scoring

ANSWER: a REFERENCES: White-Collar Crime

37. Catherine is a college professor who was recently appointed to chair of the department. As chair, she illegally removes small sums of money from a large number of accounts associated with the department and uses the money to fund her lavish vacations to the Africa, Asia, and Europe. This is an example of a______. a. Trojan horse b. salami slice fraud c. Ponzi scheme d. warez scheme

ANSWER: b REFERENCES: Cybertheft: Cybercrime for Profit

37. __________ refers to the rubbing against or touching of a nonconsenting adult in a crowd. a. Exhibitionism b. Frotteurism c. Pedophilia d. Voyeurism

ANSWER: b REFERENCES: Paraphilias

61. The criminal investigation division of the EPA investigates which of the following crimes? a. Mail fraud b. Wire fraud c. Illegal disposal of hazardous waste d. All of the above

ANSWER: d REFERENCES: Controlling White-Collar and Green-Collar Crime

36. Which of the following is a form of computer crime? a. Theft of information b. Corporate espionage c. Manipulation of accounts d. All of the above are computer crimes

ANSWER: d REFERENCES: Cybertheft: Cybercrime for Profit

51. What does research indicate about the effects of legalizing prostitution? a. Legalization leads to zoned areas where prostitution is cordoned off from suburban neighborhoods. b. Legalization results in lower pay but increased freedom for prostitutes. c. Legalization protects women from violence, verbal abuse, and physical injuries. d. Legalization leads to massive expansion of the trade, both legal and illegal.

ANSWER: d REFERENCES: Prostitution

36. Martha is upset at Catherine over the dinner bill the night before. Martha believes Catherine should have split the bill but she failed to pay any portion. Martha and Catherine work together at a local telemarketing center and Martha sneaks to Catherine's desk to take 20 dollars from her purse. In terms of larcenies, this would be ______. a. petty larceny b. constructive larceny c. grand larceny d. destructive larceny

ANSWER: a REFERENCES: Blue-Collar Crimes

39. Amateur shoplifter who does not self-identify as a thief but who systematically steals merchandise for personal use. a. Snitch b. Stilth c. Scout d. Fitch

ANSWER: a REFERENCES: Blue-Collar Crimes

35. Offenders who do not define themselves by a criminal role are called ______. a. occasional criminals b. transparent criminals c. situational criminals d. professional criminals

ANSWER: a REFERENCES: Blue-Collar Crimes

42. Professional check forgers who make a living by passing bad checks are called ______. a. systematic forgers b. bellowing forgers c. Abagnale forgers d. naive forgers

ANSWER: a REFERENCES: Blue-Collar Crimes

54. Which of the following is not true about pornography a. Legal restrictions have made the prosecution of possession of pornography difficult especially for material involving children b. The scientific evidence linking pornography to violence is mixed. c. Sexually explicit films make up 15-30 percent of the home rental market. d. The Court redefined its measure of obscenity in the case of Miller v. California.

ANSWER: a REFERENCES: Pornography

48. What was the significance of the Mann Act of 1925? a. It prohibited bringing women into the country for the purpose of prostitution. b. It made the possession and distribution of cocaine, a drug previously used as a pain reliever, a federal crime. c. It set the standard for obscenity in cases involving pornography. d. It made prostitution legal in three counties within the state of Nevada.

ANSWER: a REFERENCES: Prostitution

50. Prostitution is illegal in all states except Nevada where licensed and highly regulated brothels can operate as business enterprises in ______. a. rural counties b. hotel casinos c. Las Vegas and Reno d. private residences

ANSWER: a REFERENCES: Prostitution

33. According to the theory of social harm, immoral acts can be distinguished from crimes on the basis of the ____they cause. a. social outrage b. injury c. financial loss d. depravity

ANSWER: b REFERENCES: The Theory of Social Harm

34. People who seek to control or criminalize deviant behaviors in accordance with their own way of thinking are called ______. a. moralists. b. moral entrepreneurs c. power seekers d. social activists

ANSWER: b REFERENCES: The Theory of Social Harm

36. Which of the following statements is accurate? a. Societies usually encourage behaviors that lawmakers consider dangerous. b. The line between behaviors that are immoral and those that are criminal are often blurred. c. People with religious beliefs rarely engage in moral crusades. d. Most behaviors are declared criminal before they are deemed immoral.

