Deck 12: Federal Rules and Criminal Codes

ملء الشاشة (f)
exit full mode
سؤال
If records obtained by wiretap are not turned over to a judge in a reasonable amount of time,the records are

A)Still admissible
B)Sealed until the trial
C)Turned over to the subject of the wiretap or his legal representative
D)Inadmissible
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
What are laws?

A)Regulations that govern legal conduct
B)Regulations that govern the conduct of the people
C)Regulations that govern a society
D)Expectations of the people for a decent society
سؤال
Under the Federal Rules of Civil Procedure,which two rules regulate the production of evidence?

A)Rules 26 and 35
B)Rules 34 and 23
C)Rules 26 and 34
D)Rules 25 and 33
سؤال
Which of the following is considered a fundamental principle in ensuring there is no prejudicial treatment?

A)The Federal Rules of Evidence
B)Fair Use Act
C)Fair Trial Act
D)Due process of the law
سؤال
Federal rules and laws are changed

A)To keep up with political policies
B)To help explain the differences in physical and cyberlaws
C)To help govern regulations
D)To keep up with new technology
سؤال
Rules that state what types of evidence can or cannot be presented in court are referred to as ________ rules.
سؤال
Which of the following was the first law to address computer crime in which the computer is the subject of the crime?

A)Electronic Communications Privacy Act
B)USA PATRIOT Act
C)Computer Fraud and Abuse Act
D)Pen/Trap Statute
سؤال
Which of the following acts greatly broadened the FBI's authority to gather evidence from telephone conversations,e-mail,pagers,and other forms of electronic communication?

A)Electronic Communications Privacy Act
B)USA PATRIOT Act
C)Computer Fraud and Abuse Act
D)Pen/Trap Statute
سؤال
Many rules of evidence concentrate first on

A)How the evidence was obtained
B)Where the evidence was obtained
C)Whether the chain of custody is intact
D)Whether the evidence is relevant
سؤال
The act that can sometimes take precedence over the right to privacy guaranteed by the Fourth Amendment is the

A)Electronic Communications Privacy Act
B)Federal Wiretap Statute
C)Computer Fraud and Abuse Act
D)Pen/Trap Statute
سؤال
What amendment must a law enforcement office check before seizing hardware or computers?

A)The Fourth Amendment
B)The Sixth Amendment
C)The Eighth Amendment
D)The Tenth Amendment
سؤال
What are rules?

A)Regulations that govern legal conduct
B)Regulations that govern the conduct of the people
C)Regulations that govern a society
D)Expectations of the people for a decent society
سؤال
Examples of circumstantial evidence that can be used to authenticate a physical document include all of the following EXCEPT

A)The document's appearance
B)The application that created the document
C)The document's substance
D)The document's content
سؤال
Which of the following needs to be checked prior to accessing stored electronic communications?

A)The Fourth Amendment
B)Electronic Communication Privacy Act
C)The Fourteenth Amendment
D)The Eighteenth Amendment
سؤال
A motion by a lawyer before trial to determine whether or not evidence is admissible is called a(n)________.
سؤال
Electronic records that are business records made during the ordinary course of business are admissible under the

A)Business records exception rule
B)Hearsay evidence rule
C)Business exclusionary rule
D)Motion in limine rule
سؤال
One way that companies and government agencies can limit the right of privacy employees expect is by

A)Having employees sign a waiver of their Fourth Amendment rights
B)Asking employees to use computer equipment responsibly
C)Having employees sign an acceptable use policy that states explicitly what rights employees have
D)Providing legal counsel for employees who think their privacy rights have been violated
سؤال
Evidence has ________ value if it is sufficiently useful to prove something important.
سؤال
The ________ is the judge or the jury who will decide a case.
سؤال
Criminal and civil cases follow federal or state rules to prevent any ________,or unequal,treatment.
سؤال
The ________ extended the Federal Wiretap Statute to include authority over digital transmissions over computer networks.
سؤال
In the case ________,circumstantial e-mail evidence was used to convict the defendant of fraud and other charges brought against him.
سؤال
The ________ has been used to prosecute virus creators,hackers,identity thieves,and persons who use computers to commit fraud.
سؤال
The same circumstantial evidence the courts use to authenticate physical documents applies to ________ as well.
سؤال
The Frye test that Rule 702 relied upon was replaced with the ________ test.
سؤال
The ________ provision of the USA PATRIOT Act allows law enforcement to delay notifying persons of searches.
سؤال
Real-time interception of computer information in transit falls under the ________ Statute.
سؤال
Bush's authorization for the NSA to perform warrantless wiretaps was in direct conflict with ________,the act that was already in use to provide surveillance options.
سؤال
The ________ is a mechanical device that can be attached to a specific telephone line at a telephone office.
سؤال
________ can reveal a person's location using information from cell phone and cellular service provider.
سؤال
Match between columns
Electronic Communications Privacy Act
Requires that recordings be handed over to a judge
Electronic Communications Privacy Act
Forces ISPs to turn over names of suspected music pirates upon subpoena
Electronic Communications Privacy Act
Includes new guidance relating to computer crime and eevidence
Electronic Communications Privacy Act
Permits an ISP to look through stored e-mail messages
سؤال
Match between columns
Relevancy
Qualified experts may testify though not eyewitnesses
Relevancy
The evidence is valuable to an issue of the case
Relevancy
Keeps private attorney-client communications
Relevancy
The evidence is what it claims to be
Relevancy
Ruling against "out of court" statements
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/32
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Federal Rules and Criminal Codes
1
If records obtained by wiretap are not turned over to a judge in a reasonable amount of time,the records are

A)Still admissible
B)Sealed until the trial
C)Turned over to the subject of the wiretap or his legal representative
D)Inadmissible
D
2
What are laws?

