Deck 5: Criminal Law and Cyber Crime

Full screen (f)
exit full mode
Question
It is not a crime to defraud the public through the use of e-mail ads.​
Use Space or
up arrow
down arrow
to flip the card.
Question
The sanctions imposed on criminal wrongdoers are the same as those applied in civil cases.
Question
Falsifying public records or altering a legal document is larceny.
Question
Public officials prosecute criminal defendants.
Question
A person's intent to return embezzled property-or its actual return-is not a defense to the crime of embezzlement.
Question
A verdict of guilty to a criminal charge nearly always requires a unanimous jury.
Question
A misdemeanor is a crime punishable only by a fine.
Question
Embezzlement can be committed only by physically taking property from the possession of another.
Question
Picking pockets is not robbery.
Question
Racketeering is a single crime-engaging in financial transactions to conceal the identity, source, or destination of illegally gained funds.
Question
Using social media to defraud is a federal crime.
Question
Changing a trademark is forgery.
Question
Counterfeiting is robbery.​
Question
Criminal law spells out the duties that exist between persons or between citizens and their governments.
Question
One element that normally must exist for a person to be convicted of a crime is the performance of a prohibited act.
Question
One purpose of criminal sanctions is to deter others from committing similar crimes in the future.
Question
Corporations, like persons, can be liable for crimes.
Question
Felonies are punishable by imprisonment for more than a year or death.
Question
A wrongful mental state is typically required to establish criminal liability.
Question
In a criminal case, the state must prove its case by a preponderance of the evidence.
Question
Reese, driving while intoxicated, causes a car accident that results in the death of Sanyo. Reese is arrested and charged with a felony. A felony is a crime punishable by death or imprisonment for

A) ​any period of time.
B) ​more than one year.
C) ​more than six months.
D) ​more than ten days.
Question
Under the exclusionary rule, illegally obtained evidence may not be included in any criminal prosecution.
Question
All persons who are arrested have the constitutional right to remain silent.
Question
The purpose of the exclusionary rule is to encourage criminals to provide exclusive evidence of their crimes.
Question
A stolen credit card is more likely to hurt the cardholder than a merchant.​
Question
Ordinarily, "ignorance of the law" or a mistaken idea about what the law requires is a valid defense to criminal liability.
Question
It is a federal crime to use income obtained from racketeering activity to buy an interest in any enterprise.
Question
Bull is arrested at a warehouse in Corporate Park and charged with the crime of theft. Bull will be prosecuted by

A) ​the owner of the warehouse.
B) ​the owner of the property that Bull is charged with stealing.
C) ​a public official.
D) ​any third party unrelated to Bull, the property, or the crime.
Question
In a phishing attack, the perpetrator "fishes" for financial data and passwords from a consumer by posing as a legitimate business.
Question
Sun-Hi, who operates a Pan-Asian restaurant in her apartment, is charged with criminal violations of the local health and building codes, state license regulations, and federal environmental statutes. The standard of proof to find a defendant who has been charged with a crime guilty is

A) ​a preponderance of the evidence.
B) ​a unanimous verdict.
C) ​beyond a reasonable doubt.
D) ​clear and convincing evidence.
Question
Luce receives from Mim a marimba stolen from Nell. To be criminally liable, Luce must know

A) ​Mim.
B) ​Nell.
C) ​that the marimba is stolen and Luce must intend to keep it.
D) ​what a marimba is.
Question
Individuals who are arrested must be informed of certain constitutional rights.
Question
Constitutional safeguards to protect the rights of individuals apply in federal courts.
Question
The Fourth Amendment protects against unreasonable searches by the government.
Question
No federal statute specifically addresses cyber crime.
Question
A suspect cannot be tried twice in the same court for the same crime.
Question
Rhino causes a disturbance at Soufflé Café. He is arrested and charged with disorderly conduct, a misdemeanor. A misdemeanor is a crime punishable by

