Deck 10: Criminal Law and Cyber Crime

ملء الشاشة (f)
exit full mode
سؤال
One element that normally must exist for a person to be convicted of a crime is the performance of a prohibited act.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A company takes a risk by electronically storing their online customers' credit-card numbers.
سؤال
The crime of bribery occurs when the bribe is offered-it is not required that the bribe be accepted.
سؤال
The crime of theft requires only the taking of another person's property,not the awareness that the property belongs to another.
سؤال
In the event of a RICO violation,the government can seek the divestiture of a defendant's interest in a business.
سؤال
Falsifying public records or altering a legal document is larceny.
سؤال
In a phishing attack,a perpetrator "fishes" for financial data and passwords from consumers by posing as a legitimate business.
سؤال
If a person in custody is to be subjected to interrogation,he or she must first be informed in clear and unequivocal terms that he or she has the right to remain silent.
سؤال
The sanctions imposed on criminal wrongdoers are the same as those applied in civil cases.
سؤال
The theft of trade secrets is a civil wrong but not a crime.
سؤال
In a criminal case,the state must prove its case by a preponderance of the evidence.
سؤال
An employer's failure to remit state withholding taxes that were collected from employee wages cannot constitute a crime.
سؤال
No federal statute specifically addresses cyber crime.
سؤال
For most crimes,the state must initiate prosecution within a certain number of years after the crime occurs.
سؤال
Racketeering is a single crime-engaging in financial transactions to conceal the identity,source,or destination of illegally gained funds.
سؤال
The federal criminal code lists more than four thousand criminal offenses,all of which require a specific mental state.
سؤال
Once immunity is given,a person has an absolute privilege against self-incrimination and can no longer refuse to testify on Fifth Amendment grounds.
سؤال
Under the Fourth Amendment,general searches through a person's belongings are permissible.
سؤال
The only defense to criminal liability that justifies the use of force is self-defense.
سؤال
Corporate officers and directors may be held criminally liable for the actions of employees under their supervision.
سؤال
Dreyfus points a gun at Eton,threatening to shoot him if he does not steal from his employer,Freddy's Gas & Shop store,and give the stolen funds to Dreyfus.Charged with theft,Eton can successfully claim,as a defense

A)nothing.
B)duress.
C)entrapment.
D)self-defense.
سؤال
Reno,driving while intoxicated,causes a car accident that results in the death of Santo.Reno is arrested and charged with a felony.A felony is a crime punishable by death or imprisonment for

A)any period of time.
B)more than one year.
C)more than six months.
D)more than ten days.
سؤال
Kimberly,the owner of Littleton Cinema,trusts Max to manage the theater's daily cash flow.One night,without Kimberly's knowledge or consent,Max takes and keeps $1,000 from the receipts.This is most likely

A)embezzlement.
B)larceny.
C)robbery.
D)burglary.
سؤال
Ajay sells "Bulk Up" steroids over the Internet.He is arrested and charged with the sale of a controlled substance.This is cyber crime,which is

A)a new category of crime that is not related to older types of crime.
B)a crime that occurs in the virtual community of the Internet.
C)a crime that is less real than the same crime in the physical world.
D)no crime.
سؤال
Via the Internet,Porcio sabotages the computer system of Quik Chik'n Company,a fast-food restaurant operator,to alter the ingredients in the company's recipes and products so that consumers of the foods become ill.Porcio is a

A)cyberterrorist.
B)botnet.
C)virus.
D)worm.
سؤال
Posing as Platinum Bank,Quentin e-mails Rachel,asking her to update her personal banking information through a link in the e-mail.She clicks on the link and types in the data,which Quentin promptly sells to Spence.This is

A)hacking.
B)identity theft.
C)cyberterrorism.
D)bribery.
سؤال
Owen uses the Internet to defraud Prairie Valley Credit Union.He is found guilty of wire fraud.He can be punished by

