LEG 320 Week 8 Quiz 8 Chapter 14 and 15 – Strayer University NEW

LEG 320 Week 8 Quiz – Strayer

Click on the Link Below to Purchase A+ Graded Course Material

http://budapp.net/LEG-320-Week-8-Quiz-Strayer-449.htm

 

CHAPTER 14
ROBBERY, BURGLARY, AND RELATED CRIMES

MULTIPLE CHOICE

1. Robbery may be thought of as a _____ type of stealing.
a. forcible
b. covert
c. surreptitious
d. inchoate

376

2. “Strong arm” robbery is also known as
a. misdemeanor robbery
b. armed robbery
c. simple robbery
d. aggravated robbery

376

3. A strong-arm robbery is one in which
a. the victim is a child
b. the victim is injured
c. a deadly weapon is used
d. no weapon is displayed or used

376

4. Strong-arm robbery is also known as
a. mugging
b. aggravated robbery
c. armed robbery
d. burglary

376

5. For the crime of robbery to occur
a. the robber must have used force against the victim
b. the robber must have caused physical harm to the victim
c. the robber must have used force or threatened to use imminent force
against the victim
d. the robber must have used or threatened to use gun violence against the
victim

376-377

6. Home invasion requires which of the following?
a. unlawful entry of the dwelling of another with intent to commit a crime
b. persons present in the home
c. use force or threat of force to commit a crime
d. all of these are required

381-382

7. When does purse snatching become robbery?
a. when more force than necessary to take the property is used in the crime
b. when less force than necessary to take the property is used in the crime
c. purse snatching is always robbery
d. none of these answers are true

382-383

8. Unlike most thefts, a robbery requires that the property be taken
a. with an intent to deprive
b. with an intent to commit a felony
c. from the person or from the presence of the victim
d. with a value exceeding $100

376-377

9. In a majority of states, if the perpetrator uses force, not to take the property, but to prevent the victim from escaping, the offense is
a. extortion
b. a robbery
c. embezzlement
d. intimidation

379-380

10. In a majority of states, if a purse-snatching involves no more force than necessary to take the purse from the victim’s hand, the offense will be charged as
a. a robbery
b. a strong armed robbery
c. theft
d. extortion

382-383

11. The crime of defiant trespass occurs when a person
a. remains in a place where he is not privileged to remain after notice of trespass is given
b. is violent in a place where he is not privileged to remain after notice of trespass is given
c. is violent after trespassing
d. remains in a place where he is not privileged to remain after notice of trespass is given and becomes violent

391

12. Forcible stealing is known as
a. robbery
b. burglary
c. aggravated robbery
d. aggravated burglary

376-377

13. In many jurisdictions, the unlawful entry into a dwelling by a person who knows someone is present in the dwelling at the time of the entry, and who is armed with a dangerous weapon which he uses or threatens to use against someone inside the dwelling is considered the crime of
a. intimidation
b. extortion
c. home invasion
d. “strong arm” robbery

381-382

14. Purse snatching without force is a form of
a. theft
b. robbery
c. burglary
d. home invasion

382-383

15. Robbery differs from extortion in that extortion requires
a. a threat to inflict harm in the future
b. the property to be taken from the person of the victim
c. the property to be taken by fraud or deceit
d. the person to be threatened with imminent harm

383-384

16. The federal act dealing specifically with extortion is the
a. Calvin Act
b. Hobbs Act
c. Lindbergh Act
d. Robbery and Extortion Act

384

17. The crime of extortion requires a threat
a. to use violence against the victim
b. to use violence or sue the victim
c. to take certain actions that are not legally protected against the victim, including but not limited to violence, for the purpose of obtaining anything of value from the victim
d. to take steps to tarnish the victim’s reputation

383-384

18. Robbery of persons inhabiting a dwelling is called
a. home invasion
b. aggravated robbery
c. burglary
d. aggravated burglary