A) ​a fine only.
B) ​imprisonment up to one year.
C) ​imprisonment up to six months.
D) ​imprisonment up to ten days.
Question
A cyberterrorist might target a government agency, but not a business.
Question
A kickback for a special favor or service is a form of bribery in some situations.
Question
A company takes a risk by storing its online customers' credit-card numbers.
Question
Laird is an employee of Motor Parts, an auto parts store. On the orders of his employer, he switches trademarks on parts that come into the store to be sold to consumers. This is most likely

A) ​forgery.
B) ​larceny.
C) ​robbery.
D) ​obtaining goods by false pretenses.
Question
Ossie enters a convenience store and points a gun at the clerk Pico. Ossie forces Pico to open the cash register and give him all the money. Ossie will most likely be charged with

A) ​burglary.
B) ​robbery.
C) ​larceny.
D) ​receiving stolen property.
Question
Sandy, a businessperson, is convicted of RICO offenses. Sandy's penalties may include

A) ​divestiture or dissolution of Sandy's business.
B) ​imprisonment for up to twenty years.
C) ​a fine of up to $25,000 per violation.
D) ​all of the choices.
Question
Mariah takes off her ring and places it on her desk while she works. Without her knowledge or consent, her coworker Nita picks up the ring, puts it on, and walks away. Nita has likely committed

A) ​burglary.
B) ​forgery.
C) ​larceny.
D) ​no crime.
Question
Elbert uses FedEx in a scheme to defraud Global Sales Company by obtaining merchandise to which he is not entitled. Found guilty of mail fraud, Elbert can be punished by

A) ​imprisonment for up to fifty years.
B) ​imprisonment for up to five years and fines of up to $1,000.
C) ​fines up to $5 million.
D) ​none of the choices.
Question
Edie uses TV ads to defraud millions of people. She can most likely be charged with

A) ​larceny.
B) ​no crime.
C) ​robbery.
D) ​wire fraud.
Question
Edwin is charged with a crime. Almost all federal courts and some state courts would not hold him liable if, at the time of the offense, as a result of a mental disease or defect, he lacked substantial capacity to obey the law and to appreciate

A) ​the power of the police.
B) ​the authority of the court.
C) ​the wrongfulness of his conduct.
D) ​the fruits of his crime.
Question
Berto pushes Consuela to the ground, grabbing her smartphone as she falls. The use of force or fear is required for this act to constitute

A) ​burglary.
B) ​any crime.
C) ​larceny.
D) ​robbery.
Question
Gilda is accused of conspiracy to defraud. She is given an opportunity to object to the charge before a judge. She is also given the opportunity to confront and cross-examine witnesses and to present her own witnesses. These procedures represent

A) ​a reasonable expectation of privacy.
B) ​the prohibition against double jeopardy.
C) ​due process of law.
D) ​the privilege against self-incrimination.
Question
Bond, the owner of CinePlex, trusts Dex to manage the theater's daily cash flow. One night, without Bond's knowledge or consent, Dex takes and keeps $1,000 from the receipts. This is most likely

A) ​embezzlement.
B) ​larceny.
C) ​robbery.
D) ​burglary.
Question
Quiana, an employee of Reservations-for-Less, Inc., pays Sven, an employee of Reservations-for-Less' competitor Travel Cheap, Inc., for a secret company pricing schedule. This may be

A) ​an effective marketing strategy.
B) ​commercial bribery.​
C) ​creative legal bookkeeping.
D) ​money laundering.
Question
Jordan reaches into Ken's pocket and takes his wallet-without his consent and without his immediate awareness. Unlike robbery, picking pockets does not involve

A) ​breaking and entering.
B) ​force or fear.
C) ​large amounts of cash.
D) ​weapons.​
Question
Chad signs Dolly's name, without her authorization, to the back of her paycheck, which was issued by Eastside Market. This is​

