CRIM EXAM 4 (10-13)
Which of the following is a characteristic of the Internet that facilitates criminal activity?
All of the choices are correct. A. Its transnational nature C. Piracy does not require a lot of skill. D. The ease of anonymous communication
Approximately what percentage of shoplifting incidents are observed by store personnel?
10%
The _______ Amendment outlawed the manufacture, sale, or transportation of intoxicating liquors for "beverage purposes."
18th
Marijuana was legal in the United States until the passage of the Marijuana Tax Act in:
1937
Computer crime emerged as an issue in criminal justice in the:
1970s
According to UCR data, _______ of homicides are committed with firearms.
70%
Nearly ________ children are abused annually.
700,000
Which aspect of the social structure of the United States contributes to the high homicide rate, according to Messner, Rosenfeld, and Currie?
A high level of economic inequality and a low level of social support
Researchers have shown that sexting experiences frequently lead to which of the following psychological issues?
All of these are correct. A. Depression B. Anxiety C. Suicidal ideations
Cyberstalking includes which of the following behaviors?
All of these are correct. A. The use of violent words B. The use of derogatory images C. Monitoring an individual's behaviors
The Internet is a new _________ for criminal activity
All of these are correct. A. venue B. marketplace C. resource for learning new methods
Stack, Wasserman, and Kern found that individuals with _________ are more likely to view pornography via the Internet.
All of these are correct. A. weak religious ties B. unhappy marriages C. past sexual deviance
What is a likely explanation for the high homicide rate in the United States compared to other industrialized countries?
Americans have easier access to handguns.
What is the most common pathway to homicide?
An argument
When do most residential burglaries take place?
Between 6 a.m. and 6 p.m.
Since the _________, digital piracy has been considered a criminal act.
Copyright Act of 1976
Which of the following is the most common form of identity theft?
Credit card fraud
_____ is an intentional, aggressive behavior that involves an imbalance of power and is performed through electronic means.
Cyberbullying
________ is the use of technology to support and promote acts of terror.
Cyberhate
_________ is the threatening or malicious use of Internet, email, or other electronic communications towards another individual.
Cyberstalking
What are the recent trends in burglary rates according to UCR and NCVS data?
Decreasing according to both UCR and NCVS
_________ is defined as the illegal act of copying digital goods such as software, documents, audio, and video, for a reason other than to save
Digital piracy
Which type of shoplifter steals to satisfy specific needs?
Episodic
What was the background for the push to make marijuana illegal?
Ethnic conflict and prejudice
What are the three general property-selection criteria for burglars?
Exposure, occupancy, and accessibility
How many primary examples of mass murder motives have Fox and Levin characterized?
Five
As the Internet grows, Internet crime will do which of the following?
Grow with it
Which of the following does not have any malicious intent or does not perform any malicious acts, other than trespassing in a computer system?
Hacker
Cyberhate groups gather information and other resources using primarily which technique?
Hacking
What drug was a brand name trademarked by the Bayer Company, the company better known today for its aspirin?
Heroin
What are the most common types of violent crimes?
Homicide, rape, robbery, and assault
Pharming is a method used by which of the following?
Identity thieves
Using the RECON (relationship and context-based) typology, which of the following is the largest stalker group?
Intimate stalkers
Why is intimate partner violence (IPV) one of the most difficult crimes to control?
It occurs outside of the public eye
Which households are more likely to be victims of a property crime?
Lower-income households
Which of the following organizations advocated for the increased severity of punishment for driving while intoxicated?
MADD
What is term for the unlawful taking of a human life without malice?
Manslaughter
"Mexican opium" describes which of the following?
Marijuana
What is the primary motive for burglary, according to interviews with 50 experienced burglars in Britain?
Money
A serial murderer kills a number of people, usually three or more, over the course of what time frame?
More than a month
The term "multicide" refers to which of the following?
Murders that feature multiple victims
What is the lifetime prevalence rate for rape victimization for women, as estimated from the National Violence Against Women survey?
One in 6
What distinguishes the professional robber from the opportunistic robber?
Planning and organization
______ is defined as sexual intercourse by force or without legal or factual consent.
Rape
In situations of rape, which agency best represents the victim's interests and perspective?
Rape crisis center
Which of the following can be used to understand how to reduce instances of digital piracy?
Rational choice/deterrence theory
__________ is deemed child pornography when the subject of the message is a minor.
Sexting
The Massachusetts Bay Colony believed that the purpose of the law was to deter and punish which of the following?
Sin
What is the most commonly used weapon or aggressive tactic for robbery?
Strong-arm tactics
_________ allow(s) an individual to take a moral holiday to perform a deviant or criminal act.
Techniques of neutralization
Why might the UCR be a better source for data on larceny-theft than the NCVS?
The NCVS does not account for businesses that may be victimized by larceny-theft, such as shoplifting
Wilson and Kelling stressed that when the police maintain order, they reinforce which of the following?
The control mechanisms in the community
Which of the following increases the risk of intimate partner homicide?
The couple is living together, but not married.
The public's fear of violent crime is related to which of the following?
The media
How does burglary differ from robbery?
There is no interaction between the victim and the offender during burglary
How have the Internet and personal computers affected criminal behavior?
They have provided the tools for cybercrime.
Which of the following describes roughly 50% of female victims of assault incidents, according to the NCVS?
They knew their assailant.
What is the goal of criminological research on violent crime?
To develop effective public policy
Which of the following is not included in the FBI's definition of motor vehicle theft?
Unauthorized use of a vehicle by persons with lawful access
What did Levin and Madfis term the second stage of their five-stage model of cumulative strain?
Uncontrolled strain
A subculture maintains not only its own beliefs and traditions that differ from the dominant culture, but also which of the following?
Values
Which of the following involves participants who do not report criminal activity to the police?
Victimless crimes
Which child age group has the highest rate of victimization?
Younger than 1 year
Enforcing laws against prostitution is promoted as both crime prevention and:
a public health benefit
The broken windows theory asserts that disorder and _________ are causally linke
crime
According to the FTC, _________ occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without permission in order to commit fraud or other crimes.
identity theft
The highest rates of burglary victimization are reported in households with income:
less than $7,500.
Higgins, Fell, and Wilson found that college students with __________ are likely to learn the techniques necessary to perform digital piracy and then develop intentions to perform digital piracy.
low self-control
From the law and order perspective, public order means the normal, _________ conduct of social interaction conducted within social boundaries of decency and civility.
peaceful
According to the author, all of the following criminological theories except ____________ have been used to explain digital piracy.
strain theory
The most commonly arrested prostitute works as a(n):
streetwalker
The moral perspective brings attention to the social stigma that is often attached to public order offenses and:
the harm caused by them
The two key elements in the legal definition of robbery are the taking of another person's property and:
the use or threat of force.
Digital piracy allows the offense to take place detached from the copyright holder, which provides the offender with the perception that the act is:
victimless.
Although rape victims are from all classes, races, genders, and age groups, rape victims are disproportionately:
young (under the age of 34 years)