1. Is worms similar to viruses that reproduce themselves and subvert computer systems but can spread with no assistance?
2. _____ is known as hackers who work to protect systems rather than harm them.
3. _____ is defined as a secret, malicious computer program hidden within other programs.
4. _____ is creates a false (shadow) version of a website that is controlled by the attacker.
5. Is salami techniques a computer crime in which small slices (amounts of money) are taken from many accounts and transferred to that of the thief?
6. _____ is known as entails a cracker stealing password, account, or credit card information.
7. _____ is defined as items that are in high demand to be stolen.
8. _____ is that there should be no restrictions on their right to surf the Internet and test systems.
9. Is hackers unwanted electronic guests regardless of motive?
10. _____ is known as procedures that ask a panel of experts to predict the future.
11. _____ is defined as crime that uses the computer as a tool in crime commission.
12. _____ is the idea that change takes place unevenly— technological changes take place far more quickly than the social aspects of a culture such as its laws and customs.
13. Is crackers ill-intended hackers who attempt to crack (break into) computer systems, often in order to do damage?
14. _____ is known as the stereotypical hacker who is a criminal.
15. _____ is defined as uncomfortable feelings experienced when an addict who has developed tolerance to a substance is deprived of his or her drug.
16. _____ is gaining sexual excitement by secretly observing unknowing victims; such offenders are also called peeping Toms.
17. Is public order crime vice crimes, or crimes without victims?
18. _____ is known as also known as alcoholism; a dependency on or addiction to alcohol.
19. _____ is defined as those who benefit by labeling activity as criminal.
20. _____ is customers of prostitutes.
21. Is incest sexual activity between individuals who are viewed as too closely biologically related?
22. _____ is known as an antidrug act passed in 1914 that required a doctor’s prescription for narcotics and cocaine.
23. _____ is defined as crimes that most everyone commits, e.g., traffic violations.
24. _____ is when individuals have a sexual fixation on objects, attire, or body parts, usually associated with the opposite sex, e.g., feet, lingerie.
25. Is exhibitionism individuals gaining sexual excitement by sexually exposing themselves in order to shock their victims, i.e., flashers?
26. _____ is known as the lessening of penalties attached to a particular behavior.
27. _____ is defined as crimes that are described as “legislated morality” in which there is no identifiable victim other than the person himself or herself.
28. _____ is an approach to crime control that advocates that police not ignore small disturbances lest they lead to bigger crimes.
29. Is addiction an extreme physical and psychological dependence on drugs?
30. _____ is known as japanese organized crime groups (literally, “good-for-nothings”).
31. _____ is defined as chinese organized crime groups.
32. _____ is statute of the Organized Crime Control Act of 1970. It prohibits the use of the proceeds from criminal operations from being used to acquire legitimate operations.
33. Is racketeering dishonest practices, particularly in the labor sector?
34. _____ is known as the most powerful legislation ever passed to attack organized crime. It was passed in 1970.
35. _____ is defined as an illegal game of betting on numbers.
36. _____ is was a major Colombian drug trafficking organization.
37. Is mafiya a term for describing the Russian Mafia?
38. _____ is known as one who illegally lends money at usurious interest rates.
39. _____ is defined as arnold Trebach’s thesis that as soon as one source of heroin supply is shut off, another will emerge to meet the demand.
40. _____ is a 1940s antiracketeering act that holds that any interference with interstate commerce is a violation.
41. Is ethnic succession theory the belief that organized crime has been a ladder of mobility for a succession of ethnic groups?
42. _____ is known as model that shows organized criminal groups exist along a continuum from nonorganized crime to highly organized crime groups.
43. _____ is defined as laws that require that property obtained through criminal activity is surrendered to the state.
44. _____ is the burglary of the Democratic National Headquarters in the Watergate complex by Nixon’s “plumbers group.”
45. Is universal Declaration of Human Rights a United Nations declaration that calls for the respect of human rights?
46. _____ is known as the purposeful targeting of innocents for political purposes in order to spread fear and intimidation.
47. _____ is defined as another name for espionage (literally, “under the rose”).
48. _____ is an acronym for the method of recruiting spies: sex, motivation, ideology, commitment, and ego.
49. Is secret police domestic security police whose purpose it is to protect the existing regime from violent overthrow?
50. _____ is known as a U.S. social movement in the 1980s that attempted to provide refuge for illegal political refugees from Latin America.
51. _____ is defined as machiavelli’s notion that any means are necessary in order to protect the state.
52. _____ is crime committed for ideological reasons.
53. Is patriarchal crime crime committed in the name of male dominance?
54. _____ is known as a secret CIA program to investigate activities of domestic groups.
