Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Business Law Today Study Set 1
Quiz 6: Criminal Law and Cyber Crime
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
True/False
It is a federal crime to use income obtained from racketeering activity to buy an interest in any enterprise.
Question 22
True/False
The purpose of the exclusionary rule is to encourage criminals to provide exclusive evidence of their crimes.
Question 23
True/False
A cyber terrorist might target a government agency, but not a business.
Question 24
True/False
One purpose of criminal sanctions is to deter others from committing similar crimes in the future.
Question 25
Multiple Choice
Paxton uses social media to post links that, when clicked, secretly install software on hundreds of others' personal computers without their owners' knowledge Paxton's software is harmful to the computers on which he installed it. This program is
Question 26
Multiple Choice
Herb, a computer programmer for Inventory Control Corporation, is arrested in his employer's parking lot on suspicion of larceny. Herb must be informed of his right to
Question 27
True/False
A suspect cannot be tried twice in the same court for the same crime.
Question 28
True/False
The Fourth Amendment protects against unreasonable searches by the government.
Question 29
True/False
One element that normally must exist for a person to be convicted of a crime is the performance of a prohibited act.
Question 30
True/False
In a criminal case, the state must prove its case by a preponderance of the evidence.
Question 31
Multiple Choice
Sun-Hi, who operates a Pan-Asian restaurant in her apartment, is charged with criminal violations of the local health and building codes, state license regulations, and federal environmental statutes. The standard of proof to find a defendant who has been charged with a crime guilty is
Question 32
True/False
A company takes a risk by storing its online customers' credit-card numbers.
Question 33
True/False
Picking pockets is not robbery.
Question 34
True/False
No federal statute specifically addresses cyber crime.
Question 35
True/False
Counterfeiting is robbery.
Question 36
Multiple Choice
Posing as Visa Bank, Walt e-mails Paulina, asking her to update her credit-card information through a link in the e-mail. She clicks on the link and types in the data, which Walt promptly sells to Ilana. This is