Chapter 15 Fraud And Fraudulent Practices Learning

subject Type Homework Help
subject Pages 14
subject Words 1647
subject Authors Terry M. Anderson, Thomas J. Gardner

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
True / False
1. Fraud involves deceitful means or acts to cheat a person, corporation, or governmental agency.
a. True
b. False
2. Stock market and corporate fraud declined significantly from 1990-2004.
a. True
b. False
3. Fraud schemes may be prosecuted on the federal, but not state level.
a. True
b. False
4. The federal government has no general Health Care Fraud statute which makes it a crime to willfully execute a
“schemeofartifice”intendedtodefrauda“healthcarebenefit”program.
a. True
b. False
5. Afederalofficerthat“solicits”abribeinexchangeforsomeofficialactmayalsothreatentousehisofficial
position to prevent the official act from occurring has committed extortion in addition to bribery.
a. True
b. False
page-pf2
6. The principal laws protecting intellectual property are the federal copyright, patent, and trademark laws, as well as
state trade secret laws.
a. True
b. False
7. The state bank fraud act and the wire fraud act are frequently used to convict white collar criminals.
a. True
b. False
8. A communication under the bank fraud act must cross state lines.
a. True
b. False
9. Insider trading includes using information acquired by an insider and not available to the public to profit in a sale of
securities.
a. True
b. False
10. The federal identity theft statute requires the defendant know the identification document belongs to another
person.
a. True
b. False
page-pf3
Multiple Choice
11. A class or type of criminal conduct that has solely economic gain to the criminal as its goal is known as
a. white collar crime
b. racketeering
c. wire fraud
d. bank fraud
12. What federal statute makes it a federal crime to defraud a financial institution that is federally insured?
a. false statement
b. claims
c. bank fraud
d. wire fraud
13. Deceitful means or acts used to cheat a person, corporation, or governmental agency is known as
a. fraud
b. forgery
c. false statement
d. false claims
14. Books, movies, and songs are protected by the
a. federal copyright act
b. the“fairuse”doctrine
c. federal and state laws that protect trade secrets
d. federal wire fraud laws
page-pf4
15. A scheme to deprive another of the intangible right of honest services is known as a
a. scheme of artifice
b. scheme of neglect
c. scheme of fraud
d. scheme of deprivation
16. Laws protecting intellectual property do NOT include which of the following?
a. copyright laws
b. trade secrets
c. wire fraud
d. All of these choices
17. The reason fraud convictions require action done knowingly is because
a. fraud is a crime of deceit
b. fraud causes more harm than most other crimes
c. too many people would be falsely convicted otherwise
d. persons committing fraud do not always know what they are doing
18. Jeffrey Skilling was convicted of
a. counterfeiting
b. “honestservices”fraudulentactions
c. security fraud
d. health fraud
page-pf5
19. Which of the following is not a type of fraud?
a. material fraud
b. bank fraud
c. health care fraud
d. intellectual property fraud
20. Offering a gift or payment to another with the specific intent to obtain some unlawful particular quid pro quo for
the gift or payment is known as
a. bribery
b. bank fraud
c. health care fraud
d. intellectual property fraud
21. What is required of an official regarding the quid pro quo requirement?
a. exercise of some influence
b. an agreement on a specific official act
c. multiple exercises of some influence
d. an agreement on numerous specific official acts
22. The term meaning giving something of value for something else is
a. quid pro quo
b. pro bono
c. pro rata
d. quid pro bono
page-pf6
23. Bribery under the federal statute is similar to extortion because it is not necessary in an extortion prosecution to
prove an official threatened to use his official authority if
a. the extortion amount was not paid
b. the extortion amount was paid
c. the extortion was carried out
d. None of these choices
24. What are the two types of identity theft?
a. true name and synthetic identity
b. false name and synthetic identity
c. true name and false identity
d. synthetic name and true identity
25. Insider trading includes using information acquired by an insider and
a. not available to the public to profit in a sale of securities
b. paid for through bribery
c. received by extorting a government official
d. gained through illegal entry
26. Which of the following consequences could result from importation of a counterfeit product into the United
States?
a. prosecution under the criminal code of a state
b. civil suit and sanctions
c. federal prosecution under the mail fraud statute
d. All of these choices
page-pf7
27. Criminal acts implemented through use of a computer are known as
a. cyber crime
b. identity theft
c. wire fraud
d. video voyeurism
28. Unlawful access to a computer or computer system with intent to commit a crime is known as
a. computer trespass
b. identity theft
c. wire fraud
d. video voyeurism
29. Whilethe“whitecollar”languagesuggeststhestatusofthewrongdoer,mostdefinitionsofthetermfocusonwhat
rather than the identity of the criminal?
