Chapter 6

Ace your homework & exams now with Quizwiz!

The Sarbanes-Oxley Act of 2002 intends to limit ______.

white-collar crime

Criminal ______ involves an individual intentionally using some sort of misrepresentation to gain an advantage over another person.

fraud

Actus reus means ______.

guilty act

1. Felonies 2. Misdemeanors 3. Petty offenses

1. Punishable by imprisonment for more than one year in a penitentiary or by death 2.Punishable by fines and/or imprisonment for less than one year 3.Punishable by a jail sentence of less than six months or a small fine

Which of the following is not an example of a fraudulent crime? negligence pretexting check kiting defalcation

negligence

The burden of proof in a criminal trial has two elements: ______.

the burden of production of evidence and the burden of persuasion

The Racketeer Influenced and Corrupt Organizations Act prohibits persons employed by or associated with an enterprise from engaging in a pattern of ______ activity.

racketeering

______ was originally enacted to combat organized crime.

The Racketeer Influenced and Corrupt Organizations Act

Which of the following is not an example of a fraudulent crime? false entries Ponzi scheme false token false imprisonment

false imprisonment

The Fourth Amendment to the U.S. Constitution protects against ______.

unreasonable search and seizure

A computer crime can be committed by a corporate insider, such as an employee, or by an outsider, such as a(n) ______.

hacker

______ is the offering, giving, soliciting, or receiving of money or any object of value for the purpose of influencing the judgment or conduct of a person in a position of trust.

Bribery

What is the current rule regarding whether a corporation can be held criminally responsible?

Currently, corporations can be held criminally accountable for almost any crime.

______ is the wrongful conversion of another's property by one who is lawfully in possession of that property.

Embezzlement

When law enforcement agents arrest individuals, the officers must inform the individuals of their ______ rights; otherwise, any information a defendant offers at the time of the arrest is not admissible at trial.

Miranda

During which decade was the Sarbanes-Oxley Act passed?

The 2000s

hich of the following is an accurate statement regarding criminal procedure versus civil procedure?

The U.S. Constitution provides more express protections for a civil defendant than for a criminal defendant.

Which of the following is not one of the essential elements required for criminal fraud liability? The defendant fails to do what a reasonable person would have done under the same or similar circumstances. The victim reasonably relied on the defendant's false representation. The defendant made a material false representation with the intent to deceive the victim. The victim sustained damages as a result of the defendant's false representation.

The defendant fails to do what a reasonable person would have done under the same or similar circumstances.

For a corporation to be held criminally liable for the acts of an employee, the prosecutor must show all but which of the following?

The employee who committed the act has not been criminally prosecuted.

True or false: In a criminal proceeding, the government files the charges against a defendant.

True

Which of the following is an accurate statement regarding extortion and bribery? Extortion is a felony, while bribery is a misdemeanor. While bribery is offering something to obtain a desired result, extortion involves a threat if the victim does not give money or property. Extortion and bribery are synonymous. While extortion is offering something to obtain a desired result, blackmail involves a threat if the victim does not give money or property.

While bribery is offering something to obtain a desired result, extortion involves a threat if the victim does not give money or property.

______ crimes are nonviolent illegal acts against society.

White-collar

How is embezzlement distinguishable from larceny?

With embezzlement, the defendant does not take the property from another; instead, the defendant is already in possession of the property.

Which of the following must the government demonstrate to punish an individual for criminal behavior?

actus reus and mens rea

White-collar crimes occur most frequently in the ______ context.

business

Which of the following is not an affirmative defense to crime?

advanced age

Extortion is also known as ______.

blackmail

The purpose of ______ law is to punish an offender for causing harm to public health, safety, or morals.

criminal

In a criminal trial, the ______ has the burden of proof.

prosecutor

Unlike in a civil procedure, the ______ always brings the criminal case in a criminal procedure.

prosecutor

Which of the following does not constitute bribery?

rejecting a bribe

A cyber terrorist is a computer ______.

A cyber terrorist is a computer ______.

According to Miranda rights, which of the following is not one of the facts that a law enforcement officer needs to inform a defendant before questioning? "You have the right to an attorney, but only after law enforcement authorities have questioned you." "Anything you say may be used against you in a court of law." "If you cannot afford an attorney, one will be appointed for you." "You have the right to remain silent and refuse to answer any questions."

"You have the right to an attorney, but only after law enforcement authorities have questioned you."

Since ______, private citizens have been using the False Claims Act to sue employers on behalf of the government for fraud against the government.

1986

A(n) ______ is a fraudulent operation in which the operator, an individual or organization, pays returns to its investors from new capital paid to the operators by new investors rather than from profit earned by the operator.

Ponzi scheme

The Eighth Amendment to the U.S. Constitution provides ______. the right to confront witnesses freedom from excessive bail the right not to incriminate oneself the right to be informed of the accusations against oneself

freedom from excessive bail

A(n) ______ is a person who illegally accesses or enters another person's or a company's computer system to obtain information or steal money.

hacker

Which of the following is not an affirmative defense to crime? justifiable use of force ignorance of the law duress entrapment

ignorance of the law

False ______ is the illegal obtaining of property belonging to another through materially false representation of an existing fact, with knowledge of the falsity of the representation and with the intent to defraud.

pretense

A defendant who is facing a punishment of _______ or more has a constitutional right to a jury trial.

six months

A cyber ______ is a hacker whose intention is the exploitation of a target computer or network to create a serious impact, such as the crippling of a communications network or the sabotage of a business or organization.

terrorist

Which of the following is not one of the three federal laws that have aided in the fight against business-related crimes? the False Claims Act the Sarbanes-Oxley Act of 2002 the Bush-Cheney Doctrine RICO

the Bush-Cheney Doctrine

Pursuant to the __________ Act, an employee who reports an employer for fraud against the government retains a share of the recovery as a reward for his or her efforts.

False Claims

Suppose Jim goes door-to-door selling vacuum cleaners at an amazing discount. To obtain the discount, customers must pay immediately, and the vacuum cleaner will be delivered to them in three to five business days. However, Jim possesses no vacuum cleaners and does not plan to deliver any. Jim has committed the crime of ______.

false pretense


Related study sets

Community Relations Chapter 10 Final Study Guide Part I

View Set

Chapter 28 - Problems Related to Urinary Tract Function

View Set

PassPoint - Substance Abuse, Eating, Disorders, Impulse Control Disorder

View Set

Course 3: Texas Law of Contracts: Chapter 3

View Set

Taylor Chapter-31 skin integrity and wound care

View Set

Modern Database Management - Chapter 3

View Set