A)Regulations that govern legal conduct
B)Regulations that govern the conduct of the people
C)Regulations that govern a society
D)Expectations of the people for a decent society
B
3
Under the Federal Rules of Civil Procedure,which two rules regulate the production of evidence?

A)Rules 26 and 35
B)Rules 34 and 23
C)Rules 26 and 34
D)Rules 25 and 33
C
4
Which of the following is considered a fundamental principle in ensuring there is no prejudicial treatment?

A)The Federal Rules of Evidence
B)Fair Use Act
C)Fair Trial Act
D)Due process of the law
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
5
Federal rules and laws are changed

A)To keep up with political policies
B)To help explain the differences in physical and cyberlaws
C)To help govern regulations
D)To keep up with new technology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
6
Rules that state what types of evidence can or cannot be presented in court are referred to as ________ rules.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following was the first law to address computer crime in which the computer is the subject of the crime?

A)Electronic Communications Privacy Act
B)USA PATRIOT Act
C)Computer Fraud and Abuse Act
D)Pen/Trap Statute
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following acts greatly broadened the FBI's authority to gather evidence from telephone conversations,e-mail,pagers,and other forms of electronic communication?

A)Electronic Communications Privacy Act
B)USA PATRIOT Act
C)Computer Fraud and Abuse Act
D)Pen/Trap Statute
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
9
Many rules of evidence concentrate first on

A)How the evidence was obtained
B)Where the evidence was obtained
C)Whether the chain of custody is intact
D)Whether the evidence is relevant
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
10
The act that can sometimes take precedence over the right to privacy guaranteed by the Fourth Amendment is the

A)Electronic Communications Privacy Act
B)Federal Wiretap Statute
C)Computer Fraud and Abuse Act
D)Pen/Trap Statute
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
11
What amendment must a law enforcement office check before seizing hardware or computers?

A)The Fourth Amendment
B)The Sixth Amendment
C)The Eighth Amendment
D)The Tenth Amendment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
12
What are rules?

A)Regulations that govern legal conduct
B)Regulations that govern the conduct of the people
C)Regulations that govern a society
D)Expectations of the people for a decent society
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
13
Examples of circumstantial evidence that can be used to authenticate a physical document include all of the following EXCEPT

A)The document's appearance
B)The application that created the document
C)The document's substance
D)The document's content
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following needs to be checked prior to accessing stored electronic communications?

A)The Fourth Amendment
B)Electronic Communication Privacy Act
C)The Fourteenth Amendment
D)The Eighteenth Amendment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
15
A motion by a lawyer before trial to determine whether or not evidence is admissible is called a(n)________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
16
Electronic records that are business records made during the ordinary course of business are admissible under the

A)Business records exception rule
B)Hearsay evidence rule
C)Business exclusionary rule
D)Motion in limine rule
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
17
One way that companies and government agencies can limit the right of privacy employees expect is by

A)Having employees sign a waiver of their Fourth Amendment rights
B)Asking employees to use computer equipment responsibly
C)Having employees sign an acceptable use policy that states explicitly what rights employees have
D)Providing legal counsel for employees who think their privacy rights have been violated
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
18
Evidence has ________ value if it is sufficiently useful to prove something important.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
19
The ________ is the judge or the jury who will decide a case.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
20
Criminal and civil cases follow federal or state rules to prevent any ________,or unequal,treatment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
21
The ________ extended the Federal Wiretap Statute to include authority over digital transmissions over computer networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
22
In the case ________,circumstantial e-mail evidence was used to convict the defendant of fraud and other charges brought against him.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
23
The ________ has been used to prosecute virus creators,hackers,identity thieves,and persons who use computers to commit fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
24
The same circumstantial evidence the courts use to authenticate physical documents applies to ________ as well.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
25
The Frye test that Rule 702 relied upon was replaced with the ________ test.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
26
The ________ provision of the USA PATRIOT Act allows law enforcement to delay notifying persons of searches.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
27
Real-time interception of computer information in transit falls under the ________ Statute.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
28
Bush's authorization for the NSA to perform warrantless wiretaps was in direct conflict with ________,the act that was already in use to provide surveillance options.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
29
The ________ is a mechanical device that can be attached to a specific telephone line at a telephone office.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
30
________ can reveal a person's location using information from cell phone and cellular service provider.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
31
Match between columns
Electronic Communications Privacy Act
Requires that recordings be handed over to a judge
Electronic Communications Privacy Act
Forces ISPs to turn over names of suspected music pirates upon subpoena
Electronic Communications Privacy Act
Includes new guidance relating to computer crime and eevidence
Electronic Communications Privacy Act
Permits an ISP to look through stored e-mail messages
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
43
Match between columns
Relevancy
Qualified experts may testify though not eyewitnesses
Relevancy
The evidence is valuable to an issue of the case
Relevancy
Keeps private attorney-client communications
Relevancy
The evidence is what it claims to be
Relevancy
Ruling against "out of court" statements
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.