CGS SS 67678

subject Type Homework Help
subject Pages 16
subject Words 2482
subject Authors Larry J. Siegel

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Conflict theorists are concerned with all but which of the following?
a. the role government plays in creating a criminogenic environment
b. the relationship between personal or group power and the shaping of criminal law
c. the prevalence of bias in the justice system operations
d. the relationship between a socialism and crime rates
Police officers cannot perform a warrantless search under what circumstance?
a. when consent to search is willingly given
b. when it is performed incident to a lawful arrest
c. if there is probable cause to believe the automobile was involved in a crime
d. when ahousesitter allows the officers to enter and searchthe premise
Whose name do we associate with the classic book, The Professional Thief?
a. Carl Klockars
b. Harry King
page-pf2
c. Sam Goodman
d. Edwin Sutherland
Modern commercial sex appears to have its roots in:
a. ancient Rome
b. China
c. ancient Greece
d. Mesopotamia
The systematic rape of Bosnian and Kosovar women by Serbian army officers during
the civil war in the former Yugoslavia, reflects that:
a. Rape is a process predominantly meant to impose dependency upon its victims.
b. Rapists are often falsely accused by vindictive victims.
c. Rape has long been associated with military conquest.
d. Rape hot lines often fail to provide victims with needed assistance.
page-pf3
Operation Bullpen was a federal government effort aimed at stopping a major
_____________ operation in the sports memorabilia industry.
a. churning
b. front running
c. swindle
d. chiseling
Locking goods into place or having them monitored by electronic systems is known as:
a. target removal
b. electronic article surveillance
c. source tagging
d. target hardening
page-pf4
Incarcerating offenders in prisons and jails allows the state to seek to reduce or
eliminate offenders' opportunities to commit future crimes. This goal of punishment is
termed:
a. deterrence
b. specific deterrence
c. incapacitation
d. equity
What is false about the nature of the death penalty?
a. Today, capital punishment is limited only to the crime of murder in the first degree.
b. The majority of executions in 2009 were done through lethal injection.
c. Almost half the executions took place in Texas in 2009.
d. Currently, there are more than 5,000 people on death row.
Rational choice theory is rooted in the classical school of criminology developed by:
a. James Q. Wilson
page-pf5
b. Cesare Beccaria
c. Jeremy Bentham
d. Andrew Von Hirsch
People alter what they do based on learned responses from rewards and punishments is
the premise of what group of theories?
a. neurophysiological
b. psychodynamic
c. behavioral
d. personality
A crime, in general, is most likely to occur under which set of conditions?
a. on an August day with a temperature of 80 degrees
b. on a July day with a temperature of 98 degrees
c. on an April day with a temperature of 78 degrees
d. on a November day with a temperature of 67 degrees
page-pf6
This occurs when the rules expressed in the criminal law clash with the demands of
group conduct norms.
a. culture conflict
b. cultural defiance
c. cultural deviance
d. relative deprivation
Those who occupy the lowest levels of the underclass in which they are socially
isolated, live in urban inner cities, and are the victims of discrimination are known as:
a. the truly poor
b. the truly disadvantaged
c. the truly at-risk
d. the truly differentiated
page-pf7
Which of the following is not a common auto accident fraud scheme?
a. the swoop and squat
b. the drive up
c. the sideswipe
d. the t-bone
In his Masculinities and Crime, what did Messerschmidt call men's struggle to
dominate women in order to prove their manliness?
a. "doing domination"
b. "doing machismo"
c. "doing tough"
d. "doing gender"
Because cyber crime is essentially global, international cooperation is required for its
page-pf8
control. Which of the following reflects this fact?
a. the International Information Infrastructure Protection Act
b. the Family Entertainment and Copyright Act
c. the Convention on Cybercrime
d. the Digital Millennium Copyright Act
College students who are drunk when they assault other people may claim they were
suffering from a mental impairment that prevented them from understanding the
harmfulness of their acts. They are using what type of defense?
a. excuses
b. justifications
c. intent
d. insanity
Rather than punishment and prison, peacemaking scholars advocate such policies as:
a. mediation and conflict resolution
b. counseling and probation
page-pf9
c. stigmatization and deterrence
d. fines and detention
Cyber terrorism may be a handy battlefield for terrorists because it can strike directly at
what target that bombs will not effect?
