CRIM EXAM 4 (10-13)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is a characteristic of the Internet that facilitates criminal activity?

All of the choices are correct. A. Its transnational nature C. Piracy does not require a lot of skill. D. The ease of anonymous communication

Approximately what percentage of shoplifting incidents are observed by store personnel?

10%

The _______ Amendment outlawed the manufacture, sale, or transportation of intoxicating liquors for "beverage purposes."

18th

Marijuana was legal in the United States until the passage of the Marijuana Tax Act in:

1937

Computer crime emerged as an issue in criminal justice in the:

1970s

According to UCR data, _______ of homicides are committed with firearms.

70%

Nearly ________ children are abused annually.

700,000

Which aspect of the social structure of the United States contributes to the high homicide rate, according to Messner, Rosenfeld, and Currie?

A high level of economic inequality and a low level of social support

Researchers have shown that sexting experiences frequently lead to which of the following psychological issues?

All of these are correct. A. Depression B. Anxiety C. Suicidal ideations

Cyberstalking includes which of the following behaviors?

All of these are correct. A. The use of violent words B. The use of derogatory images C. Monitoring an individual's behaviors

The Internet is a new _________ for criminal activity

All of these are correct. A. venue B. marketplace C. resource for learning new methods

Stack, Wasserman, and Kern found that individuals with _________ are more likely to view pornography via the Internet.

All of these are correct. A. weak religious ties B. unhappy marriages C. past sexual deviance

What is a likely explanation for the high homicide rate in the United States compared to other industrialized countries?

Americans have easier access to handguns.

What is the most common pathway to homicide?

An argument

When do most residential burglaries take place?

Between 6 a.m. and 6 p.m.

Since the _________, digital piracy has been considered a criminal act.

Copyright Act of 1976

Which of the following is the most common form of identity theft?

Credit card fraud

_____ is an intentional, aggressive behavior that involves an imbalance of power and is performed through electronic means.

Cyberbullying

________ is the use of technology to support and promote acts of terror.

Cyberhate

_________ is the threatening or malicious use of Internet, email, or other electronic communications towards another individual.

Cyberstalking

What are the recent trends in burglary rates according to UCR and NCVS data?

Decreasing according to both UCR and NCVS

_________ is defined as the illegal act of copying digital goods such as software, documents, audio, and video, for a reason other than to save

Digital piracy

Which type of shoplifter steals to satisfy specific needs?

Episodic

What was the background for the push to make marijuana illegal?

Ethnic conflict and prejudice

What are the three general property-selection criteria for burglars?

Exposure, occupancy, and accessibility

How many primary examples of mass murder motives have Fox and Levin characterized?

Five

As the Internet grows, Internet crime will do which of the following?

Grow with it

Which of the following does not have any malicious intent or does not perform any malicious acts, other than trespassing in a computer system?

Hacker

Cyberhate groups gather information and other resources using primarily which technique?

Hacking

What drug was a brand name trademarked by the Bayer Company, the company better known today for its aspirin?

Heroin

What are the most common types of violent crimes?

Homicide, rape, robbery, and assault

Pharming is a method used by which of the following?

Identity thieves

Using the RECON (relationship and context-based) typology, which of the following is the largest stalker group?

Intimate stalkers

Why is intimate partner violence (IPV) one of the most difficult crimes to control?

It occurs outside of the public eye

Which households are more likely to be victims of a property crime?

Lower-income households

Which of the following organizations advocated for the increased severity of punishment for driving while intoxicated?

MADD

What is term for the unlawful taking of a human life without malice?

Manslaughter

"Mexican opium" describes which of the following?

Marijuana

What is the primary motive for burglary, according to interviews with 50 experienced burglars in Britain?

Money

A serial murderer kills a number of people, usually three or more, over the course of what time frame?

More than a month

The term "multicide" refers to which of the following?

Murders that feature multiple victims

What is the lifetime prevalence rate for rape victimization for women, as estimated from the National Violence Against Women survey?

One in 6

What distinguishes the professional robber from the opportunistic robber?

Planning and organization

______ is defined as sexual intercourse by force or without legal or factual consent.

Rape

In situations of rape, which agency best represents the victim's interests and perspective?

Rape crisis center

Which of the following can be used to understand how to reduce instances of digital piracy?

Rational choice/deterrence theory

__________ is deemed child pornography when the subject of the message is a minor.

Sexting

The Massachusetts Bay Colony believed that the purpose of the law was to deter and punish which of the following?

Sin

What is the most commonly used weapon or aggressive tactic for robbery?

Strong-arm tactics

_________ allow(s) an individual to take a moral holiday to perform a deviant or criminal act.

Techniques of neutralization

Why might the UCR be a better source for data on larceny-theft than the NCVS?

The NCVS does not account for businesses that may be victimized by larceny-theft, such as shoplifting

Wilson and Kelling stressed that when the police maintain order, they reinforce which of the following?

The control mechanisms in the community

Which of the following increases the risk of intimate partner homicide?

The couple is living together, but not married.

The public's fear of violent crime is related to which of the following?

The media

How does burglary differ from robbery?

There is no interaction between the victim and the offender during burglary

How have the Internet and personal computers affected criminal behavior?

They have provided the tools for cybercrime.

Which of the following describes roughly 50% of female victims of assault incidents, according to the NCVS?

They knew their assailant.

What is the goal of criminological research on violent crime?

To develop effective public policy

Which of the following is not included in the FBI's definition of motor vehicle theft?

Unauthorized use of a vehicle by persons with lawful access

What did Levin and Madfis term the second stage of their five-stage model of cumulative strain?

Uncontrolled strain

A subculture maintains not only its own beliefs and traditions that differ from the dominant culture, but also which of the following?

Values

Which of the following involves participants who do not report criminal activity to the police?

Victimless crimes

Which child age group has the highest rate of victimization?

Younger than 1 year

Enforcing laws against prostitution is promoted as both crime prevention and:

a public health benefit

The broken windows theory asserts that disorder and _________ are causally linke

crime

According to the FTC, _________ occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without permission in order to commit fraud or other crimes.

identity theft

The highest rates of burglary victimization are reported in households with income:

less than $7,500.

Higgins, Fell, and Wilson found that college students with __________ are likely to learn the techniques necessary to perform digital piracy and then develop intentions to perform digital piracy.

low self-control

From the law and order perspective, public order means the normal, _________ conduct of social interaction conducted within social boundaries of decency and civility.

peaceful

According to the author, all of the following criminological theories except ____________ have been used to explain digital piracy.

strain theory

The most commonly arrested prostitute works as a(n):

streetwalker

The moral perspective brings attention to the social stigma that is often attached to public order offenses and:

the harm caused by them

The two key elements in the legal definition of robbery are the taking of another person's property and:

the use or threat of force.

Digital piracy allows the offense to take place detached from the copyright holder, which provides the offender with the perception that the act is:

victimless.

Although rape victims are from all classes, races, genders, and age groups, rape victims are disproportionately:

young (under the age of 34 years)


Ensembles d'études connexes

Chapter 63: The Fetal Urogenital System

View Set

Vocabulary Unit 2/ Martyr's Song (English)

View Set

Cyber Security Ethics and Privacy

View Set