Deck 9: A: Criminal Law and Cyber Crimes

Full screen (f)
exit full mode
Question
Any crime that requires knowledge of computer technology for its perpetration is a computer crime.
Use Space or
up arrow
down arrow
to flip the card.
Question
The crime of bribery occurs when the bribe is offered even if it is not accepted.
Question
Identity theft occurs when a wrongdoer steals another's form of identification.
Question
Most criminal liability depends on the performance of a prohibited act.
Question
The crime of theft does not require that the perpetrator know whatever is taken belonged to another.
Question
Fraud has occurred online only by e-mail.
Question
Phishing occurs when a criminal poses as a member of the rock group Phish.
Question
There is at least one circumstance in which a person cannot refuse to testify.
Question
Hackers sometimes rent their "crimeware" as a service.
Question
Most crimes must be prosecuted within a certain number of years.
Question
Under the exclusionary rule,all evidence must be included in a criminal prosecution.
Question
Because embezzlement is considered a white-collar crime,it cannot be considered a computer crime.
Question
In cyberspace,thieves are as subject to physical limits as they are in the "real" world.
Question
The only defense to criminal liability that justifies the use of force is self-defense.
Question
Any crime committed with a computer is a cyber crime.
Question
Stealing software is not a crime.
Question
A business takes a risk by electronically storing its customers' credit account numbers.
Question
Many Web sites use "cookies" to collect data on those who visit their sites.
Question
Jurisdiction can be a key issue in a case involving a cyber crime.
Question
Computer fraud is a state,not a federal,crime.
Question
Travis sends Ursula a link to a purported e-birthday card that when clicked on downloads software to her computer to record her keystrokes and send the data to Travis.He uses the data to obtain her personal information and access her financial resources.This is

A)identity theft.
B)no crime.
C)regifting.
D)Windows shopping.
Question
Omar sends Nell an e-mail ad touting software that will cloak its user in "the anonymity of the Internet." Nell pays Omar for the software,which is never delivered to her.This is online

A)auction fraud.
B)puffery.
C)retail fraud.
D)frustration but not fraud.
Question
In relation to Edie's solicitation of investors in a nonexistent business,she is charged with "mail fraud." This requires,among other things,

A)claiming that an item is "in the mail" when it is not.
B)deceiving postal authorities as to the content of an item of mail.
C)depositing items in the postal system without proper postage.
D)mailing or causing someone else to mail a writing.
Question
Ethan,the president of Financial Investments,Inc.(FII),and Gina,FII's account?ant,are charged with a crime,after the police search FII's offices.Under the exclusionary rule

A)certain FII records are excluded from subpoena by the government.
B)certain parties to a criminal action may be excluded from a trial.
C)illegally obtained evidence must be excluded from a trial.
D)persons who have biases that would prevent them from fairly de?cid?ing the case may be excluded from the jury.
Question
Iggy uses his computer to break into Hye Technology Company's computer.Iggy is

A)a hacker.
B)a bot.
C)a botnet.
D)a worm.
Question
Page points a knife at Ray's daughter,threatening to hold her hostage and "cut" her unless Ray takes a certain file from Skelter Supplies Corporation,his employer.Charged with theft,Ray can successfully claim as a defense

A)insanity.
B)duress.
C)entrapment.
D)self-defense.
Question
On the orders of their corporate employer,Della and Efron,employees of Fabulous Fashionista,a clothing store,switch trademarks on clothing that comes into the store to be sold to consumers.This is most likely

A)forgery.
B)larceny.
C)robbery.
D)no crime.
Question
Smitty,driving while intoxicated,causes a car accident that results in the death of Tiffany.Smitty is arrested and charged with a felony.A felony is a crime punishable by death or imprisonment for

A)any period of time.
B)more than one year.
C)more than six months.
D)more than ten days.
Question
Jared uses his computer to secretly install software on thousands of personal computers without their owners' knowledge.The program can reproduce itself and spread from one computer to another via any USB port.This program is

A)a hacker.
B)a bot.
C)a virus.
D)a worm.
Question
Desi reaches into Edna's pocket and takes her money,without her consent and without her immediate awareness.Unlike robbery,picking pockets does not involve

A)breaking and entering.
B)force or fear.
C)large amounts of money.
D)weapons.
Question
Val,the owner of Wild Wheels,a bicycle store,trusts Xavier to manage the store's daily cash flow.One night,without Val's knowledge or consent,Xavier takes and keeps $500 from the receipts.This is most likely

A)embezzlement.
B)larceny.
C)robbery.
D)no crime.
Question
Mike is arrested at a warehouse in North Industrial Park.A government prosecutor issues a formal charge against Mike for receiving stolen property.This charge is

A)an arraignment.
B)an indictment.
C)an information.
D)an inquisition.
Question
Swinborn sells "Tyger" steroids over the Internet.He is arrested and charged with the sale of a controlled substance.This is cyber crime,which is

A)a crime in which the letter "y" is used in the misspelling of a word.
B)a crime that occurs in the virtual community of the Internet.
C)a crime that is less real than the same crime in the physical world.
D)no crime.
Question
Biff wrongfully takes an unopened carton from a Cold Storage Warehouse loading dock,puts the carton in his car,and drives away.This is