a. the economy of an enemy
b. the defense infrastructure of an enemy
c. the hearts and minds of the citizens of an enemy
d. the energy infrastructure of an enemy
Several sub-areas of criminology exist within the broader areas of criminology. These
subareas are termed:
a. the criminological enterprise
b. the victim-offender enterprise
c. the sociological enterprise
d. the justice-offender enterprise
page-pfa
According to the NCVS, reported victimizations have:
a. declined significantly during the past 30 years
b. increased significantly during the past 30 years
c. remained stable during the past 30 years
d. have fluctuated annually during the past 30 years
Bizarre or abnormal sexual practices involving recurrent sexual urges focused on
nonhuman objects, humiliation or pain, or children is termed:
a. voyeurism
b. asphyxiophilia
c. pedophila
d. paraphilia
page-pfb
The typical state court structure includes lower courts that try _____________, superior
courts that try ____________, and appellate courts that review the procedures of trial
courts to determine whether offenders were treated fairly.
a. traffic offenses - misdemeanor and felony cases
b. misdemeanor cases " felony cases
c. felony cases " misdemeanor cases
d. juvenile cases " adult cases
Systematic theft of company property by employees is common and is called:
a. front running
b. bucketing
c. 'steering"
d. pilferage
Cybercrime is defined as:
a. a type of white-collar crime
page-pfc
b. a type of organized crime
c. a type of enterprise crime
d. a type of Internet crime
Referring to the relationship between marital status and victimization, who is least
likely to become a crime victim?
a. someone who is married
b. someone who has never married
c. someone who is divorced
d. someone who is a widow or widower
A type of auto theft involving a gunman approaching a car and forcing the owner to
give up the keys is known as:
a. carjacking
b. joyriding
c. prestige-jacking
page-pfd
d. situational inducement
According to Wolfgang, Figlio, and Sellin's cohort study, what percentage of chronic
offenders was responsible for a significant proportion of all serious crime?
a. 6%
b. 12%
c. 15%
d. 21%
If petty offenses were subject to the same punishment as more serious crimes, offenders
would choose the worst crime. This is known as:
a. marginal deterrence
b. "the tipping point"
c. specific deterrence
d. general deterrence
page-pfe
Which of the following federal level actions was not taken after the attacks of
September 11th?
a. The FBI realigned its priorities
b. A Director of National Intelligence was created.
c. The Department of Homeland Security was created.
d. The National Counterterrorism Center (NCTC) was dismantled.
The victim's ability to address the sentencing judge and tell of his or her experiences as
a result of the victimization is known as a:
a. victim's compensation statement
b. victims' reconciliation statement
c. victims' restitution statement
d. victims' impact statement
page-pff
Which theory states that the emotional bond at birth has important lasting psychological
implications that follow people across the life span?
a. psychodynamic theory
b. evolutionary theory
c. attachment theory
d. behavioral theory
Which of the following is not a role or responsibility of the judge?
a. guiding the questioning of witnesses
b. settling questions of evidence and procedure
c. charging the jury
d. negotiating a plea bargain with the accused
Schools contribute to criminality when they:
a. track students to identify academic potential
b. fail to offer diverse curriculums
page-pf10
c. are located in inner-city areas
d. hire substandard teachers
Discuss the costs and benefits of situational crime control efforts.
page-pf11
Individuals who have been crime victims have a greater chance of future victimization.
This concept is known as ___________________.
The Omnibus Victim Witness and Protection Act required the use of victim impact
statements in federal cases.
The majority of crimes occur among people of different races.
______________________ occurs when a corporate employee with direct knowledge
of market-sensitive information uses it to buy and sell securities, giving the
employee-trader an unfair advantage over the general public.
page-pf12
When selecting subjects for research studies, criminologists should ensure they are
selected in what manner?
a. randomly
b. voluntarily
c. conveniently
d.biased
Define globalization, how it viewed as a threat to the world economy and the two
elements of globalization that encourage criminality.
page-pf13
Discuss the elements of personality related to crime and explanations based on
socialization.
page-pf14
______________ involves assigning officers to a particular area to proactively
investigate suspicious activities and to enforce existing gun, drug, traffic, and related
laws.
___________ is derived from the Latin caenum, for "filth" and is defined by Webster's
dictionary as "deeply offensive to morality or decencydesigned to incite to lust or
depravity."
Cyber terrorism has been called "an effort by covert forces to disrupt the intersection
where the virtual electronic reality of computers meets the physical world." Explain
what this means and we should be concerned about cyber terrorism.
page-pf15
In contrast to negative life experiences as posited in age-graded theory, positive life
experiences such as gaining employment and getting married limit criminal behavior
opportunities. These positive experiences are termed ________________ in crime.
_____________ involves the creation of false e-mails and/or websites that look
legitimate but are designed to gain illegal access to a victim's personal information.
__________ is the philosophy of justice that asserts that those who violate the rights of
others deserve to be punished.
page-pf16
One of the critiques of social bond theory is that attachment to deviant peers supports
and nurtures rather than deters antisocial behavior.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.