Deck 15: White Collar Crime, Cyber Crime, and Commercial Crime

ملء الشاشة (f)
exit full mode
سؤال
The principal laws protecting intellectual property are the federal copyright, patent, and trademark laws, as well as state trade secret laws.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Fraud convictions require action done knowingly because: ​

A)fraud is a crime of deceit.
B)fraud causes more harm than most other crimes.
C)too many people would be falsely convicted otherwise.
D)persons committing fraud do not always know what they are doing.
سؤال
The state bank fraud act and the wire fraud act are frequently used to convict white collar criminals.
سؤال
Offering a gift or payment to another with the specific intent to obtain some unlawful particular quid pro quo for the gift or payment is: ​

A)bribery.
B)bank fraud.
C)health care fraud.
D)intellectual property fraud.
سؤال
______ is a class or type of criminal conduct that has solely economic gain to the criminal as its goal. ​

A)White collar crime
B)Racketeering
C)Wire fraud
D)Bank fraud
سؤال
Fraud schemes may be prosecuted on the federal, but not state level. ​
سؤال
Deceitful means or acts used to cheat a person, corporation, or governmental agency are known as: ​

A)fraud.
B)forgery.
C)false statement.
D)false claims.
سؤال
A communication under the bank fraud act must cross state lines.
سؤال
The federal ______ statute makes it a federal crime to defraud a financial institution that is federally insured. ​

A)false statement
B)claims
C)bank fraud
D)wire fraud
سؤال
The federal government has no general Health Care Fraud statute which makes it a crime to willfully execute a "scheme of artifice" intended to defraud a "health care benefit" program.
سؤال
Fraud involves deceitful means or acts to cheat a person, corporation, or governmental agency.
سؤال
Crimes related to product tampering include: ​

A)extortion.
B)threats to allege tampering.
C)attempts to create the basis of a civil lawsuit.
D)All of these choices are correct.
سؤال
______ fraud is not a type of fraud. ​

A)Material
B)Bank
C)Health care
D)Intellectual property
سؤال
______ laws do not protect intellectual property. ​

A)Copyright
B)Trade secrets
C)Wire fraud
D)Intellectual property
سؤال
The federal identity theft statute requires the defendant know the identification document belongs to another person.
سؤال
Books, movies, and songs are protected by the: ​

A)federal copyright act.
B)the "fair use" doctrine.
C)federal and state laws that protect trade secrets.
D)federal wire fraud laws.
سؤال
Insider trading includes using information acquired by an insider and not available to the public to profit in a sale of securities.
سؤال
A federal officer who "solicits" a bribe in exchange for some official act and also threatens to use his official position to prevent the official act from occurring has committed extortion in addition to bribery.
سؤال
Stock market and corporate fraud declined significantly from 1990-2004.
سؤال
A ______ includes a scheme to deprive another of the intangible right of honest services. ​

A)scheme or artifice
B)scheme or neglect
C)scheme or fraud
D)scheme or deprivation
سؤال
While the "white collar" language suggests the status of the wrongdoer, most definitions of the term focus on ______ rather than the identity of the criminal. ​

A)the kind of behavior made criminal
B)the socio-economic status of the criminal
C)the thinking of the criminal
D)the social impact of the criminal
سؤال
Quid pro quo requires from an official: ​

A)the exercise of some influence.
B)an agreement on a specific official act.
C)multiple exercises of some influence.
D)an agreement on numerous specific official acts.
سؤال
The two types of identity theft are: ​

A)true name and synthetic identity.
B)false name and synthetic identity.
C)true name and false identity.
D)synthetic name and true identity.
سؤال
______ is not a consequence that could result from importation of a counterfeit product into the United States. ​

A)Prosecution under the criminal code of a state
B)Civil suit and sanctions
C)Federal prosecution under the mail fraud statute
D)Charges of espionage being levied
سؤال
An element that is included in wire fraud but not necessary in bank fraud is: ​

A)the wire communication must cross state lines.
B)the bank fraud must cross state lines.
C)the wire communication must cross international borders.
D)the bank fraud must cross international borders.
سؤال
Bribery under the federal statute is similar to extortion, because it is not necessary in an extortion prosecution to prove an official threatened to use his official authority if: ​

A)the extortion amount was not paid.
B)the extortion amount was paid.
C)the extortion was carried out.
D)the extortion was only planned.
سؤال
Criminal acts implemented through use of a computer are: ​