a. the kind of behavior made criminal
b. the socio-economic status of the criminal
c. the thinking of the criminal
d. the social impact of the criminal
30. The economic cost of white collar crimes is
a. enormous
b. slight
c. the same as many other crimes
d. less than many other crimes
page-pf8
31. What criminal charge is often used in fraud cases?
a. theft by fraud or larceny by fraud
b. theft by fraud
c. larceny by fraud
d. None of these choices
32. TheU.S.SupremeCourthasheldthatany“schemeofartifice”mustincludewhichofthefollowing?
a. a material falsehood
b. a legal falsehood
c. a criminal falsehood
d. a falsehood
33. It has been estimated that the yearly cost of healthcare fraud is more than
a. $13 billion
b. $14 billion
c. $15 billion
d. $16 billion
34. Insider trading includes a person called the
a. tippee
b. tipper
c. rippee
d. ripper
page-pf9
35. "Outsiders," "insiders" and "tippees" are a part of what type of crime?
a. insider trading
b. wire fraud
c. bank fraud
d. identity theft
36. Whatisthenameofthecrimethatoccurswhenanactualperson’sidentityisstolen?
a. true name identity theft
b. synthetic identity theft
c. cyber identity theft
d. wire identity theft
37. Which of the following elements is included in wire fraud but NOT necessary in bank fraud?
a. the wire communication must cross state lines
b. the bank fraud must cross state lines
c. the wire communication must cross international borders
d. the bank fraud must cross international borders
38. Theft, piracy, or counterfeiting of ideas, inventions, artistic works, and the like is called
a. copyright laws
b. trade secrets
c. wire fraud
d. intellectual property fraud
page-pfa
39. Fraud and corruption in governemnt comes in all of the follwoing forms except
a. Contract Fraud
b. False Claims
c. Program Fraud
d. Stock Market Fraud
40. The _____ makes it a crime to present a claim to the U.S. government that is false or fraudulent and known to be
false or fraudulent.
a. False Claims Act
b. Hobbs Act
c. Pendelton Act
d. Government Claims Act
41. A federal officer that threatens to use his official position to prevent the official act from occurring would be guilty
of
a. bribery
b. bank fraud
c. extortion
d. property fraud
42. Any person who executes a scheme or artifice to defraud the United States in excess of $1,000,000 is guilty of
a. contract fraud
b. significant fraud
c. large-scale fraud
d. major fraud
page-pfb
43. Theftbasedonstealingarealperson’sidentificationinformationortheftbasedoncreatingafictitiousperson’s
identification is called
a. identity theft
b. synthetic identity theft
c. cyber identity theft
d. wire identity theft
44. In_____,afictitiousperson’snameorSocialSecuritynumberareusedtocommitthetheft.
a. true name identity theft
b. synthetic identity theft
c. cyber identity theft
d. wire identity theft
45. Sophisticatedcolorcopiersallowwhatlawenforcementofficerscall“________”toprintthousandsofcrude
bills.
a. casual counterfeiters
b. professional craftspeople
c. amateur counterfeiters
d. None of these choices
46. The principal problem in counterfeiting is _____, many of whom live in foreign countries and are producing
counterfeit money that is difficult to detect.
a. casual counterfeiters
b. professional craftspeople
c. amateur counterfeiters
d. None of these choices
page-pfc
47. A program that sends multiple possible passwords to enter a computer is called
a. brute force
b. gale force
c. wired tactics
d. strong arm tactics
48. Aperson’sdeliberate,willful,andmaliciousburningofabuildingorpersonalpropertyiscalled
a. arson
b. fire starter
c. flame initiator
d. fraud
49. Arson is
a. the easiest of the major crimes to commit
b. difficult to detect
c. the hardest to prove in court
d. All of these choices
50. If a person, including a firefighter, is killed or suffers serious bodily injury as a result of the fire, the charged would
be
a. arson
b. manipulative arson
c. felony arson
d. aggravated arson
page-pfd
Craig and Jamie really love music, movies, and just about anything that can be played, watched or listened to on an
electronic device. Craig downloads several songs and a couple movies, paying the movie and song companies for
them. He then exports them to Jamie so that she may watch and listen at her leisure. Jamie pays Craig five dollars
for the bundle.