ANSWER: b REFERENCES: The Theory of Social Harm

59. Travis Hirschi and Michael Gottfredson claim white-collar crime is relatively rare because, as a matter of course, business executives tend to hire people with ___. a. business experience b. self-control c. strong morals d. cultural values

ANSWER: b REFERENCES: Theories of White-Collar and Green-Collar Crime

52. A Ponzi scheme is one type of ______ whereby people swindle money with payments of returns earned from new investors. a. corporate crime b. white-collar fraud c. financial chiseling d. employee fraud

ANSWER: b REFERENCES: White-Collar Crime

43. A buyer and seller of stolen merchandise is often referred to as a ______. a. shark b. picket c. fence d. heise

ANSWER: c REFERENCES: Blue-Collar Crimes

43. Which of the following best depicts a phishing scheme? a. Cassandra writes a fictional column about the university he works for in an attempt to hurt enrollment after failing to earn tenure b. Jennifer spreads negative information about a company online in an attempt to draw down stock prices for her colleagues c. Kareem begins sending emails to random users about how to purchase the hot, new, Christmas toy for the season in an attempt to ascertain personal information for his use d. Tammy places deceptive information online to get unsuspecting investors interested in a stock, thus driving up the price, and allowing her to sell her shares at an inflated price

ANSWER: c REFERENCES: Cybertheft: Cybercrime for Profit

31. __________ are behaviors outlawed because they are a threat to the general well-being of society and challenge accepted moral principles. a. Moral order crimes b. Civic deviances c. Public order crimes d. Ethical deviances

ANSWER: c REFERENCES: Law and Morality

32. According to legal scholar, Morris Cohen, why should victimless crimes be criminally prohibited? a. Because then moral crusaders would not get to define the law b. Because victimless crimes are highly immoral just like "street crimes." c. Because one of the functions of criminal law is to express the public's shared sense of morality d. Because victimless crimes cause social harm and all acts that cause social harm are criminally prohibited

ANSWER: c REFERENCES: Law and Morality

41. _________is a disturbing behavior whereby men travel overseas to places such as Thailand in order to engage in illicit sexual behavior with young girls who have been sold into prostitution. a. Pedophilia tourism b. Pedophilia trafficking c. Sex tourism d. Sex trafficking

ANSWER: c REFERENCES: Prostitution

43. Which of the following is not a condition present in a commercial sexual transaction? a. Activity that has sexual significance for the customer b. Economic transaction c. Felonious violence d. Emotional indifference

ANSWER: c REFERENCES: Prostitution

52. Feminists' sexual equality view considers the prostitute a victim of ______. a. child sexual abuse b. economic circumstances c. male dominance d. personal choices

ANSWER: c REFERENCES: Prostitution

64. Gloria would most likely fit into which category of prostitute? a. Bar girl b. Brothel prostitute c. Call girl d. Street walker

ANSWER: c REFERENCES: Prostitution

57. Tying drug use to factors such as racial prejudice, low self-esteem, poor socioeconomic status, and the high levels of mistrust, negativism, and defiance found in impoverished areas describes which causal explanation of drug use? a. Social learning b. Psychological view c. Subcultural view d. Problem behavior syndrome

ANSWER: c REFERENCES: Substance Abuse

57. Which of the following is false in regard to Russian organized crime groups in the United States? a. They are involved primarily in frauds and scams. b. They are involved in health care fraud. c. They are primary players in drug trafficking. d. They are believed to be a major player in credit card fraud.

ANSWER: c REFERENCES: Transnational Organized Crime

44. Which of the following is not true about burglary? a. According to the UCR, just over 5 million burglaries now occur each year in the United States. b. The legal definition of burglary has undergone considerable change since its common-law origins. c. Most residential burglaries occur during the day. d. Those most likely to be burglarized are poor Hispanic and African American families.

