Chapter 6 Study Guide - Intro. to Criminal Justice

Ace your homework & exams now with Quizwiz!

43

As of August 5, 2010 _______ foreign terrorist organizations were recognized by the U.S. State Department as loosely affiliated extremists and rogue international terrorists to include the World Trade Center bombers and rogue terrorists such as Osama bin Laden and members of al-Qaida.

1 in 4

In 2007, approximately ____________ local police departments had one or more officers assigned full-time to a multiagency drug enforcement task force, about the same percentage as in 2003.

victim, offender, and location

The crime triangle is a view of crime and disorder as an interaction among three variables, which are:

B

The professional model of policing, which police followed in the decades before community policing, rested on three foundations. They are listed below. Which of the following is NOT one of these three foundations? A) preventive patrol B) proactive patrol C) follow-up investigation D) quick response time

true

True/False. In street police work, passion is the ability to use force or the recognition that force is a legitimate means of resolving conflict.

false

True/False. It is believed that soon DNA from a flake of dandruff will yield a positive identification, but there will still be the need to consider mathematical probabilities.

true

True/False. Large metropolitan police agencies use AFIS to identify hundreds of suspects per year.

false

True/False. Police administrators have long referred to investigation as the backbone of the department.

true

True/False. Sometimes a police officer's role may be simply to solve problems in the course of providing service.

false

True/False. The 1972 Kansas City Preventive Patrol Experiment found that heavily patrolled streets had significantly less crime than unpatrolled streets did.

street-level enforcement

Which of the following drug enforcement strategies accounts for the greatest number of drug arrests and seizures?

CODIS

Which of the following is currently the most complete DNA database?

B

Which of the following is the FBI's definition of terrorism? A) the unlawful use of force and violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives B) the systematic use of terror or unpredictable violence against governments, publics, or individuals to attain a political objective C) premeditated, politically motivated violence perpetrated against noncombatant targets by subnational groups or clandestine agents, usually intended to influence an audience D) the unlawful use, or threatened use, of force or violence by a group or individual based and operating entirely within the United States or its territories without foreign direction committed against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives

patrol

Which of the following is unquestionably the most time-consuming and resource-intensive task of any police agency?

D

With DNA profiling, a unique genetic profile can be derived from ____ found at the scene of a crime or on a victim. A) hair B) semen C) blood D) all of the above

C

Your textbook names five roles that investigators may play in a police department. Three are listed below. Which one does NOT belong? A) Investigators conducting background checks of applicants to the police department. B) Uniformed patrol officers investigating the crimes they have been dispatched to or have encountered on their own while on patrol. C) Uniformed police officers conducting field interrogations and other types of aggressive patrol. D) Internal affairs investigators conducting investigations of alleged crimes by police personnel.

A

Your textbook names three distinct functions of DNA profiling. They are listed below. Which of the following is NOT one of these distinct functions? A) Collecting samples from all people at birth, so that a complete DNA database can be compiled. B) Clearing innocent people convicted of rape and murder years after they began serving their sentences. C) Linking or eliminating identified suspects to a crime. D) Identifying "cold hits" where a sample from a crime scene is matched against numerous cases in a DNA database and a positive match is made.

A

Your textbook names three reasons why many victims of cybercrime fail to report these crimes to authorities. Which of the following is NOT one of the reasons listed in your textbook? A) The fear of being implicated in the crime B) The shame of not providing adequate security to protect trusted assets C) The fear of losing public confidence as a result of being a victim D) The attention to their vulnerability that a crime report would attract

D

Criminal investigation has been defined as a lawful search of people and things to achieve three of the following goals. Which of the following is NOT one of the goals of criminal investigation? A) Apprehend or determine the guilty party B) Reconstruct the circumstances of an illegal act C) Aid in the state's prosecution of the offender D) Conduct preventive patrol to ferret out crime

killed in automobile accidents; murdered

Each year, nearly twice as many people are ____ as are ____.