A)cyber crime.
B)identity theft.
C)wire fraud.
D)video voyeurism.
سؤال
"Outsiders," "insiders," and "tippees" are a part of the crime of: ​

A)insider trading.
B)wire fraud.
C)bank fraud.
D)identity theft.
سؤال
The criminal charge often used in fraud cases is: ​

A)theft by fraud or larceny by fraud.
B)theft by fraud.
C)larceny by fraud.
D)neither theft nor fraud.
سؤال
It has been estimated that the yearly cost of healthcare fraud is more than: ​

A)$100 billion.
B)$80 billion.
C)$65 billion.
D)$50 billion.
سؤال
The term that means giving something of value for something else is: ​

A)quid pro quo .
B)pro bono .
C)pro rata .
D)quid pro bono .
سؤال
The economic cost of white collar crimes is: ​

A)enormous.
B)slight.
C)the same as many other crimes.
D)less than many other crimes.
سؤال
Insider trading includes a person called the: ​

A)tippee.
B)tipper.
C)rippee.
D)ripper.
سؤال
Insider trading includes using information acquired by an insider and: ​

A)not available to the public to profit in a sale of securities.
B)paid for through bribery.
C)received by extorting a government official.
D)gained through illegal entry.
سؤال
Unlawful access to a computer or computer system with intent to commit a crime is: ​

A)computer trespass.
B)identity theft.
C)wire fraud.
D)video voyeurism.
سؤال
The _____ makes it a crime to present a claim to the US government that is false or fraudulent and known to be false or fraudulent. ​

A)False Claims Act
B)Hobbs Act
C)Pendelton Act
D)Government Claims Act
سؤال
Fraud and corruption in government does not include: ​

A)contract fraud.
B)false claims.
C)program fraud.
D)stock market fraud.
سؤال
______ identity theft is the crime that occurs when an actual person's identity is stolen. ​

A)True name
B)Synthetic
C)Cyber
D)Wire
سؤال
The US Supreme Court has held that any "scheme or artifice" must include: ​

A)a material falsehood.
B)a legal falsehood.
C)a criminal falsehood.
D)a falsehood.
سؤال
Theft, piracy, or counterfeiting of ideas, inventions, artistic works, and the like is: ​

A)copyright laws.
B)trade secrets.
C)wire fraud.
D)intellectual property fraud.
سؤال
A federal officer who threatens to use his official position to prevent the official act from occurring would be guilty of: ​

A)bribery.
B)bank fraud.
C)extortion.
D)property fraud.
سؤال
The principal problem in counterfeiting is _____, many of whom live in foreign countries and are producing counterfeit money that is difficult to detect. ​

A)casual counterfeiters
B)professional craftspeople
C)amateur counterfeiters
D)None of these choices
سؤال
Craig and Jamie really love music, movies, and just about anything that can be played, watched, or listened to on an electronic device. Craig downloads several songs and a couple of movies, paying the movie and song companies for them. He then exports them to Jamie so that she may watch and listen at her leisure. Jamie pays Craig five dollars for the bundle.

A)Craig would be in violation of the federal copyright act when he: ​
B)transferred them to Jamie's computer.
C)took five dollars in payment from Jamie.
D)failed to inform the record and movie companies of the sale.
E)failed to pay income tax on the five dollar sale.
سؤال
Craig and Jamie really love music, movies, and just about anything that can be played, watched, or listened to on an electronic device. Craig downloads several songs and a couple of movies, paying the movie and song companies for them. He then exports them to Jamie so that she may watch and listen at her leisure. Jamie pays Craig five dollars for the bundle.

A)The movies and songs which Craig downloaded would not be a violation of: ​
B)federal copyright act. ​
C)the "fair use" doctrine.
D)federal and state laws that protect trade secrets.
E)federal wire fraud laws.
سؤال
If a person, including a firefighter, is killed or suffers serious bodily injury as a result of the fire, the charge would be: ​

A)arson.
B)manipulative arson.
C)felony arson.
D)aggravated arson.
سؤال
Craig and Jamie really love music, movies, and just about anything that can be played, watched, or listened to on an electronic device. Craig downloads several songs and a couple of movies, paying the movie and song companies for them. He then exports them to Jamie so that she may watch and listen at her leisure. Jamie pays Craig five dollars for the bundle.

