CRIM 24987

subject Type Homework Help
subject Pages 14
subject Words 2268
subject Authors Larry J. Siegel

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Who is most likely to engage in workplace violence?
a. a middle-aged white female facing termination
b. a middle-aged white male facing termination
c. a middle-aged minority female facing termination
d. a middle-aged minority male facing termination
Information technology (IT) is the key to the _____ system and is responsible for
creating the globalization phenomenon.
a. political
b. Internet
c. economic
d. social
This occurs when a deviant event comes to the attention of significant others or social
control agents who then apply a negative label.
a. anomie
b. primary deviance
page-pf2
c. secondary deviance
d. stigma
Complete strangers approached in a public place by someone offering a great deal on
valuable commodities would be called:
a. amateur receivers
b. associational fences
c. professional fences
d. neighborhood hustlers
_______ are directed against acts that some people believe threaten the moral fabric of
society and are a danger to the public order.
a. Civility movements
b. Moral crusades
c. Temperance movements
d. Decency crusades
page-pf3
Studying the correction and control of criminal behavior is found within:
a. criminal statistics
b. the sociology of law
c. theory construction
d. penology
Asphyxiophilia involves rubbing against or touching a nonconsenting person in a
crowd, elevator, or other public area.
Shoplisting is a type of ___ fraud that involves purchasing or finding legitimate retail
receipts, stealing the products listed on the receipts, returning the items to the retailer
page-pf4
for store credit or a gift card, and then selling the gift card on the Internet at a discount
for quick cash.
a. phishing
b. etailing
c. spamming
d. vishing
A disorder in which a child shows a developmentally inappropriate lack of attention and
an excess of impulsivity is known as:
a. attention deficit hyperactivity disorder
b. oppositional defiance disorder
c. impulse dysfunctional disorder
d. conduct disorder
The "ticking bomb" scenario is used to justify what type of state political crime?
a. illegal imprisonment
b. torture
page-pf5
c. illegal domestic surveillance
d. waterboarding
One of the most widely used psychological tests that is designed to measure many
different personality traits, including psychopathic deviation, schizophrenia, and
hypomania is known as the:
a. Minnesota Multiphasic Personality Inventory
b. Multidimensional Personality Questionnaire
c. California Personality Inventory
d. Wechsler Adult Intelligence Scale
Situational crime prevention tactics such as removable car radios and Lojack tracking
systems are examples of what?
a. increasing difficulty
b. increasing risk
c. reducing rewards
d. reducing deterrence
page-pf6
Some spam can simply be an unwanted advertisement. Under what circumstance can
spam become a crime?
a. when it causes emotional distress to a victim
b. when it involves pornography
c. when it causes serious harm to a computer or network
d. when it involves an organized group of spammers
To combat losses from credit card theft, Congress passed a law in 1971 limiting a
person's liability to ___ per stolen card.
a. $25
b. $50
c. $100
d. $500
page-pf7
What law called for states to make notification systems in which sex offender registries
were made public?
a. Megan's Law
b. Amber Alert
c. Casey's Law
d. Offender Law
The view that criminality as a dynamic process, influenced by a multitude of individual
characteristics, traits, and social experiences is known as:
a. the social development model
b. life course theory
c. interactional theory
d. human nature theory
page-pf8
Beccaria's beliefs and writings about the proportionality of crime and punishment have
been credited as the basis for the elimination of what 19th century practice?
a. public executions
b. hanging
c. the death penalty
d. torture
Most life course theories assume that the seeds of a criminal career are planted early in
life and that early onset of deviance strongly predicts ________.
a. the cycle of violence
b. later poor parenting ability
c. one's age of desistance
d. later and more serious criminality
Most life course theories believe that the seeds of a criminal career are planted
________ .
a. during young adulthood (20s)
page-pf9
b. at any time
c. late in life
d. early in life
Lombroso believed that criminals were biological throwbacks to an earlier time. He
called these born criminals:
a. cons
b. atavists
c. criminoloids
d. primitive offenders
What theory or hypothesis focused attention on the social and economic role of women
in society and its relationship to female crime rates?
a. gender theory
b. the masculinity hypothesis
c. the chivalry hypothesis
d. liberal feminist theory
page-pfa
When discussing future trends in crime, Steffensmeier and Harer believe that
differences in policing practices partially account for:
a. the relationship between age and crime.
b. the decrease in violent crime.
c. the increase in female crime.
d. the decrease in property crime.