A)imprisonment for not more than one year.
B)imprisonment for up to thirty years and fines of up to $1 million.
C)fines for not more than $50,000.
D)death.
سؤال
Chaz uses his computer to secretly install software on thousands of personal computers without their owners' knowledge.The program can reproduce itself and spread from one computer to another via any USB port.This program is a

A)hacker.
B)botnet.
C)virus.
D)worm.
سؤال
Landon is arrested at a warehouse in Metro Corporate Park.A government prosecutor issues a formal charge against Landon for receiving stolen property.This charge is an

A)arraignment.
B)indictment.
C)information.
D)interrogation.
سؤال
Maura enters a gas station and points a gun at the clerk Nate.She then forces Nate to open the cash register and give her all the money.Maura can be charged with

A)burglary.
B)robbery.
C)larceny.
D)receiving stolen property.
سؤال
Laird is an employee of Motor Parts,an auto parts store.On the orders of his employer,he switches trademarks on parts that come into the store to be sold to consumers.This is most likely

A)forgery.
B)larceny.
C)robbery.
D)obtaining goods by false pretenses.
سؤال
Farouk uses his computer to break into Global Financial Center's computer.Farouk is a

A)hacker.
B)virus.
C)phisher.
D)worm.
سؤال
Leslie commits an act via e-mail against Money Investment Company,a business in New York,where the act is a cyber crime.Leslie resides in Ohio,where the act is not a crime.Prosecution of Leslie in New York involves questions of

A)jurisdiction.
B)malware.
C)phishing.
D)service-based hacking.
سؤال
Eartha receives from Fergie a guitar stolen from Harper.To be criminally liable,Eartha must

A)know that Fergie is the thief.
B)know that Harper is the true owner.
C)know that the guitar is stolen.
D)have paid for the guitar.
سؤال
Nini,a police officer,wants to search the offices of Operational Business Corporation.She asks Judge Pearl to issue a warrant.Under the Fourth Amendment,no warrant for a search can be issued without

A)double jeopardy.
B)probable cause.
C)reasonable doubt.
D)immunity.
سؤال
Megan reaches into Ned's pocket and takes his wallet-without his consent and without his immediate awareness.Unlike robbery,picking pockets does not involve

A)breaking and entering.
B)force or fear.
C)large amounts of cash.
D)weapons.
سؤال
Gem programs software to prompt a computer to continually crash and reboot.Gem intends to install this program on various companies' computer systems without the companies' knowledge.The program can reproduce itself,but must be attached to a host file to travel from one computer network to another.This program is a

A)hacker.
B)botnet.
C)virus.
D)worm.
سؤال
Skip is accused of a crime.Skip can refuse to provide information about his allegedly criminal activities

A)if he suspects the information will be used to prosecute him.
B)if the police do not promise to keep the information confidential.
C)if the information is "fruit of the poisonous tree."
D)under no circumstances.
سؤال
Quiana,an employee of Reservations for Less,Inc.,pays Svetlana,an employee of Reservations for Less' competitor Travel Cheap,Inc.,for Reservations for Less' secret pricing schedule.This may be

A)an effective marketing strategy.
B)commercial bribery.
C)insider trading.
D)money laundering.
سؤال
Klay arrests Leonida on suspicion of embezzlement.According to the United States Supreme Court in Classic Case 10.3,Miranda v.Arizona,Leonida must be apprised of certain constitutional rights