381-382

19. The majority rule in the United States is that crimes like purse snatching are not robberies unless
a. there is some force used greater than that needed to take the purse
b. the value of the purse is greater than $100
c. two or more perpetrators participate
d. another crime is committed during the purse snatching

382-383

20. At common law, burglary was limited to
a. the dwelling of another, at night, with intent to commit a felony
b. the dwelling of another, at any time of day, with the intent to steal
c. structures where people gather or live, at night
d. structures where people gather or live, at any time of day

385

21. All states have abolished the common law burglary requirement that there be
a. a felony committed in the building
b. a breaking into the building
c. something stolen from the building
d. more than one burglar involved

385
22. Most courts hold that the crime of burglary requires
a. the burglar get entirely inside the building
b. some part of the burglar’s body (such as an arm) get inside the building
c. the burglar get in and then out of the building
d. some part of the burglar’s body or something attached to the burglar
get inside the building

385-387

23. At common law, the only type of buildings that could be burglarized were
a. dwellings
b. closed businesses and homes
c. businesses
d. privately owned buildings

385

24. Under the common law, the unlawful entry into and theft from a place of business
a. would be considered a burglary
b. would be considered a burglary depending on the value of the stolen
property
c. would not be considered a burglary
d. would be considered burglary if there was a breaking

385

25. Today state and federal burglary statutes
a. restrict burglary to only dwellings
b. consider all buildings within the scope of a jurisdiction’s burglary statute
c. consider only buildings that are inhabited within the scope of burglary
d. follow the common law requirements

385-387

26. What proportion of states have modified and changed the definition of burglary in their jurisdictions?
a. 100%
b. 10%
c. 50%
d. 75%

385-387

27. Under the common law, which of the following was required for burglary?
a. breaking into a residence
b. committing the crime at night
c. intent to commit a felony
d. all of these were required

385-387
28. In most jurisdictions, a defendant who unlawfully enters a building with intent to commit a rape or arson
a. can be convicted of burglary
b. can be convicted of burglary only if they completed the crime they intended to commit when they entered the building
c. cannot be convicted of burglary
d. can be convicted of burglary if they also stole property once inside the building

388-389

29. When force is not used in the taking of property, but it is used to keep the property and to escape from the scene of the theft
a. all states follow the rule that because force wasn’t used to take the property, a robbery was not committed
b. all states follow the rule that because force was used to keep the property after it was stolen, a robbery was committed
c. some state courts have ruled a robbery occurred, while others have ruled it did not occur
d. the crime of extortion was committed

379-380

30. The bad guy unlawfully enters the victim’s house with the intent to sexually assault her but, once inside, he realizes she is not home. He leaves without committing rape and without stealing any property from the home. The bad guy
a. cannot be prosecuted for any crime
b. can only be prosecuted for criminal trespass
c. can be prosecuted for attempted sexual assault
d. can be prosecuted for burglary

388-389

TRUE/FALSE

1. Robbery is the taking of property from a person or from the presence of the victim by the use of force or threat of force.

2. Strong-arm robbery is commonly called “armed robbery.”

3. Home invasion requires unlawful entry of the dwelling of another with intent to commit a crime, with persons present in the home, and the use force or threat of force to commit a crime.

4. Theft differs from robbery in that robbery involves force or threat of force.

5. Grabbing a victim and turning her around to get at her purse is not enough to make purse snatching a robbery.

6. If the threat is to inflict harm in the future, the offense charged will be robbery rather than extortion.

7. For the crime of extortion, the threat need not be communicated in the actual, physical presence of the victim.

8. In some states the burglary statute requires the intent to commit a felony; in others, specific crimes are listed.

9. Criminal trespass occurs when a person unlawfully and knowingly enters the land or building of another.

10. For purposes of a burglary charge, general intent may be inferred from the circumstances of the break-in itself.

COMPLETION

1. The taking of property from a person or from the presence of a victim by use or threat of force is the crime of ____________.

2. Armed or aggravated robbery occurs when a weapon is used in a robbery.

3. A person who unlawfully enters a dwelling knowing someone is present, and threatens the person with a dangerous weapon may be charged with home __________.