A)burglary.
B)robbery.
C)larceny.
D)no crime.
Question
Ilise,an employee of Pyro Displays,Inc. ,pays Gavin,an employee of Pyro's competi?tor Fire Worx Company,for a secret Fire Worx pricing schedule.This may be

A)an effective marketing strategy.
B)commercial bribery.
C)creative legal bookkeeping.
D)money laundering.
Question
Patricia commits an act via e-mail against Othman Finance Company,a business in California,where the act is a cyber crime.Patricia resides in New York where the act is not a crime.Prosecution of Patricia in California involves questions of

A)jurisdiction.
B)"maximum contacts."
C)the immunity of Internet service providers.
D)encryption.
Question
Jesse arrests Imelda on suspicion of embezzlement.According to the United States Supreme Court in Case 9.2,Miranda v.Arizona,Imelda must be apprised of certain of her rights

A)after any questioning.
B)at any time during questioning.
C)only in the absence of questioning.
D)prior to any questioning.
Question
Posing as Sterling Bank,Roxanne e-mails Quentin,asking him to update his personal banking information by calling a certain phone number.He makes the call and supplies the data,which Roxanne promptly sells to Porcio.This is

A)no crime.
B)employment fraud.
C)phishing.
D)vishing.
Question
Boris programs software to prompt a computer to continually crash and reboot.Boris's goal is to install this program on various companies' computer systems without the companies' knowledge.The program can reproduce itself,but must be attached to a host file to travel from one computer network to another.This program is

A)a hacker.
B)a bot.
C)a virus.
D)a worm.
Question
Ludwig receives from Milo a marimba stolen from Nadine.To be criminally liable,Ludwig must know

A)Milo.
B)Nadine.
C)the marimba is stolen.
D)what a marimba is.
Question
Ron is an accountant in Standard Business Company's accounting de?partment.Ron's daughter's college tuition is due within a week,or she cannot continue taking classes.To meet the due date,Ron transfers funds from Standard to a fictitious bank account,planning to repay the firm within one month.The transfer is discovered before the firm is re?paid,and Ron is arrested.What crime,or crimes,if any,has Ron committed?
Question
Kino sees a DVD player on the porch of Lulu's house,takes the player to his home,and tells everyone he owns it.Maya,holding a knife,forces Nick to give her his boom box,and runs away with it.Ollie breaks into Pam's apartment,takes a computer,and leaves.Quico sells Randi an expensive wristwatch for a fraction of its value,admitting that the watch is stolen property but claiming that he is not the thief.Which of these acts are crimes,and what are the differences among them?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: A: Criminal Law and Cyber Crimes
1
Any crime that requires knowledge of computer technology for its perpetration is a computer crime.
True
2
The crime of bribery occurs when the bribe is offered even if it is not accepted.
True
3
Identity theft occurs when a wrongdoer steals another's form of identification.
True
4
Most criminal liability depends on the performance of a prohibited act.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
The crime of theft does not require that the perpetrator know whatever is taken belonged to another.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
Fraud has occurred online only by e-mail.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
Phishing occurs when a criminal poses as a member of the rock group Phish.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
There is at least one circumstance in which a person cannot refuse to testify.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
Hackers sometimes rent their "crimeware" as a service.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
Most crimes must be prosecuted within a certain number of years.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
Under the exclusionary rule,all evidence must be included in a criminal prosecution.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
Because embezzlement is considered a white-collar crime,it cannot be considered a computer crime.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
In cyberspace,thieves are as subject to physical limits as they are in the "real" world.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
The only defense to criminal liability that justifies the use of force is self-defense.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
Any crime committed with a computer is a cyber crime.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
Stealing software is not a crime.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
A business takes a risk by electronically storing its customers' credit account numbers.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
Many Web sites use "cookies" to collect data on those who visit their sites.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
Jurisdiction can be a key issue in a case involving a cyber crime.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
Computer fraud is a state,not a federal,crime.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Travis sends Ursula a link to a purported e-birthday card that when clicked on downloads software to her computer to record her keystrokes and send the data to Travis.He uses the data to obtain her personal information and access her financial resources.This is

A)identity theft.
B)no crime.
C)regifting.
D)Windows shopping.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
Omar sends Nell an e-mail ad touting software that will cloak its user in "the anonymity of the Internet." Nell pays Omar for the software,which is never delivered to her.This is online

A)auction fraud.
B)puffery.
C)retail fraud.
D)frustration but not fraud.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
In relation to Edie's solicitation of investors in a nonexistent business,she is charged with "mail fraud." This requires,among other things,

A)claiming that an item is "in the mail" when it is not.
B)deceiving postal authorities as to the content of an item of mail.
C)depositing items in the postal system without proper postage.
D)mailing or causing someone else to mail a writing.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
Ethan,the president of Financial Investments,Inc.(FII),and Gina,FII's account?ant,are charged with a crime,after the police search FII's offices.Under the exclusionary rule

