Exam 14: The Investigation of Fraud and Computer-Related Crimes
Exam 1: The Investigation of Crime38 Questions
Exam 2: The History of Criminal Investigation40 Questions
Exam 3: The Role and Documentation of Evidence in Criminal Investigations40 Questions
Exam 4: The Law and Criminal Investigations42 Questions
Exam 5: Physical Evidence and the Crime Scene43 Questions
Exam 6: Interviews and Eyewitness Identifications41 Questions
Exam 7: Interrogations and Confessions40 Questions
Exam 8: Behavioral Evidence and Crime Analysis40 Questions
Exam 9: Information From the Public, Social Media, Information Networks, Digital Devices, and Other Sources40 Questions
Exam 10: Death Investigation43 Questions
Exam 11: The Investigation of Sex Crimes, Assault, Child Abuse, and Related Offenses40 Questions
Exam 12: The Investigation of Robbery42 Questions
Exam 13: The Investigation of Burglary, Vehicle Theft, Arson, and Other Property Crimes42 Questions
Exam 14: The Investigation of Fraud and Computer-Related Crimes41 Questions
Exam 15: The Presentation of Evidence41 Questions
Exam 16: Terrorism, Technology, and the Future of Criminal Investigation42 Questions
Select questions type
______ involves the dissemination of pornographic images through e-mail, instant messages, newsgroups, bulletin boards, chat rooms, and other Internet networks.
Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
B
______ is a form of cyberbullying that often leads to criminal charges.
Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
B
Downloading or possession of pornographic images involves the viewing of images via the Internet.
Free
(True/False)
4.9/5
(38)
Correct Answer:
True
Which aspect of child pornography involves the creation of pornographic images through cell phones or web cameras?
(Multiple Choice)
4.8/5
(35)
______ is when someone who is entrusted with the money of a corporation keeps it for their own purposes.
(Multiple Choice)
4.7/5
(35)
Which of the following are NOT ways in which criminals may obtain personal information about someone else?
(Multiple Choice)
4.9/5
(38)
What are some investigative actions that the police can perform for check and credit card fraud?
(Essay)
4.8/5
(37)
What is not one of the most common methods by which offenders fraudulently use stolen cards or checks?
(Multiple Choice)
4.9/5
(35)
Sextortion typically involves the victim sending compromising photos to a person who is claiming to be someone he/she is not. The person receiving the photos then threatens to distribute the photos unless the victim agrees to some demand.
(True/False)
4.8/5
(32)
Name the various computer-facilitated crimes discussed in the book and get into more detail about the nature and investigation of one of them.
(Essay)
4.8/5
(34)
There are security measures that are put in place to prevent the fraudulent use of checks and credit or debit cards.
(True/False)
4.9/5
(33)
Identity theft has a financial motive, though revenge and embarrassment can also be motivators.
(True/False)
4.8/5
(23)
______ occurs when anything of value is offered in exchange for influence in decisions or actions of the taker.
(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 41
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)