Filters
Question type

Study Flashcards

Quint, an employee of Reservations Inc. pays Sienna, an employee of Reservations' competitor Travel Inc., for a secret Travel pricing schedule . This is most likely


A) bribery of a public official.
B) commercial bribery.
C) bribery of a foreign official.
D) no crime.

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

Shoplifting is


A) robbery.
B) embezzlement .
C) larceny .
D) no crime.

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

An illegal act committed by a business using nonviolent means to obtain a business advantage is a white-collar crime .

A) True
B) False

Correct Answer

verifed

verified

True

A felony is a crime that is punishable by imprisonment for more than a year up to death.

A) True
B) False

Correct Answer

verifed

verified

The Fourth Amendment protects against searches that violate a person's reasonable expectation of privacy .

A) True
B) False

Correct Answer

verifed

verified

Riley commits an act via e-mail against State Bank, a business in Texas, where the act is a cyber crime. Riley resides in Utah where the act is not a crime. Prosecution of Riley in Texas involves questions of


A) jurisdiction.
B) "maximum contacts."
C) the immunity of Internet service providers.
D) encryption.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

In a criminal case, the defendant must convince the court that, based on the evidence, it is more likely than not that the defendant's alibi is true.

A) True
B) False

Correct Answer

verifed

verified

Under the exclusionary rule, evidence derived from illegally obtained evidence may be included in any criminal prosecution.

A) True
B) False

Correct Answer

verifed

verified

Sawyer offers Tina, a city inspector, money to overlook building code violations in his tenement. Tina accepts the money and overlooks the violations.  Sawyer is charged with the crime of bribery. The crime occurred when


A) Sawyer violated the building code.
B)   Sawyer offered the bribe.
C) Tina accepted the bribe.
D) Tina overlooked the violations.

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

It is a crime to use the Internet with the intent to obtain personal data with fake advertising.

A) True
B) False

Correct Answer

verifed

verified

Shoplifting is robbery, not larceny .

A) True
B) False

Correct Answer

verifed

verified

Cloud Computing Services, Inc., suffers a security breach in its computer network. Before the company discovers the breach, the perpetrator obtains a large amount of confidential data, including corporate financial records, marketing plans, and other sensitive information. Has a crime been committed? If so, what are its elements?

Correct Answer

verifed

verified

The breach of Cloud's computer network a...

View Answer

To constitute bribery, the bribe must consist of money.

A) True
B) False

Correct Answer

verifed

verified

A mistake of fact can often excuse criminal responsibility.

A) True
B) False

Correct Answer

verifed

verified

The purpose of the exclusionary rule is to deter criminals from misconduct.

A) True
B) False

Correct Answer

verifed

verified

Failure to act cannot be a crime.

A) True
B) False

Correct Answer

verifed

verified

False

Embezzlement includes the making or altering of any writing in a way that changes the legal rights and liabilities of another.

A) True
B) False

Correct Answer

verifed

verified

Warrants are required for searches of businesses in highly regulated industries.

A) True
B) False

Correct Answer

verifed

verified

False

Bond, the owner of Camp Ground, trusts Dave to manage the resort's daily cash flow. One night, without Bond's knowledge or consent, Dave takes and keeps $1,000 from the receipts. This is most likely


A) robbery.
B) embezzlement .
C) larceny .
D) no crime.

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Posing as eBank, Frank e-mails Grace, asking her to update her credit-card information through a link in the e-mail. She clicks on the link and types in the data, which Frank promptly sells to Hector. This is


A) hacking .
B) no crime .
C) phishing .
D) cyberterrorism.

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Showing 1 - 20 of 72

Related Exams

Show Answer