Exam 9: Pattern Identification Process
Exam 1: Crime Analysis and the Profession30 Questions
Exam 2: Theoretical Foundations of Crime Analysis30 Questions
Exam 3: Effectiveness of Police in Reducing Crime and the Role of Crime Analysis30 Questions
Exam 4: Crime Analysis Process and Application30 Questions
Exam 5: Crime Analysis Data30 Questions
Exam 6: Geographic Data and Crime Mapping30 Questions
Exam 7: Crime Analysis Purpose and Audience29 Questions
Exam 8: Repeat Incidents and Tactical Data Collection30 Questions
Exam 9: Pattern Identification Process30 Questions
Exam 10: Identifying Meaningful and Useful Patterns30 Questions
Exam 11: Describing, Analyzing, and Disseminating Known Patterns30 Questions
Exam 12: Analyzing Problems: Process and Statistics30 Questions
Exam 13: Analyzing Problems: Application of Techniques Part I30 Questions
Exam 14: Analyzing Problems: Application of Techniques Part II29 Questions
Exam 15: Strategic Crime Analysis Results and Dissemination30 Questions
Exam 16: Administrative Crime Analysis: Crime Analysis for Accountability30 Questions
Select questions type
The Query Method is the method for pattern identification least often used by crime analysts.
Free
(True/False)
4.7/5
(40)
Correct Answer:
False
Ad hoc linking occurs when investigators link cases using computer data for a single investigation.
Free
(True/False)
4.8/5
(39)
Correct Answer:
False
Clearing cases requires identifying the suspect in at least one of the cases in a pattern and linking that suspect to the other cases.
(True/False)
4.8/5
(35)
Sex offenders who live in an area where a current pattern of child abduction is occurring would most likely be found in a registered sex offender database.
(True/False)
4.9/5
(51)
The process of linking unsolved cases to a recently solved case.
(Multiple Choice)
4.9/5
(45)
An iterative process in which the analyst manipulates, searches, and sorts the characteristics of crimes in a database matrix to link crimes with similar characteristics.
(Multiple Choice)
4.8/5
(32)
A convenience store with two robberies, two burglaries, a car theft, and several vandalism incidents in three weeks is an example of a:
(Multiple Choice)
4.7/5
(41)
Medical offices being burglarized by breaking the front window and prying the office door is an example of a:
(Multiple Choice)
4.9/5
(42)
Elderly women in several different supermarkets who are having their purses stolen out of the carts by numerous suspects in the last several weeks is an example of a:
(Multiple Choice)
4.8/5
(40)
A suspect who steals a car, then robs a local convenience store as well as a pedestrian one mile from the store in a matter of 20 minutes is an example of a:
(Multiple Choice)
4.8/5
(38)
When looking at patterns of robberies in a particular area The analyst's first step is to select one case from the initial list of cases that best represents the pattern and contains the most detail.
(True/False)
4.9/5
(31)
Linking cases in a pattern by suspect requires knowing the name of the suspect in at least one of the cases.
(True/False)
4.7/5
(39)
Crime patterns are a series of crime treated as one unit of analysis because the crimes share one or more key commonalities that make them notable and distinct, there is no known relationship between victim and offender, and the criminal activity is typically of limited duration.
(True/False)
4.9/5
(32)
A spree is a specific type of series characterized by high frequency of criminal activity within a remarkably short time frame, to the extent that the activity appears almost continuous.
(True/False)
4.9/5
(38)
The process of refining a list of cases into the cases that make up a pattern to be published is:
(Multiple Choice)
4.8/5
(37)
Which type of crime pattern temporal characteristic is also called a crime "flare-up"?
(Multiple Choice)
4.7/5
(41)
In a query method, the analyst first uses induction or deduction to look for patterns.
(True/False)
4.9/5
(35)
Showing 1 - 20 of 30
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)