Filters
Question type

Study Flashcards

Boris programs software to prompt a computer to continually crash and reboot.Boris's goal is to install this program on various companies' computer systems without the companies' knowledge.The program can reproduce itself,but must be attached to a host file to travel from one computer network to another.This program is


A) a hacker.
B) a bot.
C) a virus.
D) a worm.

Correct Answer

verifed

verified

Biff wrongfully takes an unopened carton from a Cold Storage Warehouse loading dock,puts the carton in his car,and drives away.This is


A) burglary.
B) robbery.
C) larceny.
D) no crime.

Correct Answer

verifed

verified

Most criminal liability depends on the performance of a prohibited act.

Correct Answer

verifed

verified

The only defense to criminal liability that justifies the use of force is self-defense.

Correct Answer

verifed

verified

Ron is an accountant in Standard Business Company's accounting department.Ron's daughter's college tuition is due within a week,or she cannot continue taking classes.To meet the due date,Ron transfers funds from Standard to a fictitious bank account,planning to repay the firm within one month.The transfer is discovered before the firm is repaid,and Ron is arrested.What crime,or crimes,if any,has Ron committed?

Correct Answer

verifed

verified

Ron committed at least embezzlement.The ...

View Answer

In cyberspace,thieves are as subject to physical limits as they are in the "real" world.

Correct Answer

verifed

verified

Many Web sites use "cookies" to collect data on those who visit their sites.

Correct Answer

verifed

verified

There is at least one circumstance in which a person cannot refuse to testify.

Correct Answer

verifed

verified

True

The crime of theft does not require that the perpetrator know whatever is taken belonged to another.

Correct Answer

verifed

verified

Swinborn sells "Tyger" steroids over the Internet.He is arrested and charged with the sale of a controlled substance.This is cyber crime,which is


A) a crime in which the letter "y" is used in the misspelling of a word.
B) a crime that occurs in the virtual community of the Internet.
C) a crime that is less real than the same crime in the physical world.
D) no crime.

Correct Answer

verifed

verified

Phishing occurs when a criminal poses as a member of the rock group Phish.

Correct Answer

verifed

verified

Val,the owner of Wild Wheels,a bicycle store,trusts Xavier to manage the store's daily cash flow.One night,without Val's knowledge or consent,Xavier takes and keeps $500 from the receipts.This is most likely


A) embezzlement.
B) larceny.
C) robbery.
D) no crime.

Correct Answer

verifed

verified

Smitty,driving while intoxicated,causes a car accident that results in the death of Tiffany.Smitty is arrested and charged with a felony.A felony is a crime punishable by death or imprisonment for


A) any period of time.
B) more than one year.
C) more than six months.
D) more than ten days.

Correct Answer

verifed

verified

B

On the orders of their corporate employer,Della and Efron,employees of Fabulous Fashionista,a clothing store,switch trademarks on clothing that comes into the store to be sold to consumers.This is most likely


A) forgery.
B) larceny.
C) robbery.
D) no crime.

Correct Answer

verifed

verified

Page points a knife at Ray's daughter,threatening to hold her hostage and "cut" her unless Ray takes a certain file from Skelter Supplies Corporation,his employer.Charged with theft,Ray can successfully claim as a defense


A) insanity.
B) duress.
C) entrapment.
D) self-defense.

Correct Answer

verifed

verified

Desi reaches into Edna's pocket and takes her money,without her consent and without her immediate awareness.Unlike robbery,picking pockets does not involve


A) breaking and entering.
B) force or fear.
C) large amounts of money.
D) weapons.

Correct Answer

verifed

verified

Hackers sometimes rent their "crimeware" as a service.

Correct Answer

verifed

verified

Stealing software is not a crime.

Correct Answer

verifed

verified

False

Posing as Sterling Bank,Roxanne e-mails Quentin,asking him to update his personal banking information by calling a certain phone number.He makes the call and supplies the data,which Roxanne promptly sells to Porcio.This is


A) no crime.
B) employment fraud.
C) phishing.
D) vishing.

Correct Answer

verifed

verified

Identity theft occurs when a wrongdoer steals another's form of identification.

Correct Answer

verifed

verified

Showing 1 - 20 of 42

Related Exams

Show Answer