A) ​embezzlement.
B) ​forgery.
C) ​larceny.
D) ​robbery.
Question
Ryan is accused of auto theft. Ryan refuses to give information related to his alleged criminal activities because he suspects it will be used to prosecute him. This is

A) ​duress.
B) ​entrapment.
C) ​the privilege against self-incrimination.
D) ​necessity.
Question
Suzu, an employee of Ridgeline Credit Union, deposits into her personal account checks entrusted to Ridgeline through its ATM system by customers to deposit into their accounts. This is

A) ​burglary.
B) ​embezzlement.
C) ​larceny.
D) ​mail and wire fraud.
Question
Edith works for Fast Trades, Inc., a brokerage that facilitates frequent, quick securities transactions for investors. Edith steals her employer's computer program to start up her own competing business, Get Rich Quick, Inc. This is

A) ​obtaining goods by false pretenses.
B) ​robbery.
C) ​larceny.
D) ​no crime.
Question
Bev wrongfully takes an unopened carton from a Cold Storage Warehouse loading dock, puts the carton in her car, and drives away. This is

A) ​robbery.
B) ​forgery.
C) ​larceny.
D) ​no crime.
Question
Mia offers Nevin, a building inspector, money to overlook the violations in her new warehouse. Nevin accepts the money and overlooks the violations. Mia is charged with the crime of bribery. The crime occurred when

A) ​Mia decided to offer the bribe.
B) Mia offered the bribe.​
C) ​Nevin accepted the bribe.
D) ​Nevin overlooked the violations.
Question
Mae is granted immunity after she agrees to testify about a crime. Mae has an absolute privilege against self-incrimination and can

A) ​be prosecuted only for a crime about which she agreed to testify.
B) ​not be prosecuted for any crime.
C) ​not refuse to testify.
D) ​refuse to testify.
Question
Bruno is a businessperson with investments in legal and illegal operations. Bruno may be subject to penalties under RICO

A) ​for making an unprofitable, but legal, investment.
B) ​for the commission of any business fraud.
C) ​only in a case involving a "racket."
D) ​only in a case involving organized crime.
Question
Paxton uses social media to post links that, when clicked, secretly install software on hundreds of others' personal computers without their owners' knowledge Paxton's software is harmful to the computers on which he installed it. This program is

A) ​malware.
B) ​badware.
C) ​harmware.
D) ​infectware.
Question
Kelly is accused of receiving stolen property. She can refuse to provide information about her allegedly criminal activities

A) ​if she suspects the information will be used to prosecute her.
B) ​if the police do not promise to keep the information confidential.
C) ​if the information is "fruit of the poisonous tree."
D) ​under no circumstances.
Question
Cumulus Cloud Computing Services, Inc., suffers a security breach in its computer network. Before the company discovers the breach, the perpetrator obtains a large amount of confidential data, including corporate financial records, marketing plans, and other sensitive information. Has a crime been committed? If so, what are its elements? What steps might Cumulus take to ensure that going forward only authorized users access the data on its computers? Whose efforts-those of the federal government or Cumulus-are more important in securing the company's computer infrastructure, and why?
Question
Herb, a computer programmer for Inventory Control Ltd., is arrested in his employer's parking lot on suspicion of larceny. Herb must be informed of his right to

A) ​a trial by jury.
B) ​punishment.
C) ​question witnesses.
D) ​remain silent.
Question
Enrico accesses Finance Bank's computer system without authority to obtain protected financial and credit records. Under federal law, this is

A) ​a felony if it was done for a commercial purpose.
B) ​a felony if the bank brings a civil suit against Enrico.
C) ​not a crime.
D) ​a crime but not a felony.
Question
Don sends e-mail to Eve, promising her a percentage of the amount in a foreign bank account if she will assist in transferring the funds to a U.S. bank account. Eve forwards her account number, but the funds are never sent. Instead, Don quickly withdraws the funds in Eve's account. This is

