Filters
Question type

Study Flashcards

Sam, driving under the influence, causes a car accident that results in the death of Tanya. Sam is arrested and charged with a crime punishable by imprisonment for more than a year. This crime is


A) a misdemeanor.
B) a felony.
C) a civil wrong.
D) a tort.

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Kim takes off her ring and places it on her desk while she works. Without her knowledge or consent, her coworker Lum picks up the ring, puts it on, and walks away. Lum has likely committed


A) robbery.
B) embezzlement.
C) larceny.
D) no crime.

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

To constitute the crime of bribery, the bribe must consist of money.

A) True
B) False

Correct Answer

verifed

verified

Esau works for Family Dwellings Inc., an investment firm that buys, renovates, and rents foreclosed houses. Esau steals his employer's digital files to start his own competing business, Good Homes LLC. This is


A) wire fraud.
B) robbery.
C) larceny.
D) no crime.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

The Racketeer Influenced and Corrupt Organizations Act is an effective tool in attacking


A) criminal activities occurring online.
B) businesspersons who use bribery to secure foreign contracts.
C) defenses that excuse criminal behavior.
D) certain white-collar crimes.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

An act of omission cannot be a crime.

A) True
B) False

Correct Answer

verifed

verified

If the evidence of a defendant's guilt was obtained improperly, it normally cannot be used against the defendant in court.

A) True
B) False

Correct Answer

verifed

verified

Chic signs Del's name, without authorization, to the back of Del's paycheck, which was issued by Earth Foods Market. This is


A) no crime.
B) forgery.
C) larceny.
D) robbery.

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

A person who accesses a computer online without authority to obtain protected data is subject to criminal prosecution.

A) True
B) False

Correct Answer

verifed

verified

The Computer Access Device and Computer Fraud and Abuse Act prohibits cyber theft.

A) True
B) False

Correct Answer

verifed

verified

A state's prosecution of a crime prevents a separate federal prosecution relating to the same activity.

A) True
B) False

Correct Answer

verifed

verified

In a criminal case, typically only three-fourths of the jurors need to agree in order to convict the defendant.

A) True
B) False

Correct Answer

verifed

verified

Honi puts up a collection of sports memorabilia for bids on InstaBuy, an auction website. Jay makes the highest bid and sends the payment, which Honi receives, but she does not send the collection. This is


A) no crime.
B) identity theft.
C) phishing.
D) cyber fraud.

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Via the Internet, Britta enters false code into the computer control system of Chicken Company, a food maker, to alter the levels of ingredients so that consumers of the food become ill. Britta is


A) a cyberterrorist.
B) a phisher.
C) malware.
D) a prosecutor.

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Luz is an employee of Motor Parts, an auto parts store. On the orders of his employer, he switches trademarks on parts that come into the store to be sold to consumers. This is most likely


A) forgery.
B) larceny.
C) robbery.
D) no crime.

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Dean solicits investors for a nonexistent business, eApps. Dean is arrested and charged with "mail fraud." This requires intent to


A) claim that an item is "in the mail" when it is not.
B) defraud postal authorities.
C) use the U.S. mail.
D) defraud the public.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The U.S. Constitution provides safeguards that apply not only in federal but also in state courts.

A) True
B) False

Correct Answer

verifed

verified

Kohl receives from Lily a camera stolen from Mark. Kohl knows that the camera is stolen, and he intends to keep it. Kohl is


A) tortiously liable.
B) civilly liable.
C) criminally liable.
D) contractually liable.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

A belief in the possibility that a person committed a crime is sufficient probable cause to support the issuance of an arrest warrant.

A) True
B) False

Correct Answer

verifed

verified

Malware is a hacker whose purpose is to create a serious negative impact.

A) True
B) False

Correct Answer

verifed

verified

Showing 41 - 60 of 72

Related Exams

Show Answer