A)Ultimately Craig was convicted of: ​
B)intellectual property fraud.
C)computer fraud.
D)federal and state laws that protect trade secrets.
E)federal wire fraud laws.
سؤال
Arson is not characterized by being: ​

A)the easiest of the major crimes to commit.
B)difficult to detect.
C)the hardest to prove in court.
D)generally unsuccessful.
سؤال
Theft based on stealing a real person's identification information or theft based on creating a fictitious person's identification is: ​

A)identity theft.
B)synthetic identity theft.
C)cyber identity theft.
D)wire identity theft.
سؤال
Any person who executes a scheme or artifice to defraud the United States in excess of $1,000,000 is guilty of: ​

A)contract fraud.
B)significant fraud.
C)large-scale fraud.
D)major fraud.
سؤال
Craig and Jamie really love music, movies, and just about anything that can be played, watched, or listened to on an electronic device. Craig downloads several songs and a couple of movies, paying the movie and song companies for them. He then exports them to Jamie so that she may watch and listen at her leisure. Jamie pays Craig five dollars for the bundle.

A)Craig attempts to argue that Jamie and he are educators and intended all along to use the movies and music only in the classroom where ___ would apply. ​
B)the federal copyright act
C)the "fair use" doctrine
D)federal and state laws that protect trade secrets
E)federal wire fraud laws
سؤال
Linda decides she needs some furnishings for her room, but is currently out of work and out of cash. She's maxed out on her credit cards, but in the mail a solicitation from a credit card company arrives, addressed to Linda's roommate. Linda sees an opportunity and goes online to apply, posing as the roommate. Two weeks later, the new credit card arrives and off goes Linda to the stores.

A)Because Linda applied for the credit card online, she may be charged with: ​
B)cyber crime.
C)identity theft.
D)wire fraud.
E)video voyeurism.
سؤال
Mary has been going through some difficult times and needs some extra money. She works as a fresh produce inspector in Florida, inspecting oranges for major growers. On her word, thousands of tons of oranges would have to be discarded for failing to pass a health inspection. She suggests to the owner that she could "fix" it so he need never worry about ever failing an inspection.

A)The quid pro quo requirement was met in this instance because Mary: ​
B)exercised some influence over the grower.
C)acted in an official capacity as an inspector. ​
D)took some oranges home with her.
E)failed to protect the consumer.
سؤال
Mary has been going through some difficult times and needs some extra money. She works as a fresh produce inspector in Florida, inspecting oranges for major growers. On her word, thousands of tons of oranges would have to be discarded for failing to pass a health inspection. She suggests to the owner that she could "fix" it so he need never worry about ever failing an inspection.

A)The orange grower would be charged with: ​
B)extortion.
C)bribery.
D)fruit fraud.
E)None of these choices.
سؤال
A person's deliberate, willful, and malicious burning of a building or personal property is: ​

A)arson.
B)fire starter.
C)flame initiator.
D)fraud.
سؤال
A program that sends multiple possible passwords to enter a computer is: ​

A)brute force. ​
B)gale force.
C)wired tactics.
D)strong arm tactics.
سؤال
In _____, a fictitious person's name or Social Security number are used to commit the theft. ​

A)true name identity theft
B)synthetic identity theft
C)cyber identity theft
D)wire identity theft
سؤال
Linda decides she needs some furnishings for her room, but is currently out of work and out of cash. She's maxed out on her credit cards, but in the mail a solicitation from a credit card company arrives, addressed to Linda's roommate. Linda sees an opportunity and goes online to apply, posing as the roommate. Two weeks later, the new credit card arrives and off goes Linda to the stores.

A)Because of Linda's use of the credit card in her roommate's name, she would be charged with: ​
B)"true name" identity theft.
C)"synthetic" identity theft.
D)cyber identity theft.
E)wire identity theft.
سؤال
Linda decides she needs some furnishings for her room, but is currently out of work and out of cash. She's maxed out on her credit cards, but in the mail a solicitation from a credit card company arrives, addressed to Linda's roommate. Linda sees an opportunity and goes online to apply, posing as the roommate. Two weeks later, the new credit card arrives and off goes Linda to the stores.