A) ​hacking.
B) ​identity theft.
C) ​phishing.
D) ​cyber fraud.
Question
Rose commits an act via e-mail against Savers Bank, a business in Texas, where the act is a cyber crime. Rose resides in Utah where the act is not a crime. Prosecution of Rose in Texas involves questions of

A) ​jurisdiction.
B) ​"maximum contacts."
C) the immunity of Internet service providers.​
D) ​encryption.
Question
Cameron is an accountant in the accounting department of Data Analytics Company. Cameron's son's college tuition is due within a week, or he cannot continue taking classes. To meet the due date, Cameron transfers funds from Data Analytics to a fictitious bank account, planning to repay the firm within one month. The transfer is discovered before the firm is repaid, and Cameron is arrested. What crime, or crimes, if any, has Cameron committed?
Question
Erica, a police officer, wants to search the offices of Debit & Credit, Accountants. She asks Judge Bernie to issue a warrant. Under the Fourth Amendment, no warrant for a search can be issued without

A) ​double jeopardy.
B) ​probable cause.
C) ​reasonable doubt.
D) ​immunity.
Question
Jade puts up a collection of sports memorabilia for bids on BuyBuy, an Internet auction site. Khalil makes the highest bid and sends the payment, which Jade receives, but she does not send the collection. This is online

A) ​hacking.
B) ​identity theft.
C) ​phishing.
D) ​cyber fraud.
Question
Via the Internet, Rocco sabotages the computer system of Quik Chik'n Inc., a food manufacturer, with the purpose of altering the levels of ingredients of the company's products so that consumers of the food become ill. Rocco is

A) ​a cyberterrorist.
B) ​a network employee.
C) ​an entrapper.
D) ​a prosecutor.
Question
Posing as Visa Bank, Walt e-mails Paula, asking her to update her credit-card information through a link in the e-mail. She clicks on the link and types in the data, which Walt promptly sells to O"Hara. This is

A) ​hacking.
B) ​employment fraud.
C) ​phishing.
D) ​cyberterrorism.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/72
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Criminal Law and Cyber Crime
1
It is not a crime to defraud the public through the use of e-mail ads.​
False
2
The sanctions imposed on criminal wrongdoers are the same as those applied in civil cases.
False
3
Falsifying public records or altering a legal document is larceny.
False
4
Public officials prosecute criminal defendants.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
5
A person's intent to return embezzled property-or its actual return-is not a defense to the crime of embezzlement.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
6
A verdict of guilty to a criminal charge nearly always requires a unanimous jury.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
7
A misdemeanor is a crime punishable only by a fine.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
8
Embezzlement can be committed only by physically taking property from the possession of another.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
9
Picking pockets is not robbery.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
10
Racketeering is a single crime-engaging in financial transactions to conceal the identity, source, or destination of illegally gained funds.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
11
Using social media to defraud is a federal crime.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
12
Changing a trademark is forgery.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
13
Counterfeiting is robbery.​
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
14
Criminal law spells out the duties that exist between persons or between citizens and their governments.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
15
One element that normally must exist for a person to be convicted of a crime is the performance of a prohibited act.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
16
One purpose of criminal sanctions is to deter others from committing similar crimes in the future.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
17
Corporations, like persons, can be liable for crimes.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
18
Felonies are punishable by imprisonment for more than a year or death.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
19
A wrongful mental state is typically required to establish criminal liability.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
20
In a criminal case, the state must prove its case by a preponderance of the evidence.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
21
Reese, driving while intoxicated, causes a car accident that results in the death of Sanyo. Reese is arrested and charged with a felony. A felony is a crime punishable by death or imprisonment for