ANSWER: a REFERENCES: Blue-Collar Crimes

45. The willful, malicious burning of a home, building, or vehicle. a. Arson b. Incendiarism c. Burglary d. Blowbacking

ANSWER: a REFERENCES: Blue-Collar Crimes

46. Edwin Lemert conducted one of the best-known studies on which form of larceny nearly 60 years ago? a. Check fraud b. Shoplifting c. Auto theft d. Credit card theft

ANSWER: a REFERENCES: Blue-Collar Crimes

38. Pharmacists have been known to alter prescriptions or substitute low-cost generic drugs for more expensive name brands. This is an example of which category of white-collar crime? a. Professional chiseling b. Churning c. Employee fraud d. Influence peddling

ANSWER: a REFERENCES: 319

47. Which of the following is true about shoplifting? a. Research has shown that items which play a role in the illicit drug are the ones stolen most often. b. About 45 percent of all shoplifters are professionals. c. It is estimated that the professional shoplifter makes between 500,000 and 800,000 dollars a year from their illegal activity. d. On average, about 75,000 people annually are arrested for shoplifting, down from 100,000 in the 1990s.

ANSWER: a REFERENCES: Blue-Collar Crimes

48. Which of the following is not true about auto thefts and automobiles? a. Every state requires owners to insure vehicles. b. Fewer cars are being taken today and fewer cars are being recovered than a decade ago. c. FBI records about 700,000 auto thefts per year. d. The average loss from auto theft is about 4 billion dollars a year.

ANSWER: a REFERENCES: Blue-Collar Crimes

49. The taking of goods from a retail store. a. Shoplifting b. Nicking c. Pilfering d. Pinching

ANSWER: a REFERENCES: Blue-Collar Crimes

60. Which of the following is not one of the environmental laws discussed in the text? a. Natural Gas and Anti-Fracking Act b. Clean Water Act c. Endangered Species Act d. Oil Pollution Act

ANSWER: a REFERENCES: Controlling White-Collar and Green-Collar Crime

62. Which of the following is not true in regard to deterrence strategies for white-collar criminals? a. Strategies are aimed at creating conditions that induce conformity to the law. b. Deterrence systems are oriented toward apprehension and punishments. c. Justice system personnel now consider white-collar criminals as more serious than common-law thefts. d. Both fines and penalties have been increasing.

ANSWER: a REFERENCES: Controlling White-Collar and Green-Collar Crime

32. Which of the following is not true about the "cyber age" according to the text? a. Facebook reached 10 million users in 2015. b. There are over 500 million tweets a day. c. Nearly 4 billion industries use email. d. Over 190 billion email messages are sent daily.

ANSWER: a REFERENCES: Crime in the Cyber Age

33. Malicious attacks aimed at disrupting, defacing, and destroying technology. a. Cybervandalism b. Cyberwar c. Cyberterrorism d. Cyber malware

ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit

40. Which of the following is not true in regard to drug distribution and the Internet? a. While many illegal sites exist, nearly 90 percent are certified by the National Association of Boards of Pharmacy. b. Often drugs sold on the Internet are adulterated, expired, or the wrong dose. c. Numerous websites provide prescriptions written by cyber doctors. d. There are no controls for preventing children from ordering drugs.

ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit

41. Which of the following is false in regard to denial-of-service (DoS) attacks? a. DoS attacks are not about profit or ransom, but instead about inconveniencing the targeted party b. Even respectable businesspeople have been accused of launching DoS attacks against rival businesses c. Online, offshore, gambling sites are particularly vulnerable to DoS attacks d. Many U.S organizations have been affected by DoS attacks, including New York City email accounts and Rutgers University

ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit

42. Which of the following would be an example of a cyber smear scam? a. Bill writes a fictional column about Exxon Mobile closing, hence driving down stock prices for his friends to purchase b. Jenny sends emails with embedded worms to random Gmail users to obtain personal information in attempt to make a quick profit c. Ryan steals the identity of his biology professors and using his credit card information to purchase his books for the system; afterward he quickly dumps the card to eliminate the trace d. Frank spreads rumors about his ex-girlfriend Diana, including her promiscuity, sexual orientation, and prior drug use on Instagram

ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit

45. Becky obtains a legitimate receipt from a store and returns to the store, shops, and picks up the identical item return to the service desk to get a refund. Becky has just committed _______. a. shoplisting b. entail fraud c. phishing d. mass marketing fraud

ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit

47. The creation of false emails or websites that look legitimate but are designed to gain illegal access to a victim's personal information a. phishing b. warez c. dumpster diving d. spearing

ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit

62. Jody is a 21-year-old college student from Wheeling, WV. She attends a local state university with her boyfriend, David, and the two are set to graduate next May with degrees in criminal justice. ANSWER the following questions: One of Jody's friends on the volleyball team regularly downloads music from the Internet and has gotten Jody to participate in the activity as well. Although Jody knows this is illegal, she is participating in a cybercrime called______. a. file sharing b. salami slicing c. warez d. skimming

ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit

31. Crimes that affect the environment are called ____________-collar crimes. a. green b. white c. red d. blue

ANSWER: a REFERENCES: History of Economic Crimes

33. Edward Alsworth coined this term to describe the kind of person who hides behind his or her image as a pillar of the community to get personal gain through any means necessary. a. Criminaloid b. Poacher c. Chameleon d. Situational offender

ANSWER: a REFERENCES: History of Economic Crimes

34. This eighteenth century criminal group often worked in large cities and included pickpockets and forgers. a. Skilled thieves b. Smugglers c. Poachers d. Pirates

ANSWER: a REFERENCES: History of Economic Crimes

38. Of all the commonly practiced paraphilias, which causes the general public the most concern? a. Pedophilia b. Frotteurism c. Sadomasochism d. Exhibitionism

ANSWER: a REFERENCES: Paraphilias

63. One of Gloria's regular clients likes to participate in an outlawed paraphilia that involves deriving pleasure from receiving pain from Gloria and inflicting pain on her as well. This is called _______. a. sadomasochism b. exhibitionism c. frotteurism d. voyeurism

ANSWER: a REFERENCES: Paraphilias

62. Gloria is a 22-year-old woman from Florida who is attempting to finish college. She is studying to become a nurse. She began dancing as an exotic dancer at a gentlemen's club when she turned 20 to help pay for her tuition. ANSWER the following questions. After dancing for roughly a year, Gloria heard several of the other girls talk about prostitution. Gloria believed she could make more money by being both an exotic dancer and as an escort. Her belief most likely fits the view of prostitution called the ___________. a. free choice view b. sexual equality view c. sexual inequality view d. rational choice view

ANSWER: a REFERENCES: Prostitution

35. The movement to ban gay marriage in California that led to the passage of Proposition 8 is an example of a/an _____. a. moral crusade. b. religious policy. c. ethical mandate. d. social campaign.

ANSWER: a REFERENCES: The Theory of Social Harm

55. Which of the following is false about transnational organized crime? a. It usually does not include drug sales but is more inclined to commit business-related crimes. b. It is usually structured along hierarchical lines. c. Groups are quick and effective in controlling and disciplining members. d. They do not include terror organizations.

ANSWER: a REFERENCES: Transnational Organized Crime

56. Passed in 1970, the _______________________ act is federal legislation that enables prosecutors to bring additional criminal and civil charges against people whose multiple criminal acts constitute a conspiracy. a. RICO b. G.R.E.A.T. c. Federal Lautenberg d. Transnational Anti-Criminal Organization (TACO) Act

ANSWER: a REFERENCES: Transnational Organized Crime

58. Latin American and Mexican cartels primary method of income is through ______. a. drug sales and drug smuggling b. human trafficking c. gambling d. loan sharking

ANSWER: a REFERENCES: Transnational Organized Crime

61. Which of the following is an Asian transnational group involved in manufacturing and trafficking methamphetamine who originated in Thailand? a. Red Wa b. Jao Pho c. Triads d. Fuk Ching

ANSWER: a REFERENCES: Transnational Organized Crime

54. Forcing victims to pay for services or contracts to which they have a clear right is called ______. a. exploitation b. peddling c. chiseling d. profiteering

ANSWER: a REFERENCES: White-Collar Crime

56. Illegal buying of stock in a company on the basis of information provided by someone who has a fiduciary interest in the company is known as _______. a. insider trading b. exploitation c. peddling d. chiseling

ANSWER: a REFERENCES: White-Collar Crime

57. The ____________________ Act is a federal law that subjects to criminal and civil sanctions any person who shall make any contract or engage in any combination or conspiracy in restraint of interstate commerce. a. Sherman Antitrust b. Interstate Commerce c. Lautenberg d. Illegal Restraint