A)Linda argues that since the solicitation was for her roommate, then she could not have stolen her identity (and anyway, she meant to pay her back). The police ignore Linda and charge her with the use of ____ for each time she signed a sale's slip. ​
B)false identification
C)"synthetic" identification
D)theft
E)mail fraud
سؤال
Sophisticated color copiers allow what law enforcement officers call  "________" to print thousands of crude bills. ​

A)casual counterfeiters
B)professional craftspeople
C)amateur counterfeiters
D)casual craftspeople
سؤال
Mary has been going through some difficult times and needs some extra money. She works as a fresh produce inspector in Florida, inspecting oranges for major growers. On her word, thousands of tons of oranges would have to be discarded for failing to pass a health inspection. She suggests to the owner that she could "fix" it so he need never worry about ever failing an inspection.

A)On the other hand, Mary would be charged with: ​
B)extortion.
C)bribery.
D)fruit fraud.
E)consumer fraud.
سؤال
The primary criminal laws aimed at ____ property fraud are the federal copyright and patent acts and federal and state trade secret acts.
سؤال
The federal _____ fraud act and the wire fraud act are frequently used to convict white-collar criminals.
سؤال
The _______________ Claims Act makes it a crime to present a claim to the US government that is false or fraudulent.
سؤال
Compare and contrast bribery and extortion. State an example of a crime which includes both bribery and extortion.
سؤال
The federal government has passed many criminal laws directed at health care fraud, such as the ______ False Claims Statute.
سؤال
A class or type of criminal conduct that has solely economic gain to the criminal as its goal is the definition of ____ crime.
سؤال
A person's deliberate, willful, and malicious burning of a building or personal property is called ____.
سؤال
Fraud is in essence a crime of ___.
سؤال
Explain what is involved in the crime known as insider trading, and explain why the government is interested in controlling this type of behavior.
سؤال
Theft based on stealing a real person's identification information or theft based on creating a fictitious person's identification is called ____.
سؤال
Giving something of value (" quid ") for something else is called _____. ​
سؤال
State the definition of white-collar crime. List some examples of this type of crime. Provide an example of a famous white-collar criminal and explain his or her crime.
سؤال
The receipt of unlawful payment to an official may prove ___, and also could prove bribery.
سؤال
List two federal criminal statutes frequently used to convict white-collar criminals.
سؤال
Criminal acts implemented through use of a computer or other form of electronic communication are called ____.
سؤال
Unlawful access to a computer or computer system with intent to commit a crime or unlawful access to a computer or computer system maintained by a government unit is called ____.
سؤال
Explain what constitutes "cyber crime," and how states and the federal government are addressing it.
سؤال
Among the crimes created to protect stock markets and financial markets of the US is the crime of insider _________.
سؤال
Using deceitful acts to cheat another is called __________.
سؤال
Congress has power to punish most large fraud schemes under the __________ commerce clause.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/86
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 15: White Collar Crime, Cyber Crime, and Commercial Crime
1
The principal laws protecting intellectual property are the federal copyright, patent, and trademark laws, as well as state trade secret laws.
True
2
Fraud convictions require action done knowingly because: ​

A)fraud is a crime of deceit.
B)fraud causes more harm than most other crimes.
C)too many people would be falsely convicted otherwise.
D)persons committing fraud do not always know what they are doing.
A
3
The state bank fraud act and the wire fraud act are frequently used to convict white collar criminals.
False
4
Offering a gift or payment to another with the specific intent to obtain some unlawful particular quid pro quo for the gift or payment is: ​

A)bribery.
B)bank fraud.
C)health care fraud.
D)intellectual property fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
5
______ is a class or type of criminal conduct that has solely economic gain to the criminal as its goal. ​

A)White collar crime
B)Racketeering
C)Wire fraud
D)Bank fraud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
6
Fraud schemes may be prosecuted on the federal, but not state level. ​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
7
Deceitful means or acts used to cheat a person, corporation, or governmental agency are known as: ​

A)fraud.
B)forgery.
C)false statement.
D)false claims.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
8
A communication under the bank fraud act must cross state lines.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
9
The federal ______ statute makes it a federal crime to defraud a financial institution that is federally insured. ​

A)false statement
B)claims
C)bank fraud
D)wire fraud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
10
The federal government has no general Health Care Fraud statute which makes it a crime to willfully execute a "scheme of artifice" intended to defraud a "health care benefit" program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
11
Fraud involves deceitful means or acts to cheat a person, corporation, or governmental agency.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
12
Crimes related to product tampering include: ​

A)extortion.
B)threats to allege tampering.
C)attempts to create the basis of a civil lawsuit.
D)All of these choices are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
13
______ fraud is not a type of fraud. ​

A)Material
B)Bank
C)Health care
D)Intellectual property
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
14
______ laws do not protect intellectual property. ​