A) ​any period of time.
B) ​more than one year.
C) ​more than six months.
D) ​more than ten days.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
22
Under the exclusionary rule, illegally obtained evidence may not be included in any criminal prosecution.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
23
All persons who are arrested have the constitutional right to remain silent.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
24
The purpose of the exclusionary rule is to encourage criminals to provide exclusive evidence of their crimes.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
25
A stolen credit card is more likely to hurt the cardholder than a merchant.​
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
26
Ordinarily, "ignorance of the law" or a mistaken idea about what the law requires is a valid defense to criminal liability.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
27
It is a federal crime to use income obtained from racketeering activity to buy an interest in any enterprise.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
28
Bull is arrested at a warehouse in Corporate Park and charged with the crime of theft. Bull will be prosecuted by

A) ​the owner of the warehouse.
B) ​the owner of the property that Bull is charged with stealing.
C) ​a public official.
D) ​any third party unrelated to Bull, the property, or the crime.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
29
In a phishing attack, the perpetrator "fishes" for financial data and passwords from a consumer by posing as a legitimate business.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
30
Sun-Hi, who operates a Pan-Asian restaurant in her apartment, is charged with criminal violations of the local health and building codes, state license regulations, and federal environmental statutes. The standard of proof to find a defendant who has been charged with a crime guilty is

A) ​a preponderance of the evidence.
B) ​a unanimous verdict.
C) ​beyond a reasonable doubt.
D) ​clear and convincing evidence.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
31
Luce receives from Mim a marimba stolen from Nell. To be criminally liable, Luce must know

A) ​Mim.
B) ​Nell.
C) ​that the marimba is stolen and Luce must intend to keep it.
D) ​what a marimba is.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
32
Individuals who are arrested must be informed of certain constitutional rights.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
33
Constitutional safeguards to protect the rights of individuals apply in federal courts.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
34
The Fourth Amendment protects against unreasonable searches by the government.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
35
No federal statute specifically addresses cyber crime.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
36
A suspect cannot be tried twice in the same court for the same crime.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
37
Rhino causes a disturbance at Soufflé Café. He is arrested and charged with disorderly conduct, a misdemeanor. A misdemeanor is a crime punishable by

A) ​a fine only.
B) ​imprisonment up to one year.
C) ​imprisonment up to six months.
D) ​imprisonment up to ten days.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
38
A cyberterrorist might target a government agency, but not a business.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
39
A kickback for a special favor or service is a form of bribery in some situations.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
40
A company takes a risk by storing its online customers' credit-card numbers.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
41
Laird is an employee of Motor Parts, an auto parts store. On the orders of his employer, he switches trademarks on parts that come into the store to be sold to consumers. This is most likely

A) ​forgery.
B) ​larceny.
C) ​robbery.
D) ​obtaining goods by false pretenses.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
42
Ossie enters a convenience store and points a gun at the clerk Pico. Ossie forces Pico to open the cash register and give him all the money. Ossie will most likely be charged with

A) ​burglary.
B) ​robbery.
C) ​larceny.
D) ​receiving stolen property.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
43
Sandy, a businessperson, is convicted of RICO offenses. Sandy's penalties may include

A) ​divestiture or dissolution of Sandy's business.
B) ​imprisonment for up to twenty years.
C) ​a fine of up to $25,000 per violation.
D) ​all of the choices.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
44
Mariah takes off her ring and places it on her desk while she works. Without her knowledge or consent, her coworker Nita picks up the ring, puts it on, and walks away. Nita has likely committed

A) ​burglary.
B) ​forgery.
C) ​larceny.
D) ​no crime.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
45
Elbert uses FedEx in a scheme to defraud Global Sales Company by obtaining merchandise to which he is not entitled. Found guilty of mail fraud, Elbert can be punished by

A) ​imprisonment for up to fifty years.
B) ​imprisonment for up to five years and fines of up to $1,000.
C) ​fines up to $5 million.
D) ​none of the choices.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
46
Edie uses TV ads to defraud millions of people. She can most likely be charged with

A) ​larceny.
B) ​no crime.
C) ​robbery.
D) ​wire fraud.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
47
Edwin is charged with a crime. Almost all federal courts and some state courts would not hold him liable if, at the time of the offense, as a result of a mental disease or defect, he lacked substantial capacity to obey the law and to appreciate

