Filters
Question type

Study Flashcards

A cyberterrorist might target a government agency, but not a business.

A) True
B) False

Correct Answer

verifed

verified

Sun-Hi, who operates a Pan-Asian restaurant in her apartment, is charged with criminal violations of the local health and building codes, state license regulations, and federal environmental statutes. The standard of proof to find a defendant who has been charged with a crime guilty is


A) ​a preponderance of the evidence.
B) ​a unanimous verdict.
C) ​beyond a reasonable doubt.
D) ​clear and convincing evidence.

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

The sanctions imposed on criminal wrongdoers are the same as those applied in civil cases.

A) True
B) False

Correct Answer

verifed

verified

Cumulus Cloud Computing Services, Inc., suffers a security breach in its computer network. Before the company discovers the breach, the perpetrator obtains a large amount of confidential data, including corporate financial records, marketing plans, and other sensitive information. Has a crime been committed? If so, what are its elements? What steps might Cumulus take to ensure that going forward only authorized users access the data on its computers? Whose efforts-those of the federal government or Cumulus-are more important in securing the company's computer infrastructure, and why?

Correct Answer

verifed

verified

The breach of Cumulus's computer network...

View Answer

The purpose of the exclusionary rule is to encourage criminals to provide exclusive evidence of their crimes.

A) True
B) False

Correct Answer

verifed

verified

A kickback for a special favor or service is a form of bribery in some situations.

A) True
B) False

Correct Answer

verifed

verified

Bev wrongfully takes an unopened carton from a Cold Storage Warehouse loading dock, puts the carton in her car, and drives away. This is


A) ​robbery.
B) ​forgery.
C) ​larceny.
D) ​no crime.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Enrico accesses Finance Bank's computer system without authority to obtain protected financial and credit records. Under federal law, this is


A) ​a felony if it was done for a commercial purpose.
B) ​a felony if the bank brings a civil suit against Enrico.
C) ​not a crime.
D) ​a crime but not a felony.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Picking pockets is not robbery.

A) True
B) False

Correct Answer

verifed

verified

Berto pushes Consuela to the ground, grabbing her smartphone as she falls. The use of force or fear is required for this act to constitute


A) ​burglary.
B) ​any crime.
C) ​larceny.
D) ​robbery.

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Criminal law spells out the duties that exist between persons or between citizens and their governments.

A) True
B) False

Correct Answer

verifed

verified

The Fourth Amendment protects against unreasonable searches by the government.

A) True
B) False

Correct Answer

verifed

verified

Showing 61 - 72 of 72

Related Exams

Show Answer