A)Copyright
B)Trade secrets
C)Wire fraud
D)Intellectual property
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
15
The federal identity theft statute requires the defendant know the identification document belongs to another person.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
16
Books, movies, and songs are protected by the: ​

A)federal copyright act.
B)the "fair use" doctrine.
C)federal and state laws that protect trade secrets.
D)federal wire fraud laws.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
17
Insider trading includes using information acquired by an insider and not available to the public to profit in a sale of securities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
18
A federal officer who "solicits" a bribe in exchange for some official act and also threatens to use his official position to prevent the official act from occurring has committed extortion in addition to bribery.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
19
Stock market and corporate fraud declined significantly from 1990-2004.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
20
A ______ includes a scheme to deprive another of the intangible right of honest services. ​

A)scheme or artifice
B)scheme or neglect
C)scheme or fraud
D)scheme or deprivation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
21
While the "white collar" language suggests the status of the wrongdoer, most definitions of the term focus on ______ rather than the identity of the criminal. ​

A)the kind of behavior made criminal
B)the socio-economic status of the criminal
C)the thinking of the criminal
D)the social impact of the criminal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
22
Quid pro quo requires from an official: ​

A)the exercise of some influence.
B)an agreement on a specific official act.
C)multiple exercises of some influence.
D)an agreement on numerous specific official acts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
23
The two types of identity theft are: ​

A)true name and synthetic identity.
B)false name and synthetic identity.
C)true name and false identity.
D)synthetic name and true identity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
24
______ is not a consequence that could result from importation of a counterfeit product into the United States. ​

A)Prosecution under the criminal code of a state
B)Civil suit and sanctions
C)Federal prosecution under the mail fraud statute
D)Charges of espionage being levied
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
25
An element that is included in wire fraud but not necessary in bank fraud is: ​

A)the wire communication must cross state lines.
B)the bank fraud must cross state lines.
C)the wire communication must cross international borders.
D)the bank fraud must cross international borders.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
26
Bribery under the federal statute is similar to extortion, because it is not necessary in an extortion prosecution to prove an official threatened to use his official authority if: ​

A)the extortion amount was not paid.
B)the extortion amount was paid.
C)the extortion was carried out.
D)the extortion was only planned.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
27
Criminal acts implemented through use of a computer are: ​

A)cyber crime.
B)identity theft.
C)wire fraud.
D)video voyeurism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
28
"Outsiders," "insiders," and "tippees" are a part of the crime of: ​

A)insider trading.
B)wire fraud.
C)bank fraud.
D)identity theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
29
The criminal charge often used in fraud cases is: ​

A)theft by fraud or larceny by fraud.
B)theft by fraud.
C)larceny by fraud.
D)neither theft nor fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
30
It has been estimated that the yearly cost of healthcare fraud is more than: ​

A)$100 billion.
B)$80 billion.
C)$65 billion.
D)$50 billion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
31
The term that means giving something of value for something else is: ​

A)quid pro quo .
B)pro bono .
C)pro rata .
D)quid pro bono .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
32
The economic cost of white collar crimes is: ​

A)enormous.
B)slight.
C)the same as many other crimes.
D)less than many other crimes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
33
Insider trading includes a person called the: ​

A)tippee.
B)tipper.
C)rippee.
D)ripper.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
34
Insider trading includes using information acquired by an insider and: ​

A)not available to the public to profit in a sale of securities.
B)paid for through bribery.
C)received by extorting a government official.
D)gained through illegal entry.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
35
Unlawful access to a computer or computer system with intent to commit a crime is: ​

A)computer trespass.
B)identity theft.
C)wire fraud.
D)video voyeurism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
36
The _____ makes it a crime to present a claim to the US government that is false or fraudulent and known to be false or fraudulent. ​

A)False Claims Act
B)Hobbs Act
C)Pendelton Act
D)Government Claims Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
37
Fraud and corruption in government does not include: ​

A)contract fraud.
B)false claims.
C)program fraud.
D)stock market fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
38
______ identity theft is the crime that occurs when an actual person's identity is stolen. ​

A)True name
B)Synthetic
C)Cyber
D)Wire
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
39
The US Supreme Court has held that any "scheme or artifice" must include: ​

A)a material falsehood.
B)a legal falsehood.
C)a criminal falsehood.
D)a falsehood.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
40
Theft, piracy, or counterfeiting of ideas, inventions, artistic works, and the like is: ​