A

Following are three parts of the acronym SARA, which some community policing advocates recommend as a four-step problem-solving process. Which of the following is NOT one of the components of SARA? A) Arrival—determining the situation's timeliness B) Assessment—determining the solutions' effect C) Response—developing and implementing solutions D) Scanning—identifying problems

local police officer

For most people, the only personal experience they have with the criminal justice process is contact with a:

directed

In ____ patrol, officers are given guidance on how to use their patrol time, which is often based on the results of crime analyses that identify problem areas.

D

In recent years, the mission of D.A.R.E. has expanded to include: A) internet safety and gang involvement prevention B) bullying prevention, and cyber bullying prevention C) prescription and over-the-counter drug abuse prevention D) all of the above

B

John Broderick classified police officers by their degree of commitment to maintaining order and their respect for due process. Three of these classifications are listed below. Which one does NOT belong? A) enforcers B) punishers C) idealists D) optimists

C

One of the interesting findings of foot patrol research was that foot patrol officers were better able to deal with: A) several investigative functions, including finding DNA evidence B) drug dealers and gang problems, especially in urban areas C) minor annoyances—rowdy youths, panhandlers, and abandoned cars—that irritate citizens D) long-term vice cases that involved several suspects

preventive

Patrols that are "systematically unsystematic" and observant in an attempt to both deter and ferret out crime on their beats are known as random or ____ patrol.

90 percent

Researchers discovered that ____ of citizens wait 5-10 minutes to call the police, which prevents police from catching the criminal at the scene.

D

The knowledge to carry out cybercrimes is readily available at hacker: A) chat rooms B) message boards C) web sites D) all of the above

resource allocation

The most widely used crime-mapping application is probably ______.

false

True/False. A role expectation consists of the rights and responsibilities associated with a particular position in society.

false

True/False. A survey has revealed that law enforcement agencies have adequate training, equipment, and staff to confront present and future incidents of cybercrime.

true

True/False. Detectives usually have the cards stacked against them, and their chances of solving crimes are low.

false

True/False. Field interrogations generally do not reduce crime in targeted areas.

true

True/False. GIS crime mapping is a technique that involves the charting of crime patterns within a geographic area.

false

True/False. In some agencies, special traffic accident investigation crews are assigned to all parking violation enforcement.

aggressive

When an entire patrol section is instructed to make numerous traffic stops and field interrogations, the practice is referred to as ____ patrol.

the FBI

Which of the following agencies has the largest AFIS?

C

Which of the following is NOT true about terrorism? A) it is one of the oldest forms of human conflict B) it has been used by both right-wing and left-wing political organizations, by ethnic and nationalistic groups, by revolutionaries, and by the armies and secret police of established governments C) the modern era of terrorism began with the Japanese bombing of Pearl Harbor in 1941, according to the FBI D) the terrorist acts of 9/11 constituted the bloodiest day on American soil since the Civil War

B

With community policing: A) police focus more heavily on preventive patrol for public safety B) citizens share responsibility for their community's safety C) citizens are encouraged to learn policing methods and tactics D) police adopt a legalistic (or sometimes watchman) style of policing

A

Your textbook describes four characteristics that generally define the role of the police. Three are listed below. Which one is NOT described in your textbook? A) The police perform ongoing educational roles in the community. B) The police are community leaders in public safety. C) The police occasionally serve in a hostile or dangerous environment. D) The police solve sociological and technological problems for people on a short-term basis.

B

Your textbook describes several ways in which cybercriminals can illegally access, manipulate, or steal computer data. Three of these ways are listed below. Which is NOT one of the ways listed in your textbook? A) Cybercriminals can alter computer records at financial, business, and educational institutions. B) Cybercriminals alter DNA records, thus hampering and sometimes destroying criminal investigations. C) Cybercriminals often illegally enter computer systems and introduce viruses or worms. D) Cybercriminals illegally transfer millions of dollars to their accounts.


Related study sets

Chapter 39: Oxygenation and Perfusion

View Set