A) ​the power of the police.
B) ​the authority of the court.
C) ​the wrongfulness of his conduct.
D) ​the fruits of his crime.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
48
Berto pushes Consuela to the ground, grabbing her smartphone as she falls. The use of force or fear is required for this act to constitute

A) ​burglary.
B) ​any crime.
C) ​larceny.
D) ​robbery.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
49
Gilda is accused of conspiracy to defraud. She is given an opportunity to object to the charge before a judge. She is also given the opportunity to confront and cross-examine witnesses and to present her own witnesses. These procedures represent

A) ​a reasonable expectation of privacy.
B) ​the prohibition against double jeopardy.
C) ​due process of law.
D) ​the privilege against self-incrimination.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
50
Bond, the owner of CinePlex, trusts Dex to manage the theater's daily cash flow. One night, without Bond's knowledge or consent, Dex takes and keeps $1,000 from the receipts. This is most likely

A) ​embezzlement.
B) ​larceny.
C) ​robbery.
D) ​burglary.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
51
Quiana, an employee of Reservations-for-Less, Inc., pays Sven, an employee of Reservations-for-Less' competitor Travel Cheap, Inc., for a secret company pricing schedule. This may be

A) ​an effective marketing strategy.
B) ​commercial bribery.​
C) ​creative legal bookkeeping.
D) ​money laundering.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
52
Jordan reaches into Ken's pocket and takes his wallet-without his consent and without his immediate awareness. Unlike robbery, picking pockets does not involve

A) ​breaking and entering.
B) ​force or fear.
C) ​large amounts of cash.
D) ​weapons.​
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
53
Chad signs Dolly's name, without her authorization, to the back of her paycheck, which was issued by Eastside Market. This is​

A) ​embezzlement.
B) ​forgery.
C) ​larceny.
D) ​robbery.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
54
Ryan is accused of auto theft. Ryan refuses to give information related to his alleged criminal activities because he suspects it will be used to prosecute him. This is

A) ​duress.
B) ​entrapment.
C) ​the privilege against self-incrimination.
D) ​necessity.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
55
Suzu, an employee of Ridgeline Credit Union, deposits into her personal account checks entrusted to Ridgeline through its ATM system by customers to deposit into their accounts. This is

A) ​burglary.
B) ​embezzlement.
C) ​larceny.
D) ​mail and wire fraud.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
56
Edith works for Fast Trades, Inc., a brokerage that facilitates frequent, quick securities transactions for investors. Edith steals her employer's computer program to start up her own competing business, Get Rich Quick, Inc. This is

A) ​obtaining goods by false pretenses.
B) ​robbery.
C) ​larceny.
D) ​no crime.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
57
Bev wrongfully takes an unopened carton from a Cold Storage Warehouse loading dock, puts the carton in her car, and drives away. This is

A) ​robbery.
B) ​forgery.
C) ​larceny.
D) ​no crime.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
58
Mia offers Nevin, a building inspector, money to overlook the violations in her new warehouse. Nevin accepts the money and overlooks the violations. Mia is charged with the crime of bribery. The crime occurred when

A) ​Mia decided to offer the bribe.
B) Mia offered the bribe.​
C) ​Nevin accepted the bribe.
D) ​Nevin overlooked the violations.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
59
Mae is granted immunity after she agrees to testify about a crime. Mae has an absolute privilege against self-incrimination and can

A) ​be prosecuted only for a crime about which she agreed to testify.
B) ​not be prosecuted for any crime.
C) ​not refuse to testify.
D) ​refuse to testify.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
60
Bruno is a businessperson with investments in legal and illegal operations. Bruno may be subject to penalties under RICO

