Chapter 6 Reading Qs

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

______ is using or causing others to use false pretenses, fraudulent statements, fraudulent or stolen documents, or other misrepresentations to obtain the telephone records of another.

Pretexting

Which of the following is not a category of computer crime prohibited by the Computer Fraud and Abuse Act?

Sharing of personal passwords to social media websites with friends and family

During which decade was the Counterfeit Access Device and Computer Fraud and Abuse Act passed?

The 1980s

______ was originally enacted to combat organized crime.

The Racketeer Influenced and Corrupt Organizations Act

Which of the following is an accurate statement regarding criminal procedure versus civil procedure?

The U.S. Constitution provides more express protections for a criminal defendant than for a civil defendant.

Which of the following is not one of the essential elements required for criminal fraud liability?

The defendant fails to do what a reasonable person would have done under the same or similar circumstances.

True or false: In a criminal proceeding, the government files the charges against a defendant.

True

True or false: Strict-liability offenses are offenses that do not require state of mind.

True

______ is the amount of money a defendant must pay the court on release from custody as security that he or she will return for trial.

Bail

Extortion is also known as ______.

Blackmail

______ is a procedure during which the name of the defendant and the alleged crime are recorded in the investigating agency's or police department's records.

Booking

is the offering, giving, soliciting, or receiving of money or any object of value for the purpose of influencing the judgment or conduct of a person in a position of trust.

Bribery

Which of the following is an accurate statement regarding computer crimes?

Computer crimes are often difficult to prosecute, particularly since they are difficult to detect.

Which of the following is an accurate statement regarding a bench trial?

In a bench trial, the defendant has waived his or her right to a jury trial.

Which of the following is an accurate statement regarding extortion and bribery?

While bribery is offering something to obtain a desired result, extortion involves a threat if the victim does not give money or property.

Criminal ______ involves an individual intentionally using some sort of misrepresentation to gain an advantage over another person.

fraud

Forgery is a type of ______.

fraud

Actus reus means

guilty act

A computer crime can be committed by a corporate insider, such as an employee, or by an outsider, such as a(n) ______.

hacker

A cyber terrorist is a computer ______.

hacker

A(n) ______ is a person who illegally accesses or enters another person's or a company's computer system to obtain information or steal money.

hacker

According to the Mail Fraud Act of 1990, which of the following is an essential element to prove mail fraud?

intent to defraud

A ______ issues the arrest warrant.

magistrate

The Sarbanes-Oxley Act of 2002 intends to limit ______.

white-collar crime

Unlike in a civil procedure, the ______ always brings the criminal case in a criminal procedure.

prosecutor

Which of the following does not constitute bribery?

rejecting a bribe

Illegal insider trading typically involves the buying and selling of ______.

securities

Bribery of a public official is a ______ offense under federal law.

statutory

What is the principle reason for bail?

to ensure that a defendant will return for trial

A computer ______ is a computer program that rearranges, damages, destroys, or replaces computer data.

virus

A cyber ______ is a hacker whose intention is the exploitation of a target computer or network to create a serious impact, such as the crippling of a communications network or the sabotage of a business or organization.

terrorist

True or false: In 1991, there was a shift to determinate sentencing, under which federal sentences are determined largely by sentencing guidelines prescribing a specific range of possible penalties for each crime.

True

What is the purpose of the law against the statutory offense of "bribery of a public official"?

to maintain the integrity of the government

White-collar crimes occur most frequently in the ______ context.

business

Criminal proceedings generally begin when an individual ______ a crime.

is arrested for

The Foreign Corrupt Practices Act allows the government to prosecute those who ______ foreign officials.

bribe

Which of the following is not a type of computer crime?

one that generates proceeds for an eventual computer purchase

Commercial bribery includes a bribe in exchange for new information or ______.

payoffs

Which of the following is an example of pretexting?

posing as an employee of a telecommunications carrier to obtain the telephone records of an ex-spouse

False ______ is the illegal obtaining of property belonging to another through materially false representation of an existing fact, with knowledge of the falsity of the representation and with the intent to defraud.

pretense

Identify the true statements regarding posttrial procedure in criminal proceedings. (Check all that apply.)

