Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Criminal Justice
Study Set
Criminal Law Study Set 1
Quiz 10: Property Damage and Invasion
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
True/False
The actus reus of trespassing is satisfied when a person only enters another's private property without permission.
Question 22
True/False
The U.S. Supreme Court issued a statement that the First Amendment permits a state to outlaw cross-burnings done with the intent to intimidate because burning a cross is a particularly virulent form of intimidation.
Question 23
True/False
The Model Penal Code defines the actus reus of arson as, simply, starting a fire or causing an explosion.
Question 24
True/False
If a disgruntled former Wal-Mart employee decided to set a distribution warehouse on fire, that employee would be subjected to federal prosecution because doing so would likely affect the company's ability to ship products around the country.
Question 25
Multiple Choice
What major issue arises during a typical cybercrime investigation?
Question 26
True/False
Trespassing in the State of Texas is considered to be a specific intent offense.
Question 27
True/False
The New Ipswich Sheriff in New Hampshire filed criminal trespass on an illegal alien based on the New Hampshire statute that defines criminal trespass as a person being guilty of criminal trespass if, knowing that he is not licensed or privileged to do so, he enters or remains in any place. This is an example of creative use of trespassing statutes.
Question 28
True/False
The Texas criminal mischief statute covers actions that could be considered vandalism.
Question 29
Multiple Choice
According to the FBI, what is the weakest link that malicious computer hackers rely upon to gain access to personal information?
Question 30
True/False
Hacking refers to a person breaking into computer systems with the intent to alter or modify settings.
Question 31
True/False
Cybercriminals may seek to corrupt data; disrupt equipment; threaten system reliability; disseminate viruses, worms, or malware; launch botnets; steal sensitive information; and otherwise cause widespread havoc.
Question 32
Multiple Choice
A person with the intent to destroy the American monetary system hacks into the U.S. Mint computer system to purposefully destroy the software used to print new $100 bills? What crime may be charged against that person?