A) ​for making an unprofitable, but legal, investment.
B) ​for the commission of any business fraud.
C) ​only in a case involving a "racket."
D) ​only in a case involving organized crime.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
61
Paxton uses social media to post links that, when clicked, secretly install software on hundreds of others' personal computers without their owners' knowledge Paxton's software is harmful to the computers on which he installed it. This program is

A) ​malware.
B) ​badware.
C) ​harmware.
D) ​infectware.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
62
Kelly is accused of receiving stolen property. She can refuse to provide information about her allegedly criminal activities

A) ​if she suspects the information will be used to prosecute her.
B) ​if the police do not promise to keep the information confidential.
C) ​if the information is "fruit of the poisonous tree."
D) ​under no circumstances.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
63
Cumulus Cloud Computing Services, Inc., suffers a security breach in its computer network. Before the company discovers the breach, the perpetrator obtains a large amount of confidential data, including corporate financial records, marketing plans, and other sensitive information. Has a crime been committed? If so, what are its elements? What steps might Cumulus take to ensure that going forward only authorized users access the data on its computers? Whose efforts-those of the federal government or Cumulus-are more important in securing the company's computer infrastructure, and why?
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
64
Herb, a computer programmer for Inventory Control Ltd., is arrested in his employer's parking lot on suspicion of larceny. Herb must be informed of his right to

A) ​a trial by jury.
B) ​punishment.
C) ​question witnesses.
D) ​remain silent.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
65
Enrico accesses Finance Bank's computer system without authority to obtain protected financial and credit records. Under federal law, this is

A) ​a felony if it was done for a commercial purpose.
B) ​a felony if the bank brings a civil suit against Enrico.
C) ​not a crime.
D) ​a crime but not a felony.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
66
Don sends e-mail to Eve, promising her a percentage of the amount in a foreign bank account if she will assist in transferring the funds to a U.S. bank account. Eve forwards her account number, but the funds are never sent. Instead, Don quickly withdraws the funds in Eve's account. This is

A) ​hacking.
B) ​identity theft.
C) ​phishing.
D) ​cyber fraud.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
67
Rose commits an act via e-mail against Savers Bank, a business in Texas, where the act is a cyber crime. Rose resides in Utah where the act is not a crime. Prosecution of Rose in Texas involves questions of

A) ​jurisdiction.
B) ​"maximum contacts."
C) the immunity of Internet service providers.​
D) ​encryption.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
68
Cameron is an accountant in the accounting department of Data Analytics Company. Cameron's son's college tuition is due within a week, or he cannot continue taking classes. To meet the due date, Cameron transfers funds from Data Analytics to a fictitious bank account, planning to repay the firm within one month. The transfer is discovered before the firm is repaid, and Cameron is arrested. What crime, or crimes, if any, has Cameron committed?
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
69
Erica, a police officer, wants to search the offices of Debit & Credit, Accountants. She asks Judge Bernie to issue a warrant. Under the Fourth Amendment, no warrant for a search can be issued without

A) ​double jeopardy.
B) ​probable cause.
C) ​reasonable doubt.
D) ​immunity.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
70
Jade puts up a collection of sports memorabilia for bids on BuyBuy, an Internet auction site. Khalil makes the highest bid and sends the payment, which Jade receives, but she does not send the collection. This is online

A) ​hacking.
B) ​identity theft.
C) ​phishing.
D) ​cyber fraud.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
71
Via the Internet, Rocco sabotages the computer system of Quik Chik'n Inc., a food manufacturer, with the purpose of altering the levels of ingredients of the company's products so that consumers of the food become ill. Rocco is

A) ​a cyberterrorist.
B) ​a network employee.
C) ​an entrapper.
D) ​a prosecutor.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
72
Posing as Visa Bank, Walt e-mails Paula, asking her to update her credit-card information through a link in the e-mail. She clicks on the link and types in the data, which Walt promptly sells to O"Hara. This is

A) ​hacking.
B) ​employment fraud.
C) ​phishing.
D) ​cyberterrorism.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 72 flashcards in this deck.