1. The guidelines for judges to consider in sentencing for white-collar crimes have been established. 2. Judges are given certain factors to consider in sentencing, such as the defendant's criminal record.

Since ______, private citizens have been using the False Claims Act to sue employers on behalf of the government for fraud against the government.

1986

______ is the wrongful conversion of another's property by one who is lawfully in possession of that property.

Embezzlement

Pursuant to the __________ Act, an employee who reports an employer for fraud against the government retains a share of the recovery as a reward for his or her efforts.

False Claims

The purpose of the ______ is to combat the bribery of foreign officials.

Foreign Corrupt Practices Act

______ is the fraudulent making or altering of any writing in a way that changes the legal rights and liabilities of another.

Forgery

Until recently, the most economically destructive computer crime to date was the creation of the ______ virus, which spread rapidly in May 2000.

Love Bug

Which of the following is not an option available to the prosecutor and the defendant in a plea bargain agreement?

The prosecutor agrees not to pursue the related civil case if the defendant pleads guilty.

Which of the following must the government demonstrate to punish an individual for criminal behavior?

actus reus and mens rea

When does booking occur in a criminal procedure?

after the defendant's arrest

A(n) ______ is an agreement in which the prosecutor agrees to reduce charges, drop charges, or recommend a certain sentence if the defendant pleads guilty.

plea bargain

During which decade was the Sarbanes-Oxley Act passed?

The 2000s

A law enforcement officer should obtain a(n) ______ warrant before an individual is taken into custody.

arrest

When a judge is the fact-finder in a case, the trial is called a(n) ______ trial.

bench

Suppose Jim goes door-to-door selling vacuum cleaners at an amazing discount. To obtain the discount, customers must pay immediately, and the vacuum cleaner will be delivered to them in three to five business days. However, Jim possesses no vacuum cleaners and does not plan to deliver any. Jim has committed the crime of ______.

false pretense

A ______ is the lowest-ranking judicial official.

magistrate

The Racketeer Influenced and Corrupt Organizations Act prohibits persons employed by or associated with an enterprise from engaging in a pattern of ______ activity.

racketeering

In which year was the Mail Fraud Act passed?

1990

Strict-liability offenses are _____.

offenses for which no mens rea is required

Which of the following is not one of the three federal laws that have aided in the fight against business-related crimes?

the Bush-Cheney Doctrine

Match the categories of crimes (in the left column) with their descriptions (in the right column). Instructions 1-Felonies 2-Misdemeanors 3-Petty offenses

1- Punishable by imprisonment for more than one year in a penitentiary or by death 2- Punishable by fines and/or imprisonment for less than one year 3- Punishable by a jail sentence of less than six months or a small fine

The purpose of ______ law is to punish an offender for causing harm to public health, safety, or morals.

Criminal

______ is generally the illegal buying or selling of a corporation's stock or other securities by a corporate insider, in breach of a fiduciary duty or some other relationship of trust and confidence, while in possession of material, nonpublic information about the security.

Insider trading

________crimes are nonviolent illegal acts against society.

White-Collar

How is embezzlement distinguishable from larceny?

With embezzlement, the defendant does not take the property from another; instead, the defendant is already in possession of the property.


Set pelajaran terkait

ET2560 Introduction to C Programming Chapter 5

View Set

Emerging Technologies (Lesson 3)

View Set

Short Story Literary Terms Study Guide

View Set

Ch_3_Interaction of X-Radiation With Matter

View Set

Managerial Accounting RQ Chapter 13 #1

View Set

Chapter 7 (Energy and Metabolism) and Chapter 8 (Cellular Respiration)

View Set

PNE 105 Chapter 46: Caring for Clients with Disorders of the Lower GI Tract. Med-Surg.

View Set

nclex pn safe, effective care environment

View Set

AP Calculus AB Unit 1: Limits and Continuity

View Set