Deck 12: Federal Rules and Criminal Codes
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/32
Play
Full screen (f)
Deck 12: Federal Rules and Criminal Codes
1
If records obtained by wiretap are not turned over to a judge in a reasonable amount of time,the records are
A)Still admissible
B)Sealed until the trial
C)Turned over to the subject of the wiretap or his legal representative
D)Inadmissible
A)Still admissible
B)Sealed until the trial
C)Turned over to the subject of the wiretap or his legal representative
D)Inadmissible
D
2
What are laws?
A)Regulations that govern legal conduct
B)Regulations that govern the conduct of the people
C)Regulations that govern a society
D)Expectations of the people for a decent society
A)Regulations that govern legal conduct
B)Regulations that govern the conduct of the people
C)Regulations that govern a society
D)Expectations of the people for a decent society
B
3
Under the Federal Rules of Civil Procedure,which two rules regulate the production of evidence?
A)Rules 26 and 35
B)Rules 34 and 23
C)Rules 26 and 34
D)Rules 25 and 33
A)Rules 26 and 35
B)Rules 34 and 23
C)Rules 26 and 34
D)Rules 25 and 33
C
4
Which of the following is considered a fundamental principle in ensuring there is no prejudicial treatment?
A)The Federal Rules of Evidence
B)Fair Use Act
C)Fair Trial Act
D)Due process of the law
A)The Federal Rules of Evidence
B)Fair Use Act
C)Fair Trial Act
D)Due process of the law
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
5
Federal rules and laws are changed
A)To keep up with political policies
B)To help explain the differences in physical and cyberlaws
C)To help govern regulations
D)To keep up with new technology
A)To keep up with political policies
B)To help explain the differences in physical and cyberlaws
C)To help govern regulations
D)To keep up with new technology
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
6
Rules that state what types of evidence can or cannot be presented in court are referred to as ________ rules.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following was the first law to address computer crime in which the computer is the subject of the crime?
A)Electronic Communications Privacy Act
B)USA PATRIOT Act
C)Computer Fraud and Abuse Act
D)Pen/Trap Statute
A)Electronic Communications Privacy Act
B)USA PATRIOT Act
C)Computer Fraud and Abuse Act
D)Pen/Trap Statute
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following acts greatly broadened the FBI's authority to gather evidence from telephone conversations,e-mail,pagers,and other forms of electronic communication?
A)Electronic Communications Privacy Act
B)USA PATRIOT Act
C)Computer Fraud and Abuse Act
D)Pen/Trap Statute
A)Electronic Communications Privacy Act
B)USA PATRIOT Act
C)Computer Fraud and Abuse Act
D)Pen/Trap Statute
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
9
Many rules of evidence concentrate first on
A)How the evidence was obtained
B)Where the evidence was obtained
C)Whether the chain of custody is intact
D)Whether the evidence is relevant
A)How the evidence was obtained
B)Where the evidence was obtained
C)Whether the chain of custody is intact
D)Whether the evidence is relevant
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
10
The act that can sometimes take precedence over the right to privacy guaranteed by the Fourth Amendment is the
A)Electronic Communications Privacy Act
B)Federal Wiretap Statute
C)Computer Fraud and Abuse Act
D)Pen/Trap Statute
A)Electronic Communications Privacy Act
B)Federal Wiretap Statute
C)Computer Fraud and Abuse Act
D)Pen/Trap Statute
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
11
What amendment must a law enforcement office check before seizing hardware or computers?
A)The Fourth Amendment
B)The Sixth Amendment
C)The Eighth Amendment
D)The Tenth Amendment
A)The Fourth Amendment
B)The Sixth Amendment
C)The Eighth Amendment
D)The Tenth Amendment
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
12
What are rules?
A)Regulations that govern legal conduct
B)Regulations that govern the conduct of the people
C)Regulations that govern a society
D)Expectations of the people for a decent society
A)Regulations that govern legal conduct
B)Regulations that govern the conduct of the people
C)Regulations that govern a society
D)Expectations of the people for a decent society
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
13
Examples of circumstantial evidence that can be used to authenticate a physical document include all of the following EXCEPT
A)The document's appearance
B)The application that created the document
C)The document's substance
D)The document's content
A)The document's appearance
B)The application that created the document
C)The document's substance
D)The document's content
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following needs to be checked prior to accessing stored electronic communications?
A)The Fourth Amendment
B)Electronic Communication Privacy Act
C)The Fourteenth Amendment
D)The Eighteenth Amendment
A)The Fourth Amendment
B)Electronic Communication Privacy Act
C)The Fourteenth Amendment
D)The Eighteenth Amendment
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
15
A motion by a lawyer before trial to determine whether or not evidence is admissible is called a(n)________.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
16
Electronic records that are business records made during the ordinary course of business are admissible under the
A)Business records exception rule
B)Hearsay evidence rule
C)Business exclusionary rule
D)Motion in limine rule
A)Business records exception rule
B)Hearsay evidence rule
C)Business exclusionary rule
D)Motion in limine rule
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
17
One way that companies and government agencies can limit the right of privacy employees expect is by
A)Having employees sign a waiver of their Fourth Amendment rights
B)Asking employees to use computer equipment responsibly
C)Having employees sign an acceptable use policy that states explicitly what rights employees have
D)Providing legal counsel for employees who think their privacy rights have been violated
A)Having employees sign a waiver of their Fourth Amendment rights
B)Asking employees to use computer equipment responsibly
C)Having employees sign an acceptable use policy that states explicitly what rights employees have
D)Providing legal counsel for employees who think their privacy rights have been violated
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
18
Evidence has ________ value if it is sufficiently useful to prove something important.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
19
The ________ is the judge or the jury who will decide a case.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
20
Criminal and civil cases follow federal or state rules to prevent any ________,or unequal,treatment.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
21
The ________ extended the Federal Wiretap Statute to include authority over digital transmissions over computer networks.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
22
In the case ________,circumstantial e-mail evidence was used to convict the defendant of fraud and other charges brought against him.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
23
The ________ has been used to prosecute virus creators,hackers,identity thieves,and persons who use computers to commit fraud.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
24
The same circumstantial evidence the courts use to authenticate physical documents applies to ________ as well.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
25
The Frye test that Rule 702 relied upon was replaced with the ________ test.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
26
The ________ provision of the USA PATRIOT Act allows law enforcement to delay notifying persons of searches.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
27
Real-time interception of computer information in transit falls under the ________ Statute.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
28
Bush's authorization for the NSA to perform warrantless wiretaps was in direct conflict with ________,the act that was already in use to provide surveillance options.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
29
The ________ is a mechanical device that can be attached to a specific telephone line at a telephone office.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
30
________ can reveal a person's location using information from cell phone and cellular service provider.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
31
Match between columns
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
43
Match between columns
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck