Filters
Question type

Study Flashcards

Maura enters a convenience store and points a gun at the clerk Nate. She then forces Nate to open the cash register and give her all the money. Maura will most likely be charged with


A) burglary.
B) robbery.
C) larceny.
D) receiving stolen property.

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

All persons who are arrested have the constitutional right to remain silent.

A) True
B) False

Correct Answer

verifed

verified

A kickback for a special favor or service is a form of bribery in some situations.

A) True
B) False

Correct Answer

verifed

verified

Via the Internet,Rocky sabotages the computer system of Quik Chik'n Company,a food manufacturer,with the purpose of altering the levels of ingredients of the company's products so that consumers of the food become ill. Rocky is


A) a cyberterrorist.
B) anetwork employee.
C) an entrapper.
D) a prosecutor.

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

A cyberterrorist might target a government agency,but not a business.

A) True
B) False

Correct Answer

verifed

verified

Herb,a computer programmer for Inventory Control Corporation,is arrested in his employer's parking lot on suspicion of larceny. Herb must be informed of his right to


A) a trial by jury.
B) punishment.
C) question witnesses.
D) remain silent.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Cumulus Cloud Computing Services,Inc.,suffers a security breach in its computer network. Before the company discovers the breach,the perpetrator obtains a large amount of confidential data,including corporate financial records,marketing plans,and other sensitive information. Has a crime been committed? If so,what are its elements? What steps might Cumulus take to ensure that going forward only authorized users access the data on its computers? Whose efforts-those of the federal government or Cumulus-are more important in securing the company's computer infrastructure,and why?

Correct Answer

verifed

verified

The breach of Cumulus's computer network...

View Answer

Constitutional safeguards to protect the rights of individuals apply in federal courts.

A) True
B) False

Correct Answer

verifed

verified

Benito accesses Creditline Bank's computer system without authority to obtain protected financial and credit records.Under federal law,this is


A) a felony if it was done for a commercial purpose.
B) a felony if Creditline brings a civil suit against Benito.
C) not a crime.
D) a crime but not a felony.

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Paxton uses social media to post links that,when clicked,secretly install software on hundreds of others' personal computers without their owners' knowledge Paxton's software is harmful to the computers on which he installed it. This program is


A) malware.
B) badware.
C) harmware.
D) infectware.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Corporations,like persons,canbe liable for crimes.

A) True
B) False

Correct Answer

verifed

verified

Domino causes a disturbance at El Nino Cafe. He is arrested and charged with disorderly conduct,a misdemeanor. A misdemeanor is a crime punish-able by


A) a fine only.
B) imprisonment up to one year.
C) imprisonment up to six months.
D) imprisonment up to ten days.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 61 - 72 of 72

Related Exams

Show Answer