Exam 19: Computers and Technological Crime
Exam 1: The Role of the Investigator22 Questions
Exam 2: Physical Evidence: Development, Interpretation, Investigative Value23 Questions
Exam 3: The Crime Scene25 Questions
Exam 4: Managing Criminal Investigations20 Questions
Exam 5: Records and Files23 Questions
Exam 6: Eyewitness Identification20 Questions
Exam 7: Victims, Witnesses, and Human Resources22 Questions
Exam 8: Surveillance25 Questions
Exam 9: Interrogation of Suspects and Hostile Witnesses26 Questions
Exam 10: Reconstructing the Past: Methods, Evidence, Examples24 Questions
Exam 11: Crime and Constitutional Law25 Questions
Exam 12: Evidence and Effective Testimony22 Questions
Exam 13: Homicide25 Questions
Exam 14: Robbery20 Questions
Exam 15: Rape and Other Sex Crimes24 Questions
Exam 16: Burglary24 Questions
Exam 17: Enterprise Crime: Organized, Economic, and White-Collar Crime22 Questions
Exam 18: Arson and Explosives25 Questions
Exam 19: Computers and Technological Crime25 Questions
Exam 20: Increasing Threats and Emerging Crime21 Questions
Exam 21: Terrorism and Urban Disorder Glossary22 Questions
Select questions type
Computers have improved the capacity of law enforcement to collect, analyze, and store large volumes of essential information.
Free
(True/False)
4.8/5
(37)
Correct Answer:
True
Which of the following is not one of the more common types of crime using information technology?
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
C
On an individual basis, most investigators working at a crime scene have found that the computer does not serve any useful purpose.
Free
(True/False)
4.7/5
(27)
Correct Answer:
False
According to the authors, a criminal investigator should, at a minimum, know the difference between various types of computers, as well as have some understanding of their capabilities.
(True/False)
4.9/5
(37)
One of the most fastest growing crimes in the United States is:
(Multiple Choice)
4.8/5
(33)
In the field of criminal investigation, the computer has been found to be useful only in the area of text-based information.
(True/False)
4.7/5
(34)
Clipper chips, encryption, logic bombs, pinging, remailers, trapdoors, Trojan horses, viruses, and worms are all cited as examples of _______________ used to accomplish or conceal crime in cyberspace.
(Multiple Choice)
4.8/5
(33)
According to the text, crimes involving sabotage of computers or data processing systems are frequently carried out by disgruntled employees.
(True/False)
4.9/5
(38)
When dealing with a high-tech crime scene, which of the following investigation steps are recommended by the NIJ?
(Multiple Choice)
4.9/5
(37)
The Rapid Start Team, a team of experts who assist federal and local law enforcement with a quick mobilization capacity for investigating serious crimes, is an elite unit of the:
(Multiple Choice)
4.9/5
(45)
To date, the computer has not come close to the potential it offers as an investigative tool because of which of the following?
(Multiple Choice)
4.9/5
(38)
Although statutes differ by states, the elements of computer fraud make it unlawful for any person to use a computer or computer network without permission with the intent to:
(Multiple Choice)
4.9/5
(38)
Home computers and other personal and portable devices fall under the purview of the Fourth Amendment, which protects citizens from unreasonable searches and seizures.
(True/False)
4.8/5
(27)
According to the text, some social networking sites have agreed to remove from their sites those individuals who have a criminal record involving children.
(True/False)
4.9/5
(33)
Police may sometimes pose as children in chat rooms in an effort to identify child molesters. In such cases, it is important to avoid _____________, which is a common defense.
(Multiple Choice)
4.9/5
(32)
______________ is a term that refers to one who enters a computer system illegally for the purpose of destroying, changing, or stealing data.
(Multiple Choice)
4.8/5
(27)
According to the authors, the proper investigation of computer-related crime can be performed by any criminal investigator regardless of training and experience.
(True/False)
5.0/5
(41)
One of the most common types of electronic fraud involves the use of:
(Multiple Choice)
4.7/5
(35)
To date, the computer has not come close to the potential it offers as an investigative tool because of:
(Multiple Choice)
4.8/5
(27)
The investigator facing a crime scene involving computers should:
(Multiple Choice)
4.8/5
(30)
Showing 1 - 20 of 25
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)