ANSWER: a REFERENCES: White-Collar Crime

58. While exploiters are extortionists who force victims to pay for services to which they are legally entitled, _______________ take bribes in exchange for granting favors. a. peddlers b. twizzlers c. chislers d. pirates

ANSWER: a REFERENCES: White-Collar Crime

64. In 2015, Daniel is arrested for running a Ponzi scheme in which he swindled nearly 2 million dollars from investors. This crime would be considered a _______. a. white-collar crime b. blue-collar crime c. green-collar crime d. none of the above

ANSWER: a REFERENCES: White-Collar Crime

50. Which of the following is true in regard to recent research by the National White Collar Crime Center? a. About 17 percent of individuals reported experiencing at least one form of white-collar crime. b. About 80 percent of white-collar crimes are reported to police. c. White-collar crime is viewed as a less serious crime by the general public. d. All of the above are true.

ANSWER: a REFERENCES: White-Collar Crimes

37. Which of the following is not true about larceny? a. Most U.S. state criminal codes separate larceny into petty and grand larceny b. Both the UCR and NCVS depict a steady increase in the number and rate of larcenies during the past decade c. The FBI records more than 6 million acts of larceny annually d. The original definition of larceny did not include the misappropriation of goods by trickery or deceit

ANSWER: b REFERENCES: Blue-Collar Crimes

54. The Internet Crime Complaint Center, based in Fairmont, WV, is run by the National White Collar Crime Center and which federal agency? a. DEA b. FBI c. CIA d. INS

ANSWER: b REFERENCES: Controlling Cybercrime

44. Similar to a salami slice fraud but on a much larger and usually more complex scale, ________________ sometimes is perpetrated as a "one-off kamikaze" fraud. a. theft of information b. manipulation of accounts c. corporate espionage d. warez

ANSWER: b REFERENCES: Cybertheft: Cybercrime for Profit

40. Attaining sexual pleasure through sexual activity with prepubescent children is referred to as ______. a. frotteurism b. pedophilia c. voyeurism d. sadomasochism

ANSWER: b REFERENCES: Paraphilias

55. Obscenity is derived from the Latin word caenum that means _____________. a. perversion b. filth c. illegal d. twisted

ANSWER: b REFERENCES: Pornography

42. Modern commercial sex appears to have its roots in ancient _____ where Solon established licensed brothels in 500 BC. a. Rome b. Greece c. Mesopotamia d. Persia

ANSWER: b REFERENCES: Prostitution

47. Which category of prostitute is considered the least attractive, lowest paid, and most vulnerable, regardless of whether the prostitute is male or female? a. Brothel prostitutes b. Streetwalkers c. Escorts d. Circuit travelers

ANSWER: b REFERENCES: Prostitution

59. Border patrols are examples of ________ strategies aimed at stopping drug use. a. rehabilitation b. interdiction c. restorative d. diversion

ANSWER: b REFERENCES: Substance Abuse

61. Ethan Nadelmann argues that drugs should be legalized because ______. a. legalization will increase the price of drugs making it too costly for people to use drugs. b. the use of mood-altering substances is customary in almost all human societies. c. taxes the government could charge on drugs would help pay for drug prevention and treatment. d. we should be free.

ANSWER: b REFERENCES: Substance Abuse

59. Which of the following is most true about the group known as the Surenos? a. They originated in Latin America, first as a protective force for Pablo Escobar, and later became a major player in the distribution of cocaine and heroin along border towns in Texas. b. They are one of the largest groups in the world involved in human trafficking, preying on the young women in the poorest regions and eventually selling them into sexual slavery. c. They are an alliance of hundreds of individual Mexican American street gangs who gained popularity by selling drugs within prisons. d. None of the above

ANSWER: c REFERENCES: Transnational Organized Crime

51. __________ involves illegal activities of people and institutions whose acknowledged purpose is profit through legitimate business transactions. a. Organized crime b. Enterprise crime c. White-collar crime d. Cyber crime

ANSWER: c REFERENCES: White-Collar Crime

39. Which of the following is true about ATM skimming crimes? a. Devices are typically undetectable b. Devices are usually placed only for a short time c. Phony keyboards are sometimes attached d. All of the above