A)copyright laws.
B)trade secrets.
C)wire fraud.
D)intellectual property fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
41
A federal officer who threatens to use his official position to prevent the official act from occurring would be guilty of: ​

A)bribery.
B)bank fraud.
C)extortion.
D)property fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
42
The principal problem in counterfeiting is _____, many of whom live in foreign countries and are producing counterfeit money that is difficult to detect. ​

A)casual counterfeiters
B)professional craftspeople
C)amateur counterfeiters
D)None of these choices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
43
Craig and Jamie really love music, movies, and just about anything that can be played, watched, or listened to on an electronic device. Craig downloads several songs and a couple of movies, paying the movie and song companies for them. He then exports them to Jamie so that she may watch and listen at her leisure. Jamie pays Craig five dollars for the bundle.

A)Craig would be in violation of the federal copyright act when he: ​
B)transferred them to Jamie's computer.
C)took five dollars in payment from Jamie.
D)failed to inform the record and movie companies of the sale.
E)failed to pay income tax on the five dollar sale.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
44
Craig and Jamie really love music, movies, and just about anything that can be played, watched, or listened to on an electronic device. Craig downloads several songs and a couple of movies, paying the movie and song companies for them. He then exports them to Jamie so that she may watch and listen at her leisure. Jamie pays Craig five dollars for the bundle.

A)The movies and songs which Craig downloaded would not be a violation of: ​
B)federal copyright act. ​
C)the "fair use" doctrine.
D)federal and state laws that protect trade secrets.
E)federal wire fraud laws.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
45
If a person, including a firefighter, is killed or suffers serious bodily injury as a result of the fire, the charge would be: ​

A)arson.
B)manipulative arson.
C)felony arson.
D)aggravated arson.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
46
Craig and Jamie really love music, movies, and just about anything that can be played, watched, or listened to on an electronic device. Craig downloads several songs and a couple of movies, paying the movie and song companies for them. He then exports them to Jamie so that she may watch and listen at her leisure. Jamie pays Craig five dollars for the bundle.

A)Ultimately Craig was convicted of: ​
B)intellectual property fraud.
C)computer fraud.
D)federal and state laws that protect trade secrets.
E)federal wire fraud laws.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
47
Arson is not characterized by being: ​

A)the easiest of the major crimes to commit.
B)difficult to detect.
C)the hardest to prove in court.
D)generally unsuccessful.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
48
Theft based on stealing a real person's identification information or theft based on creating a fictitious person's identification is: ​

A)identity theft.
B)synthetic identity theft.
C)cyber identity theft.
D)wire identity theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
49
Any person who executes a scheme or artifice to defraud the United States in excess of $1,000,000 is guilty of: ​

A)contract fraud.
B)significant fraud.
C)large-scale fraud.
D)major fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
50
Craig and Jamie really love music, movies, and just about anything that can be played, watched, or listened to on an electronic device. Craig downloads several songs and a couple of movies, paying the movie and song companies for them. He then exports them to Jamie so that she may watch and listen at her leisure. Jamie pays Craig five dollars for the bundle.

A)Craig attempts to argue that Jamie and he are educators and intended all along to use the movies and music only in the classroom where ___ would apply. ​
B)the federal copyright act
C)the "fair use" doctrine
D)federal and state laws that protect trade secrets
E)federal wire fraud laws
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
51
Linda decides she needs some furnishings for her room, but is currently out of work and out of cash. She's maxed out on her credit cards, but in the mail a solicitation from a credit card company arrives, addressed to Linda's roommate. Linda sees an opportunity and goes online to apply, posing as the roommate. Two weeks later, the new credit card arrives and off goes Linda to the stores.

A)Because Linda applied for the credit card online, she may be charged with: ​
B)cyber crime.
C)identity theft.
D)wire fraud.
E)video voyeurism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
52
Mary has been going through some difficult times and needs some extra money. She works as a fresh produce inspector in Florida, inspecting oranges for major growers. On her word, thousands of tons of oranges would have to be discarded for failing to pass a health inspection. She suggests to the owner that she could "fix" it so he need never worry about ever failing an inspection.

A)The quid pro quo requirement was met in this instance because Mary: ​
B)exercised some influence over the grower.
C)acted in an official capacity as an inspector. ​
D)took some oranges home with her.
E)failed to protect the consumer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
53
Mary has been going through some difficult times and needs some extra money. She works as a fresh produce inspector in Florida, inspecting oranges for major growers. On her word, thousands of tons of oranges would have to be discarded for failing to pass a health inspection. She suggests to the owner that she could "fix" it so he need never worry about ever failing an inspection.