4. One of the requirements of home unlawful entry of the dwelling of another with intent to commit a crime.

5. When Congress enacted the __________ Act, the statute was aimed primarily at gangsters who were extorting protection money from businesses.

6. Purse snatching becomes when force more than that needed to take the property is used in the crime.

7. Under the old common law, the punishment for burglary was ________.

8. States no longer require _________ in their simple burglary statutes.

9. __________ trespass occurs when the person unlawfully entering is given notice of the trespass, but refuses to leave the premises.

10. The common law required that burglary be committed in the ___________.

CHAPTER 15
WHITE-COLLAR CRIME, CYBER CRIME, AND COMMERCIAL CRIME

MULTIPLE CHOICE

1. A class or type of criminal conduct that has solely economic gain to the criminal as its goal is known as
a. white collar crime
b. racketeering
c. wire fraud
d. bank fraud

396

2. What federal statute makes it a federal crime to defraud a financial institution that is federally insured?
a. false statement
b. claims
c. bank fraud
d. wire fraud

396-397

3. Deceitful means or acts used to cheat a person, corporation, or governmental agency is known as
a. fraud
b. forgery
c. false statement
d. false claims

396

4. Books, movies, and songs are protected by the
a. federal copyright act
b. the “fair use” doctrine
c. federal and state laws that protect trade secrets
d. federal wire fraud laws

398

5. A scheme to deprive another of the intangible right of honest services is known as a
a. scheme of artifice
b. scheme of neglect
c. scheme of fraud
d. scheme of deprivation

397

6. Laws protecting intellectual property do NOT include which of the following?
a. copyright laws
b. trade secrets
c. wire fraud
d. all of these are included

398-399

7. The reason fraud convictions require action done knowingly is because
a. fraud is a crime of deceit
b. fraud causes more harm than most other crimes
c. too many people would be falsely convicted otherwise
d. persons committing fraud do not always know what they are doing

396-397

8. Martha Stewart was investigated for insider trading
a. and was convicted of that charge
b. but was convicted of making false statements to federal investigators
c. but was convicted of security fraud
d. and was never convicted

405

9. Which of the following is not a type of fraud?
a. material fraud
b. bank fraud
c. health care fraud
d. intellectual property fraud

396 – 398

10. Offering a gift or payment to another with the specific intent to obtain some unlawful particular quid pro quo for the gift or payment is known as
a. bribery
b. bank fraud
c. health care fraud
d. intellectual property fraud

401-403

11. Under the Hobbs Act, what is required of an official regarding the quid pro quo requirement?
a. exercise of some influence
b. an agreement on a specific official act
c. multiple exercises of some influence
d. an agreement on numerous specific official acts

402

12. The term meaning giving something of value for something else is
a. quid pro quo
b. pro bono
c. pro rata
d. quid pro bono

402

13. Bribery under the federal statute is similar to extortion because it is not necessary in an extortion prosecution to prove an official threatened to use his official authority if
a. the extortion amount was not paid
b. the extortion amount was paid
c. the extortion was carried out
d. none of these answers is correct

402-403

14. What are the two types of identity theft?
a. true name and synthetic identity
b. false name and synthetic identity
c. true name and false identity
d. synthetic name and true identity

408

15. Insider trading includes using information acquired by an insider and
a. not available to the public to profit in a sale of securities
b. paid for through bribery
c. received by extorting a government official
d. gained through illegal entry

403-405

16. Which of the following consequences could result from importation of a counterfeit product into the United States?
a. prosecution under the criminal code of a state
b. civil suit and sanctions
c. federal prosecution under the mail fraud statute
d. all of these answers are correct

410-411

17. Criminal acts implemented through use of a computer are known as
a. cyber crime
b. identity theft
c. wire fraud
d. video voyeurism

411-415

18. Unlawful access to a computer or computer system with intent to commit a crime is known as
a. computer trespass
b. identity theft
c. wire fraud
d. video voyeurism