ANSWER: d REFERENCES: Cybertheft: Cybercrime for Profit

46. Extorting money from an Internet service user by threatening to prevent the user from having access to the service is known as ______. a. denial-retrial b. Trojan horse c. warez d. denial-of-service attack

ANSWER: d REFERENCES: Cybertheft: Cybercrime for Profit

50. The following illustrates the story of Rebecca Caine who was terrorized by her ex-boyfriend Peter Atkinson who bombarded her with hundreds of texts and calls a day and even posted nude pictures of her online. His actions are characterized as ______. a. cyberbullying b. cyberspying c. cyberabuse d. cyberstalking

ANSWER: d REFERENCES: Cybervandalism: Cybercrime with Malicious Intent

32. In the late 1930s, the distinguished criminologist __________ first used the phrase "white-collar crime" to describe the criminal activities of the rich and powerful. a. Cesare Lombroso b. Emile Durkheim c. Edwin Lemert d. Edwin Sutherland

ANSWER: d REFERENCES: History of Economic Crimes

39. Your neighbor obtains sexual pleasure from spying on strangers while they disrobe. This neighbor is a/an ______. a. exhibitionist. b. frotteurist. c. pedophile. d. voyeur.

ANSWER: d REFERENCES: Paraphilias

53. Which of the following is a contention of opponents of pornography? a. Pornography has increased racism in the United States. b. Pornography is allowable if sold only in adult book stores. c. Pornography serves to encourage women to enter pornographic industries. d. Pornography degrades both the people who are participants and the public who are sometimes forced to see it.

ANSWER: d REFERENCES: Pornography

44. Which category of prostitute is believed to be responsible for the recent upsurge in prostitution? a. Bar girls b. Tooters c. Call girls d. Cyberprostitutes

ANSWER: d REFERENCES: Prostitution

46. The aristocrats of prostitution are _____ who charge customers thousands of dollars per night and who may net over 200,000 dollars per year. a. streetwalkers b. circuit travelers c. Ehookers d. call girls

ANSWER: d REFERENCES: Prostitution

49. After World War I, prostitution became associated with ____, and the desire to protect young servicemen from harm helped to end all experiments with legalization in the United States. a. organized crime b. immorality c. violence d. disease

ANSWER: d REFERENCES: Prostitution

58. Problem behavior syndrome contends that ______. a. genetics hold the key to addiction b. the neighborhood is the primary determinant of substance abuse c. substance abuse is linked to impaired cognitive functioning d. substance abuse is just one of many problem behaviors

ANSWER: d REFERENCES: Substance Abuse

60. Which issue presents an obstacle to controlling drugs via source control strategies? a. The drug trade is an important source of foreign revenue and source control undermines third-world economies. b. The amount of foreign grown narcotics is so vast that even if 75 percent of the opium market were destroyed, the United States would still require only 10 percent of the remainder to sustain its drug trade. c. Even if the government of one nation were willing to cooperate in vigorous drug suppression efforts, other nations would be eager to cash in on the drug trade void. d. These are all issues that present obstacles to controlling drugs via source control strategies.

ANSWER: d REFERENCES: Substance Abuse

60. Which of the following is true about Asian transnational crime groups? a. Chinese gangs are primarily involved in human trafficking, especially the shipment of young, poor, Asian women to Eastern Europe and Thailand for the sex trade b. The heijin is Thailand's #1 criminal group, involved primarily in the manufacturing and distribution of methamphetamines c. The Jao Pho, the Philippines largest gang, is often involved in street crime and prostitution and are now one of the largest growing groups on the west coast of the United States d. In Taiwan, the number one organized crime problem is the penetration of mobsters into legitimate business sectors and politics

ANSWER: d REFERENCES: Transnational Organized Crime

53. Bernard Madoff has been referred to as the greatest ____ of all time. a. influence peddler b. pilferer c. exploiter d. Ponzi schemer

ANSWER: d REFERENCES: White-Collar Crime


Conjuntos de estudio relacionados

Economic Concepts and Financial Reporting

View Set

About Science -- Conceptual Physics

View Set

Nursing Research and Theory Ch.2

View Set

RM: Citi Modules, CITI Modules 9-17, CITI Certification, CITI quiz

View Set

Chapter 11 Metal Casting Process

View Set

The Bits and Bytes of Computer Networking

View Set