A socially disorganized area is one in which the ______ have broken down and can no
longer carry out their expected or stated functions.
a. institutions of social control
b. institutions of social service
c. institutions of local government
d. institutions of education and religion
page-pfb
What type of cyber threat is represented by Titan Rain?
a. a cyber fraud threat
b. a cyber terrorism threat
c. a cyber espionage threat
d. Titan Rain does not represent a threat; it is security software.
Each year, 2.5 million times, victims use guns for defensive purposes. What did Kleck's
research indicate regarding the use of guns for defensive purposes?
a. Defensive gun use is associated with higher rates of victim injuries.
b. Defensive gun use rarely results in collateral injury and that potential victims should
be encouraged to fight back.
c. Defensive gun use is associated with crime hot spots.
d. Defensive gun use is associated with personal violent crime more so than property
crime.
page-pfc
The unique value system that dominates life among the lower classes is known as:
a. focal concerns
b. middle-class measuring rods
c. conduct norms
d. reaction formation
Novice criminals often argue that they are caught in the dilemma of being loyal to their
own peer group while at the same time attempting to abide by the rules of the larger
society. This is known as:
a. denial of responsibility
b. appeal to higher loyalties
c. condemnation of the condemners
d. denial of victim
Which Act establishes standards for US water quality and purity?
a. Clean Water Act
b. Emergency Planning and Community Right-to-Know Act
page-pfd
c. Endangered Species Act
d. Oil Pollution Act
In the ______ stage of the cognitive process of becoming a political criminal, the
individual concludes that the undesirable condition is a product of injustice " that is, it
does not apply to everyone.
a. "It's not right."
b. "You"re evil."
c. "It's your fault."
d. "It's not fair."
What do we know about systematic check forgers?
a. They are risk prone when faced with a situation that is unusually stressful for them.
b. They constitute a relatively large segment of the total population of check forgers.
c. They make a substantial living by cashing bad checks.
d. They are usually isolated people, unsuccessful in their personal relationships.
page-pfe
_________ _________is a booming business whereby men from wealthy nations
engage in sexual activities with trafficked individuals by traveling to destinations where
women and young children are prostituted.
Explain the difference between "adolescent-limited" and "life-course persistent"
offenders. What are the differences between the offense patterns for two pathway
groups?
page-pff
Sociobiology differs from earlier theories of behavior in that it stresses that biological
and genetic conditions affect how social behaviors are _________ and _________.
Criminology is related to the study of deviance. Explain how criminology, deviant
behaviors and crime overlap.
The rules governing day-to-day living conditions within a culture, group, or political
structure are termed conduct_________.
page-pf10
Explain what is meant by the aging-out process.
_________ refers to cyber offenders who illegally obtain software and then "rip" or
"crack" its copyright protection before posting it on the Internet for members of the
group to use.
Developmental theory holds that criminality may best be understood as one of many
social problems faced by at-risk youth, a view termed_________ _________
_________. According to this view crime is one among a group of interrelated
antisocial behaviors.
page-pf11
_________ _________ theorists believe that crimes are a matter of thought and
decision making.
_________ _________ _________ _________ is a common disorder experienced by
victims of crime.
According to Freud, the superego is the _____ aspect of one's personality.
a. id
b. superego
c. ego
d. super id
page-pf12
According to Felson, crime rates increased due to changes in peoples' lifestyles after
____________.
One major advantage with combating shoplifting is that many customers who observe
pilferage gladly report it to security agents.
Define what is meant by phishing and identity theft.
page-pf13
The consensus view of crime links illegal behavior to the concept of _________
_________.
What is the National Incident-Based Reporting System (NIBRS)? How is it different
from the UCR?
According to Bentham, the purpose of law is to produce and support the total happiness
of the community it serves.
page-pf14
_________ are devoted to the design and collection of valid and reliable data that
address the causes of crime as well as crime patterns and trends.
The widespread use of computers and the Internet has ushered in the age of information
technology in most industrialized societies.
Parental labeling of children is extremely damaging because it may cause adolescents to
seek deviant peers whose behavior amplifies the effect of the labeling.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.