Criminal Law and Cyber Crime
50 questions available
Questions
What is the primary distinction between the burden of proof required in a civil case versus a criminal case?
View answer and explanationUnder the Model Penal Code's classification, a crime punishable by a maximum of ten years' imprisonment is considered what type of felony?
View answer and explanationWhat are the two essential elements that must exist for a person to be convicted of a crime?
View answer and explanationWhat is the primary difference between the property crimes of larceny and robbery?
View answer and explanationWhen a person entrusted with another's property fraudulently appropriates it, what specific white-collar crime has been committed?
View answer and explanationWhat is the maximum fine for an individual found guilty of violating the Racketeer Influenced and Corrupt Organizations Act (RICO)?
View answer and explanationUnder what circumstance can a defendant successfully use the defense of mistake of fact?
View answer and explanationWhat is the exclusionary rule in criminal procedure?
View answer and explanationThe landmark Supreme Court case of Miranda v. Arizona established that a suspect must be informed of which of the following rights before interrogation?
View answer and explanationWhat is the primary purpose of the 'responsible corporate officer doctrine'?
View answer and explanationWhat is the maximum penalty for a corporation that violates the Economic Espionage Act of 1996?
View answer and explanationThe defense of duress can be used for most crimes, but which crime is specifically mentioned as an exception for which duress is not a defense?
View answer and explanationWhat is the primary characteristic of a 'public order crime'?
View answer and explanationWhat is the definition of a 'petty offense'?
View answer and explanationThe defense of entrapment is designed to prevent law enforcement from doing what?
View answer and explanationWhat is the primary function of a grand jury in the criminal process?
View answer and explanationWhat is the term for a crime that involves the willful and malicious burning of a building?
View answer and explanationThe Computer Fraud and Abuse Act (CFAA) establishes that a person who accesses a computer online without authority and takes classified, restricted, or protected data is subject to what?
View answer and explanationWhat is the defining characteristic of money laundering as a form of organized crime?
View answer and explanationWhat is the primary purpose of federal and state 'Stand-Your-Ground' laws?
View answer and explanationAccording to the text, what act by Congress in 2000 confirmed the constitutional basis of the Miranda rights?
View answer and explanationTo establish a 'pattern of racketeering activity' under RICO, how many offenses must a person commit?
View answer and explanationWhat is the defining element of identity theft?
View answer and explanationThe defense of insanity under the M'Naghten test requires the defendant to prove what?
View answer and explanationWhat is the penalty for a private individual who successfully sues a violator under the civil liability provisions of RICO?
View answer and explanationWhat is the legal term for a formal criminal charge issued by a government prosecutor?
View answer and explanationHistorically, what was the primary purpose of arson laws?
View answer and explanationWhich federal act made identity theft a federal crime?
View answer and explanationThe Fifth Amendment protects against double jeopardy. What does this mean for a defendant found not guilty of a state crime?
View answer and explanationWhat is the 'public safety' exception to the Miranda rule?
View answer and explanationWhat is the legal term for the fraudulent making or altering of any writing that changes the legal rights and liabilities of another?
View answer and explanationWhat does it mean if evidence is considered 'fruit of the poisonous tree'?
View answer and explanationHistorically, what was the common law rule regarding the criminal capacity of children under the age of seven?
View answer and explanationWhat is the term for hackers who strive to remain undetected so they can exploit computers for a serious impact, such as shutting down central computers?
View answer and explanationIf a defendant is acquitted in a criminal trial, what prevents the state from trying them again for the same offense?
View answer and explanationWhich federal act requires public schools and libraries to install filtering software to protect children from adult content?
View answer and explanationThe defense of necessity is justifiable if the harm or evil sought to be avoided by the criminal conduct is what?
View answer and explanationWhat does a verdict of 'not guilty' in a criminal trial signify?
View answer and explanationIf a person is granted immunity from prosecution, what happens to their Fifth Amendment privilege against self-incrimination?
View answer and explanationWhat type of arson involves burning a building for the purpose of collecting insurance?
View answer and explanationWhat is the key difference between criminal negligence and criminal recklessness?
View answer and explanationWhich of the following is an example of a public order crime?
View answer and explanationUnder the Supreme Court's 2005 ruling in United States v. Booker, what is the status of the Federal Sentencing Guidelines?
View answer and explanationWhat is the key element that must be proven for the defense of involuntary intoxication to be successful?
View answer and explanationWhich of these is NOT one of the five broad categories of crime listed in the text?
View answer and explanationWhat is required for an act of omission to be considered a crime?
View answer and explanationIn the case of United States v. Lyons, involving telemarketing for fraudulent charities, why was the prosecution allowed to introduce evidence of the high 80 percent commission rates?
View answer and explanationWhat does the defense of consent typically NOT apply to?
View answer and explanationThe 'good faith' exception to the exclusionary rule would allow evidence to be admitted at trial if:
View answer and explanationWhat are the two elements of the crime under the Computer Fraud and Abuse Act (CFAA)?
View answer and explanation