Exam 7: Deviance, Crime, and Social Control

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_____ causes inequality and such inequality diminishes women's control over their lives and increases their invisibility as victims.

Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
Verified

B

Deviance becomes crime when:

Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
Verified

D

Which of the following crimes involves a practice known as e-fencing?

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

E

Merton's _____ posits that people may engage in deviant behavior when they experience a conflict between goals and the means available to obtain the goals.

(Multiple Choice)
4.8/5
(34)

Which of the following is true of functionalists' perspective on deviance?

(Multiple Choice)
4.9/5
(34)

Which of the following is an example of a property crime?

(Multiple Choice)
4.9/5
(27)

Explain why white-collar crimes are lucrative.

(Essay)
4.9/5
(25)

Deviance is dysfunctional because it increases confidence in institutions.

(True/False)
4.7/5
(34)

Which of the following is true of white-collar crimes?

(Multiple Choice)
4.8/5
(42)

Corporate crimes are also known as _____.

(Multiple Choice)
4.8/5
(30)

Deviance is universal because it exists in every society.

(True/False)
4.9/5
(37)

Victimless crimes are also known as _____.

(Multiple Choice)
4.7/5
(26)

According to conflict theorists, why do so many high-status people commit crimes? Give at least one reason.

(Essay)
4.8/5
(40)

Deviance cannot be considered a crime.

(True/False)
4.7/5
(40)

Explain how rehabilitation can be used as an approach for controlling deviance.

(Essay)
4.7/5
(38)

Two of the most important sources of crime statistics are the FBI's Uniform Crime Report (UCR) and the U.S.Department of Justice's--_____.

(Multiple Choice)
4.9/5
(38)

According to Robert Merton, to achieve the cultural goal of economic success, Americans must:

(Multiple Choice)
4.8/5
(41)

Sabotaging computer systems, hacking, and stealing confidential information are examples of _____.

(Multiple Choice)
4.8/5
(33)

Which of the following is true of cybercrime?

(Multiple Choice)
4.8/5
(37)

_____ include defrauding consumers with bogus financial investments, embezzling, being paid to recommend stock on chat rooms, and stealing business data.

(Multiple Choice)
4.8/5
(40)
Showing 1 - 20 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)