51. The movies and songs which Craig downloaded would not be a violation of
a. federal copyright act
b. the“fairuse”doctrine
c. federal and state laws that protect trade secrets
d. federal wire fraud laws
52. Craig would be in violation of federal copyright act when he
a. transferred them to Jamie's computer
b. took five dollars in payment from Jamie
c. filed to inform the record and movie companies of the sale
d. failed to pay income tax on the five dollar sale
53. Craig attempts to argue that Jamie and he are educators and intended all along to use the movies and music only in
the classroom where ___ would apply.
a. federal copyright act
b. the“fairuse”doctrine
c. federal and state laws that protect trade secrets
d. federal wire fraud laws
page-pfe
54. Ultimately Craig was convicted of
a. intellectual property fraud
b. computer fraud
c. federal and state laws that protect trade secrets
d. federal wire fraud laws
Mary has been going through some difficult times and needs some extra money. She works as fresh produce
inspector in Florida, inspecting oranges for major growers. On her word, thousands of tons of oranges would have to
be discarded for failing to pass a health inspection. She suggests to the owner that she could "fix" it so he need
never worry about ever failing an inspection.
55. The quid pro quo requirement was met in this instance because Mary
a. exercised some influence over the grower
b. acted in an official capacity as an inspector
c. took some oranges home with her
d. failed to protect the consumer
56. The orange grower, based on the information in the preface, would be charged with
a. extortion
b. bribery
c. fruit fraud
d. None of these choices
page-pff
57. On the other hand, Mary, based on the information in the preface, would be charged with
a. extortion
b. bribery
c. fruit fraud
d. None of these choices
Linda decides she needs some furnishings for her room, but is currently out of work and out of cash. She's maxed
out on her credit cards, but in the mail a solicitation from a credit card company arrives, addressed to Linda's
roommate. Linda sees an opportunity, goes online to apply posing as the roommate. Two weeks later, the new
credit card arrives and off goes Linda to the stores.
58. Given Linda's method of applying for the credit card, she may also be charged with
a. cyber crime
b. identity theft
c. wire fraud
d. video voyeurism
59. Once Linda's scheme is unmasked, she would be charged with
a. "true name" identity theft
b. "synthetic" identity theft
c. cyber identity theft
d. wire identity theft
page-pf10
60. Linda argues that since the solicitation was for her roommate, then she could not have stolen her identity (and
anyway, she meant to pay her back). The police ignore Linda and charge with the use of ____ for each time she
signed a sale's slip.
a. false identification
b. "synthetic" identification
c. theft
d. mail fraud
Completion
61. Using deceitful acts to cheat another is called __________.
62. The federal government has passed many criminal laws directed at health care fraud, such as the False Claims
Statute.
63. The _______________ Claims Act makes it a crime to present a claim to the U.S. government that is false or
fraudulent.
64. A class or type of criminal conduct that has solely economic gain to the criminal as its goal is the definition of ____
crime.
page-pf11
65. Among the crimes created to protect stock markets and financial markets of the U.S. is the crime of insider
_________.
66. Fraud is in essence a crime of ___.
67. Congress has power to punish most large fraud schemes under the __________ commerce clause.
68. The receipt of unlawful payment to an official may prove ___, and also could prove bribery.
69. The primary criminal laws aimed at ____ property fraud are the federal copyright and patent acts and federal and
state trade secret acts.
70. The federal _____ fraud act and the wire fraud act are frequently used to convict white collar criminals.
71. Aperson’sdeliberate,willful,andmaliciousburningofabuildingorpersonalpropertyiscalled____.
page-pf12
72. Criminal acts implemented through use of a computer or other form of electronic communication. is called ____.
73. Unlawful access to a computer or computer system with intent to commit a crime, or unlawful access to a
computer or computer system maintained by a government unit is called ____.
74. Theftbasedonstealingarealperson’sidentificationinformationortheftbasedoncreatingafictitiousperson’s
identification is called ____.
75. Givingsomethingofvalue(“quid”)forsomethingelseiscalled_____.
76. Name two federal criminal statutes frequently used to convict white-collar criminals.
77. Explain what is involved in the crime known as insider trading. Why is the government interested in controlling this
type of behavior?
page-pf13
78. What is the definition of white collar crime? What are some examples of this type of crime? Can you think of any
famous white collar criminals? Who are they and what was their crime?
79. What are the differences between bribery and extortion? What are the similarities? Provide an example of a crime
which includes both bribery and extortion.
80. Whatconstitutes“cybercrime?”How are states and the federal government addressing it?
81. Why do fraud convictions require action done knowingly? How is this an important part of some of the federal
laws regarding fraud?
82. The principal laws protecting intellectual property are the federal copyright, patent, and trademark laws, as well as
state trade secret laws. Define, compare, and contrast two of these types of laws.
83. State the elements of identity theft crimes.
page-pf14
84. Describetheelementsofa“schemeorartifice”underfederalcriminalstatutes.
85. Identify one element making wire fraud different from bank fraud, and state why the element exists.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.