55. _____ is defined as the precedent established at the Nuremberg trials after World War II that says that, if a person has a conflict between morality and immoral orders, one is to obey morality.
56. _____ is a distinctive belief system.
57. Is human rights basic human activities that are guaranteed in democratic societies such as the right to life, liberty, and the pursuit of happiness?
58. _____ is known as an Islamic, Iranian-backed terrorist group whose name means “party of God.”
59. _____ is defined as in Arabic, “fervor” or “zeal”; a Middle Eastern, Islamic resistance movement.
60. _____ is the eradication of a group.
61. Is espionage spying; the stealing of secrets?
62. _____ is known as the secret organization within the Reagan White House that was responsible for the Iran–Contra affair.
63. _____ is defined as political crimes by the government, from human rights violations to genocide.
64. _____ is political crimes against the government, from protests to terrorism.
65. Is cOINTELPRO a secret FBI program, the Counter Intelligence Program, to discredit legitimate social movements?
66. _____ is known as a form of drastic resocialization of personality.
67. _____ is defined as convicted white-collar offenders who often do not pay penalties.
68. _____ is crime committed by those within legitimate occupations or organizations.
69. Is whistleblowers those who inform on wrongdoing within their organization?
70. _____ is known as secret deal between labor negotiators and management to the disadvantage of the workers.
71. _____ is defined as illegal game to swindle people out of their money.
72. _____ is prisoners who are constantly in and out of prison are described as being in a revolving door.
73. Is pyramid scheme a financial scam relying on the continual recruitment of investors in a nonexistent product (see also Ponzi scheme)?
74. _____ is known as c. Wright Mills’s theory that argues that a small group of corporate, military, and political elite run the United States.
75. _____ is defined as a con game (named after Charles “Get Rich Quick” Ponzi) that involves paying early investors high investment returns with money from later investors in a nonexistent enterprise.
76. _____ is crime committed during the course of a legitimate occupation for the benefit of the employee.
77. Is occupational/organizational crime grid a model that looks at white-collar crimes in terms of whether the perpetrator and victim are individuals, employees, or groups?
78. _____ is known as crime committed during the course of a legitimate occupation for one’s own benefit.
79. _____ is defined as a plea of no contest to charges.
80. _____ is a case in the 1970s of an employee of the Kerr-mcgee nuclear plant who died in an auto accident on her way to report on company wrongdoing.
81. Is insider trading using prohibited, confidential information in order to trade for one’s advantage?
82. _____ is known as spying in the commercial sector.
83. _____ is defined as a term used by C. Wright Mills to describe the moral insensibility of the power elite.
84. _____ is in the 1960s and early 1970s, firetrap engineering of gas tanks on Ford Pintos resulted in the death and injury of hundreds of victims.
85. Is equity funding scandal a corporate scam in which fake insurance policies (ghosts) were created in order to take advantage of reinsurers?
86. _____ is known as theft from an employer by an employee who has reached a level of trust.
87. _____ is defined as those who display criminal-like behavior. A term first used by E. A. Ross to refer to flagitious (wicked) practices that had not yet been condemned by criminal law.
88. _____ is taking products that are prohibited in this country and selling them overseas where there is less regulation.
89. Is corporate crime crime within a legitimate occupation on behalf of one’s employer?
90. _____ is known as games that win the confidence of victims in order to take advantage of them.
91. _____ is defined as a term used in the text to describe a practice in which auto dealer franchises are required to force accessories and unnecessary sales onto customers in order to keep their franchise.
92. _____ is a dishonest practice by stockbrokers of unnecessarily causing many buys and sells of stock in order to collect commissions.
93. Is big dirty secret that the criminal justice system is soft on white-collar crime?
94. _____ is known as swindlers pretend to be bank examiners and ask to borrow “buy money” to catch a dishonest teller.
95. _____ is defined as a scam that preys on naive elderly victims. For example, an elderly man might be falsely accused of sexual relations with a young female who is really a con artist.
96. _____ is professional criminals who specialize in passing bad checks (paperhangers).
97. Is snitches in Mary Cameron Owen’s study, amateur shoplifters?
98. _____ is known as the stealing of merchandise from stores.
99. _____ is defined as professionalism in crime is a matter of degree. The more criminals exhibit each characteristic of professional crime such as skill, high status, and the like, the more professional they are regarded.
100. _____ is an occupation that exhibits esoteric knowledge and a service orientation and achieves autonomy of operation.
Juvenile Delinquency (U.S.)
Contemporary Criminal Law (U.S.)
Criminal Justice and Criminology (Statistics)
Forensic Psychology
Social World (Research Methods)
Criminal Evidence
Related MCQ's