A)The orange grower would be charged with: ​
B)extortion.
C)bribery.
D)fruit fraud.
E)None of these choices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
54
A person's deliberate, willful, and malicious burning of a building or personal property is: ​

A)arson.
B)fire starter.
C)flame initiator.
D)fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
55
A program that sends multiple possible passwords to enter a computer is: ​

A)brute force. ​
B)gale force.
C)wired tactics.
D)strong arm tactics.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
56
In _____, a fictitious person's name or Social Security number are used to commit the theft. ​

A)true name identity theft
B)synthetic identity theft
C)cyber identity theft
D)wire identity theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
57
Linda decides she needs some furnishings for her room, but is currently out of work and out of cash. She's maxed out on her credit cards, but in the mail a solicitation from a credit card company arrives, addressed to Linda's roommate. Linda sees an opportunity and goes online to apply, posing as the roommate. Two weeks later, the new credit card arrives and off goes Linda to the stores.

A)Because of Linda's use of the credit card in her roommate's name, she would be charged with: ​
B)"true name" identity theft.
C)"synthetic" identity theft.
D)cyber identity theft.
E)wire identity theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
58
Linda decides she needs some furnishings for her room, but is currently out of work and out of cash. She's maxed out on her credit cards, but in the mail a solicitation from a credit card company arrives, addressed to Linda's roommate. Linda sees an opportunity and goes online to apply, posing as the roommate. Two weeks later, the new credit card arrives and off goes Linda to the stores.

A)Linda argues that since the solicitation was for her roommate, then she could not have stolen her identity (and anyway, she meant to pay her back). The police ignore Linda and charge her with the use of ____ for each time she signed a sale's slip. ​
B)false identification
C)"synthetic" identification
D)theft
E)mail fraud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
59
Sophisticated color copiers allow what law enforcement officers call  "________" to print thousands of crude bills. ​

A)casual counterfeiters
B)professional craftspeople
C)amateur counterfeiters
D)casual craftspeople
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
60
Mary has been going through some difficult times and needs some extra money. She works as a fresh produce inspector in Florida, inspecting oranges for major growers. On her word, thousands of tons of oranges would have to be discarded for failing to pass a health inspection. She suggests to the owner that she could "fix" it so he need never worry about ever failing an inspection.

A)On the other hand, Mary would be charged with: ​
B)extortion.
C)bribery.
D)fruit fraud.
E)consumer fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
61
The primary criminal laws aimed at ____ property fraud are the federal copyright and patent acts and federal and state trade secret acts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
62
The federal _____ fraud act and the wire fraud act are frequently used to convict white-collar criminals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
63
The _______________ Claims Act makes it a crime to present a claim to the US government that is false or fraudulent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
64
Compare and contrast bribery and extortion. State an example of a crime which includes both bribery and extortion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
65
The federal government has passed many criminal laws directed at health care fraud, such as the ______ False Claims Statute.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
66
A class or type of criminal conduct that has solely economic gain to the criminal as its goal is the definition of ____ crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
67
A person's deliberate, willful, and malicious burning of a building or personal property is called ____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
68
Fraud is in essence a crime of ___.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
69
Explain what is involved in the crime known as insider trading, and explain why the government is interested in controlling this type of behavior.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
70
Theft based on stealing a real person's identification information or theft based on creating a fictitious person's identification is called ____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
71
Giving something of value (" quid ") for something else is called _____. ​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
72
State the definition of white-collar crime. List some examples of this type of crime. Provide an example of a famous white-collar criminal and explain his or her crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
73
The receipt of unlawful payment to an official may prove ___, and also could prove bribery.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
74
List two federal criminal statutes frequently used to convict white-collar criminals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
75
Criminal acts implemented through use of a computer or other form of electronic communication are called ____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
76
Unlawful access to a computer or computer system with intent to commit a crime or unlawful access to a computer or computer system maintained by a government unit is called ____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
77
Explain what constitutes "cyber crime," and how states and the federal government are addressing it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
78
Among the crimes created to protect stock markets and financial markets of the US is the crime of insider _________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
79
Using deceitful acts to cheat another is called __________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
80
Congress has power to punish most large fraud schemes under the __________ commerce clause.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.