A)after any police interrogation.
B)at any time during police interrogation.
C)only at the request of the suspect's attorney.
D)prior to any police interrogation.
سؤال
Cameron is an accountant in the accounting department of Data Analytics Company.Cameron's son's college tuition is due within a week,or he cannot continue taking classes.To meet the due date,Cameron transfers funds from Data Analytics to a fictitious (false)bank account,planning to repay the firm within one month.The transfer is discovered before the firm is repaid,and Cameron is arrested.What crime,or crimes,if any,has Cameron committed
سؤال
Babs sees an e-book reader on the porch of Coco's house,takes the reader to her home,and tells everyone she owns it.Danno,wielding a knife,forces Easter to give him her smartphone,and runs away with it.Fritz breaks into Ginger's apartment,takes a laptop,and leaves.Hazel sells Idi an expensive wristwatch for a fraction of its value,admitting that the watch is stolen property but claiming that she is not the thief.Which of these acts are crimes,and what are the differences among them
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Criminal Law and Cyber Crime
1
One element that normally must exist for a person to be convicted of a crime is the performance of a prohibited act.
True
2
A company takes a risk by electronically storing their online customers' credit-card numbers.
True
3
The crime of bribery occurs when the bribe is offered-it is not required that the bribe be accepted.
True
4
The crime of theft requires only the taking of another person's property,not the awareness that the property belongs to another.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
In the event of a RICO violation,the government can seek the divestiture of a defendant's interest in a business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
Falsifying public records or altering a legal document is larceny.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
In a phishing attack,a perpetrator "fishes" for financial data and passwords from consumers by posing as a legitimate business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
If a person in custody is to be subjected to interrogation,he or she must first be informed in clear and unequivocal terms that he or she has the right to remain silent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
The sanctions imposed on criminal wrongdoers are the same as those applied in civil cases.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
The theft of trade secrets is a civil wrong but not a crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
In a criminal case,the state must prove its case by a preponderance of the evidence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
An employer's failure to remit state withholding taxes that were collected from employee wages cannot constitute a crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
No federal statute specifically addresses cyber crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
For most crimes,the state must initiate prosecution within a certain number of years after the crime occurs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
Racketeering is a single crime-engaging in financial transactions to conceal the identity,source,or destination of illegally gained funds.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
The federal criminal code lists more than four thousand criminal offenses,all of which require a specific mental state.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
Once immunity is given,a person has an absolute privilege against self-incrimination and can no longer refuse to testify on Fifth Amendment grounds.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
Under the Fourth Amendment,general searches through a person's belongings are permissible.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
The only defense to criminal liability that justifies the use of force is self-defense.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
Corporate officers and directors may be held criminally liable for the actions of employees under their supervision.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
Dreyfus points a gun at Eton,threatening to shoot him if he does not steal from his employer,Freddy's Gas & Shop store,and give the stolen funds to Dreyfus.Charged with theft,Eton can successfully claim,as a defense

A)nothing.
B)duress.
C)entrapment.
D)self-defense.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
Reno,driving while intoxicated,causes a car accident that results in the death of Santo.Reno is arrested and charged with a felony.A felony is a crime punishable by death or imprisonment for

A)any period of time.
B)more than one year.
C)more than six months.
D)more than ten days.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
Kimberly,the owner of Littleton Cinema,trusts Max to manage the theater's daily cash flow.One night,without Kimberly's knowledge or consent,Max takes and keeps $1,000 from the receipts.This is most likely

A)embezzlement.
B)larceny.
C)robbery.
D)burglary.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
Ajay sells "Bulk Up" steroids over the Internet.He is arrested and charged with the sale of a controlled substance.This is cyber crime,which is

A)a new category of crime that is not related to older types of crime.
B)a crime that occurs in the virtual community of the Internet.
C)a crime that is less real than the same crime in the physical world.
D)no crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
Via the Internet,Porcio sabotages the computer system of Quik Chik'n Company,a fast-food restaurant operator,to alter the ingredients in the company's recipes and products so that consumers of the foods become ill.Porcio is a

A)cyberterrorist.
B)botnet.
C)virus.
D)worm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
Posing as Platinum Bank,Quentin e-mails Rachel,asking her to update her personal banking information through a link in the e-mail.She clicks on the link and types in the data,which Quentin promptly sells to Spence.This is

A)hacking.
B)identity theft.
C)cyberterrorism.
D)bribery.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
Owen uses the Internet to defraud Prairie Valley Credit Union.He is found guilty of wire fraud.He can be punished by

A)imprisonment for not more than one year.
B)imprisonment for up to thirty years and fines of up to $1 million.
C)fines for not more than $50,000.
D)death.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
Chaz uses his computer to secretly install software on thousands of personal computers without their owners' knowledge.The program can reproduce itself and spread from one computer to another via any USB port.This program is a

