Exam 14: Crucial Issues in Criminal Justice
Exam 1: Criminal Justice Today69 Questions
Exam 2: Measuring and Explaining Crime76 Questions
Exam 3: Inside Criminal Law84 Questions
Exam 4: Law Enforcement Today84 Questions
Exam 5: Problems and Solutions76 Questions
Exam 6: Police and the Constitution84 Questions
Exam 7: Courts and the Quest for Justice88 Questions
Exam 8: Pretrial Procedures and the Criminal Trial94 Questions
Exam 9: Punishment and Sentencing93 Questions
Exam 10: Probation, Parole, and Intermediate Sanctions92 Questions
Exam 11: Prisons and Jails77 Questions
Exam 12: The Prison Experience and Prisoner Reentry82 Questions
Exam 13: The Juvenile Justice System95 Questions
Exam 14: Crucial Issues in Criminal Justice73 Questions
Select questions type
Physical harm toindividuals or the environment that occurs as the result of corporate policies or decision making is _______________________________.
Free
(Short Answer)
4.9/5
(42)
Correct Answer:
corporate violence
Until the 1970s, policies regarding surveillance, or the governmental monitoring of individuals or groups that posed national security threats tothe United States, were primarily the domain of the______________
Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
A
Section 702 of the FISA Amendment Act permits eavesdropping (not merely metadata collection)without a warrant of foreign persons toobtain information related toall of the following items, except:
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
A
With the recent election of our nation's new President, many people take tothe streets of Washington D.C. toprotest his recent executive actions. In particular, many of the protestors are furious with respect tohis recent policy decisions regarding illegal immigration. The march continues up tothe steps of the Lincoln Memorial, where a crowd of twothousand people has amassed. one of the protest leaders, a 31 year-old female, addresses the crowd with a megaphone and states that the "President needs todie, and die now. Whowants tokill the bastard?" You are a D.C. Metropolice sergeant whowas assigned toprovide security for the march. Based on what you just heard, what will you do? Will you make the arrest based on her statement? Does her statement amount toa "true threat" against the President? Please explain your decision.
(Essay)
4.7/5
(33)
Identify three main techniques used by white-collar criminals tocarry out their crimes.
(Essay)
4.7/5
(35)
Sending an unsolicited e-mail that falsely claims tobe from a legitimate organization in an attempt toacquire sensitive information such as a password is known as ____ .
(Short Answer)
4.8/5
(46)
The U.S. Supreme Court case ____________________ was crucial for differentiating "mere speech," which is protected by the First Amendment of the U.S. Constitution, from a true threat, which is not, concerned the racially charged issue of cross burning.
(Multiple Choice)
4.8/5
(49)
The goal of ________is not prevention or punishment as much as compliance, or the following of regulatory guidelines.
(Short Answer)
4.9/5
(37)
In the context of federal antiterrorism legislation, ______________________ refers tothe act of helping a terrorist organization by engaging in a wide range of activity that includes providing financial support, training, and expert advice or assistance.
(Short Answer)
4.9/5
(37)
The Third Amendment tothe U.S. Constitution states, "A well regulated Militia, being necessary tothe security of a free State, the right of the people tokeep and bear Arms, shall not be infringed."
(True/False)
4.7/5
(30)
Spam is a computer program that can automatically replicate itself over a network and interfere with the normal use of a computer.
(True/False)
4.8/5
(33)
It is now believed that there are more than 357 million firearms in the United States, meaning that there is at least one for every man, woman, and child in the United States.
(True/False)
4.9/5
(34)
A(n)____ refers toan attempt todamage or disrupt computer systems or electronic networks operated by computers.
(Short Answer)
4.8/5
(41)
A software program that is capable of reproducing itself as it spreads from one computer tothe next is a(n):
(Multiple Choice)
4.9/5
(45)
White-collar crime is an official single category of criminal behavior measured by the federal government in the Uniform Crime Report.
(True/False)
4.8/5
(43)
________is a form of employee fraud in which an individual uses his or her position within an organization toembezzle, or steal, the employer's funds, property, or other assets.
(Short Answer)
4.7/5
(42)
An investigation of a person's history todetermine whether that person should be allowed a certain privilege, such as the ability topossess a firearm, is called a(n)____ .
(Short Answer)
4.8/5
(38)
Explain how the Patriot Act has made it easier for federal agencies toconduct searches and conduct surveillance during terrorism investigations.
(Essay)
4.7/5
(38)
The ____is a critical legal tool used in efforts tocombat terrorism, because it permits law enforcement agents toarrest suspects even though nocrime, in the traditional sense of the word, has taken place and noevident harm has been caused.
(Short Answer)
4.9/5
(44)
________is the criminal action of being involved in an organized effort toengage in illegal business transactions.
(Short Answer)
4.8/5
(30)
Showing 1 - 20 of 73
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)