414

19. To convict someone of trafficking in stolen goods, the state is ordinarily required to prove that the
a. property involved was stolen property
b. defendant received, concealed, possessed, purchased, or transferred the -property as forbidden by the statutes of that state
c. defendant knew the property was stolen
d. all of these answers are correct

415

20. A person who traffics in stolen property is called a
a. fence
b. trafficker
c. mobster
d. dealer

415-416

21. Possession of burglary tools is
a. difficult to prove
b. easy to prove
c. not a crime
d. legal in most states

417

22. While the “white collar” language suggests the status of the wrongdoer, most definitions of the term focus on what rather than the identity of the criminal?
a. the kind of behavior made criminal
b. the socio-economic status of the criminal
c. the thinking of the criminal
d. the social impact of the criminal

396
23. The economic cost of white collar crimes is
a. enormous
b. slight
c. the same as many other crimes
d. less than many other crimes

396

24. What criminal charge is often used in fraud cases?
a. theft by fraud or larceny by fraud
b. theft by fraud
c. larceny by fraud
d. none of these answers is correct

396

25. The U.S. Supreme Court has held that any “scheme of artifice” must include which of the following?
a. a material falsehood
b. a legal falsehood
c. a criminal falsehood
d. a falsehood

397

26. It has been estimated that the yearly cost of healthcare fraud is more than
a. $13 billion
b. $14 billion
c. $15 billion
d. $16 billion

397

27. Insider trading includes a person called the
a. tippee
b. tipper
c. rippee
d. ripper

403-405

28. Although Martha Stewart was ultimately convicted of conspiracy and making false statements to federal investigators, what was she initially charged with?
a. insider trading
b. wire fraud
c. bank fraud
d. identity theft

405

29. What is the name of the crime that occurs when an actual person’s identity is stolen?
a. true name identity theft
b. synthetic identity theft
c. cyber identity theft
d. wire identity theft

408-410

30. Which of the following elements is included in wire fraud but NOT necessary in bank fraud?
a. the wire communication must cross state lines
b. the bank fraud must cross state lines
c. the wire communication must cross international borders
d. the bank fraud must cross international borders

407-408

TRUE/FALSE

1. Fraud involves deceitful means or acts to cheat a person, corporation, or governmental agency.

2. Stock market and corporate fraud declined significantly from 1990-2004.

3. Fraud schemes may be prosecuted on the federal, but not state level.

4. The federal government has no general Health Care Fraud statute which makes it a crime to willfully execute a “scheme of artifice” intended to defraud a “health care benefit” program.

5. A federal officer that “solicits” a bribe in exchange for some official act may also threaten to use his official position to prevent the official act from occurring has committed extortion in addition to bribery.

6. The principal laws protecting intellectual property are the federal copyright, patent, and trademark laws, as well as state trade secret laws.

7. The state bank fraud act and the wire fraud act are frequently used to convict white collar criminals.

8. A communication under the bank fraud act must cross state lines.

9. Insider trading includes using information acquired by an insider and not available to the public to profit in a sale of securities.

10. The federal identity theft statute requires the defendant know the identification document belongs to another person.

COMPLETION

1. Using deceitful acts to cheat another is called __________.

2. The federal government has passed many criminal laws directed at health care fraud, such as the False Claims Statute.

3. The _______________ Claims Act makes it a crime to present a claim to the U.S. government that is false or fraudulent.

4. A class or type of criminal conduct that has solely economic gain to the criminal as its goal is the definition of white crime.

5. Among the crimes created to protect stock markets and financial markets of the U.S. is the crime of insider _________.

6. Fraud is in essence a crime of .

7. Congress has power to punish most large fraud schemes under the __________ commerce clause.

8. The receipt of unlawful payment to an official may prove , and also could prove bribery.

9. The primary criminal laws aimed at property fraud are the federal copyright and patent acts and federal and state trade secret acts.

10. The federal fraud act and the wire fraud act are frequently used to convict white collar criminals.