A)hacker.
B)botnet.
C)virus.
D)worm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
Landon is arrested at a warehouse in Metro Corporate Park.A government prosecutor issues a formal charge against Landon for receiving stolen property.This charge is an

A)arraignment.
B)indictment.
C)information.
D)interrogation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
Maura enters a gas station and points a gun at the clerk Nate.She then forces Nate to open the cash register and give her all the money.Maura can be charged with

A)burglary.
B)robbery.
C)larceny.
D)receiving stolen property.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
Laird is an employee of Motor Parts,an auto parts store.On the orders of his employer,he switches trademarks on parts that come into the store to be sold to consumers.This is most likely

A)forgery.
B)larceny.
C)robbery.
D)obtaining goods by false pretenses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
Farouk uses his computer to break into Global Financial Center's computer.Farouk is a

A)hacker.
B)virus.
C)phisher.
D)worm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
Leslie commits an act via e-mail against Money Investment Company,a business in New York,where the act is a cyber crime.Leslie resides in Ohio,where the act is not a crime.Prosecution of Leslie in New York involves questions of

A)jurisdiction.
B)malware.
C)phishing.
D)service-based hacking.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
Eartha receives from Fergie a guitar stolen from Harper.To be criminally liable,Eartha must

A)know that Fergie is the thief.
B)know that Harper is the true owner.
C)know that the guitar is stolen.
D)have paid for the guitar.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
Nini,a police officer,wants to search the offices of Operational Business Corporation.She asks Judge Pearl to issue a warrant.Under the Fourth Amendment,no warrant for a search can be issued without

A)double jeopardy.
B)probable cause.
C)reasonable doubt.
D)immunity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
Megan reaches into Ned's pocket and takes his wallet-without his consent and without his immediate awareness.Unlike robbery,picking pockets does not involve

A)breaking and entering.
B)force or fear.
C)large amounts of cash.
D)weapons.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
Gem programs software to prompt a computer to continually crash and reboot.Gem intends to install this program on various companies' computer systems without the companies' knowledge.The program can reproduce itself,but must be attached to a host file to travel from one computer network to another.This program is a

A)hacker.
B)botnet.
C)virus.
D)worm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
Skip is accused of a crime.Skip can refuse to provide information about his allegedly criminal activities

A)if he suspects the information will be used to prosecute him.
B)if the police do not promise to keep the information confidential.
C)if the information is "fruit of the poisonous tree."
D)under no circumstances.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
Quiana,an employee of Reservations for Less,Inc.,pays Svetlana,an employee of Reservations for Less' competitor Travel Cheap,Inc.,for Reservations for Less' secret pricing schedule.This may be

A)an effective marketing strategy.
B)commercial bribery.
C)insider trading.
D)money laundering.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
Klay arrests Leonida on suspicion of embezzlement.According to the United States Supreme Court in Classic Case 10.3,Miranda v.Arizona,Leonida must be apprised of certain constitutional rights

A)after any police interrogation.
B)at any time during police interrogation.
C)only at the request of the suspect's attorney.
D)prior to any police interrogation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Cameron is an accountant in the accounting department of Data Analytics Company.Cameron's son's college tuition is due within a week,or he cannot continue taking classes.To meet the due date,Cameron transfers funds from Data Analytics to a fictitious (false)bank account,planning to repay the firm within one month.The transfer is discovered before the firm is repaid,and Cameron is arrested.What crime,or crimes,if any,has Cameron committed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Babs sees an e-book reader on the porch of Coco's house,takes the reader to her home,and tells everyone she owns it.Danno,wielding a knife,forces Easter to give him her smartphone,and runs away with it.Fritz breaks into Ginger's apartment,takes a laptop,and leaves.Hazel sells Idi an expensive wristwatch for a fraction of its value,admitting that the watch is stolen property but claiming that she is not the thief.Which of these acts are crimes,and what are the differences among them
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.