A)certain FII records are excluded from subpoena by the government.
B)certain parties to a criminal action may be excluded from a trial.
C)illegally obtained evidence must be excluded from a trial.
D)persons who have biases that would prevent them from fairly de?cid?ing the case may be excluded from the jury.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
Iggy uses his computer to break into Hye Technology Company's computer.Iggy is

A)a hacker.
B)a bot.
C)a botnet.
D)a worm.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
Page points a knife at Ray's daughter,threatening to hold her hostage and "cut" her unless Ray takes a certain file from Skelter Supplies Corporation,his employer.Charged with theft,Ray can successfully claim as a defense

A)insanity.
B)duress.
C)entrapment.
D)self-defense.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
On the orders of their corporate employer,Della and Efron,employees of Fabulous Fashionista,a clothing store,switch trademarks on clothing that comes into the store to be sold to consumers.This is most likely

A)forgery.
B)larceny.
C)robbery.
D)no crime.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
Smitty,driving while intoxicated,causes a car accident that results in the death of Tiffany.Smitty is arrested and charged with a felony.A felony is a crime punishable by death or imprisonment for

A)any period of time.
B)more than one year.
C)more than six months.
D)more than ten days.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Jared uses his computer to secretly install software on thousands of personal computers without their owners' knowledge.The program can reproduce itself and spread from one computer to another via any USB port.This program is

A)a hacker.
B)a bot.
C)a virus.
D)a worm.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Desi reaches into Edna's pocket and takes her money,without her consent and without her immediate awareness.Unlike robbery,picking pockets does not involve

A)breaking and entering.
B)force or fear.
C)large amounts of money.
D)weapons.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
Val,the owner of Wild Wheels,a bicycle store,trusts Xavier to manage the store's daily cash flow.One night,without Val's knowledge or consent,Xavier takes and keeps $500 from the receipts.This is most likely

A)embezzlement.
B)larceny.
C)robbery.
D)no crime.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
Mike is arrested at a warehouse in North Industrial Park.A government prosecutor issues a formal charge against Mike for receiving stolen property.This charge is

A)an arraignment.
B)an indictment.
C)an information.
D)an inquisition.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Swinborn sells "Tyger" steroids over the Internet.He is arrested and charged with the sale of a controlled substance.This is cyber crime,which is

A)a crime in which the letter "y" is used in the misspelling of a word.
B)a crime that occurs in the virtual community of the Internet.
C)a crime that is less real than the same crime in the physical world.
D)no crime.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Biff wrongfully takes an unopened carton from a Cold Storage Warehouse loading dock,puts the carton in his car,and drives away.This is

A)burglary.
B)robbery.
C)larceny.
D)no crime.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
Ilise,an employee of Pyro Displays,Inc. ,pays Gavin,an employee of Pyro's competi?tor Fire Worx Company,for a secret Fire Worx pricing schedule.This may be

A)an effective marketing strategy.
B)commercial bribery.
C)creative legal bookkeeping.
D)money laundering.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
Patricia commits an act via e-mail against Othman Finance Company,a business in California,where the act is a cyber crime.Patricia resides in New York where the act is not a crime.Prosecution of Patricia in California involves questions of

A)jurisdiction.
B)"maximum contacts."
C)the immunity of Internet service providers.
D)encryption.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Jesse arrests Imelda on suspicion of embezzlement.According to the United States Supreme Court in Case 9.2,Miranda v.Arizona,Imelda must be apprised of certain of her rights

A)after any questioning.
B)at any time during questioning.
C)only in the absence of questioning.
D)prior to any questioning.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
Posing as Sterling Bank,Roxanne e-mails Quentin,asking him to update his personal banking information by calling a certain phone number.He makes the call and supplies the data,which Roxanne promptly sells to Porcio.This is

A)no crime.
B)employment fraud.
C)phishing.
D)vishing.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Boris programs software to prompt a computer to continually crash and reboot.Boris's goal is to install this program on various companies' computer systems without the companies' knowledge.The program can reproduce itself,but must be attached to a host file to travel from one computer network to another.This program is

A)a hacker.
B)a bot.
C)a virus.
D)a worm.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Ludwig receives from Milo a marimba stolen from Nadine.To be criminally liable,Ludwig must know

A)Milo.
B)Nadine.
C)the marimba is stolen.
D)what a marimba is.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Ron is an accountant in Standard Business Company's accounting de?partment.Ron's daughter's college tuition is due within a week,or she cannot continue taking classes.To meet the due date,Ron transfers funds from Standard to a fictitious bank account,planning to repay the firm within one month.The transfer is discovered before the firm is re?paid,and Ron is arrested.What crime,or crimes,if any,has Ron committed?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Kino sees a DVD player on the porch of Lulu's house,takes the player to his home,and tells everyone he owns it.Maya,holding a knife,forces Nick to give her his boom box,and runs away with it.Ollie breaks into Pam's apartment,takes a computer,and leaves.Quico sells Randi an expensive wristwatch for a fraction of its value,admitting that the watch is stolen property but claiming that he is not the thief.Which of these acts are crimes,and what are the differences among them?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.