LEG 320 Week 8 Quiz – Strayer
Click on the Link Below to
Purchase A+ Graded Course Material
Quiz 8 Chapter 14 and 15
CHAPTER 14
ROBBERY, BURGLARY, AND RELATED CRIMES
MULTIPLE CHOICE
1. Robbery may be
thought of as a _____ type of stealing.
|
a.
|
forcible
|
|
b.
|
covert
|
|
c.
|
surreptitious
|
|
d.
|
inchoate
|
376
2. “Strong arm”
robbery is also known as
|
a.
|
misdemeanor robbery
|
|
b.
|
armed robbery
|
|
c.
|
simple robbery
|
|
d.
|
aggravated robbery
|
376
3. A strong-arm
robbery is one in which
|
a.
|
the victim is a
child
|
|
b.
|
the victim is
injured
|
|
c.
|
a deadly weapon is
used
|
|
d.
|
no weapon is displayed or used
|
376
4. Strong-arm robbery
is also known as
|
a.
|
mugging
|
|
b.
|
aggravated robbery
|
|
c.
|
armed robbery
|
|
d.
|
burglary
|
376
5. For the crime of
robbery to occur
|
a.
|
the robber must
have used force against the victim
|
|
b.
|
the robber must
have caused physical harm to the victim
|
|
c.
|
the robber must have used force or threatened to use imminent force
against the victim
|
|
d.
|
the robber must
have used or threatened to use gun violence against the
victim
|
376-377
6. Home invasion
requires which of the following?
|
a.
|
unlawful entry of
the dwelling of another with intent to commit a crime
|
|
b.
|
persons present in
the home
|
|
c.
|
use force or threat
of force to commit a crime
|
|
d.
|
all of these are
required
|
381-382
7. When does purse
snatching become robbery?
|
a.
|
when more force
than necessary to take the property is used in the crime
|
|
b.
|
when less force
than necessary to take the property is used in the crime
|
|
c.
|
purse snatching is
always robbery
|
|
d.
|
none of these answers are true
|
382-383
8. Unlike most
thefts, a robbery requires that the property be taken
|
a.
|
with an intent to
deprive
|
|
b.
|
with an intent to
commit a felony
|
|
c.
|
from the person or from the presence of the victim
|
|
d.
|
with a value
exceeding $100
|
376-377
9. In a majority of
states, if the perpetrator uses force, not to take the property, but to prevent
the victim from escaping, the offense is
|
a.
|
extortion
|
|
b.
|
a robbery
|
|
c.
|
embezzlement
|
|
d.
|
intimidation
|
379-380
10. In a majority of
states, if a purse-snatching involves no more force than necessary to take the
purse from the victim’s hand, the offense will be charged as
|
a.
|
a robbery
|
|
b.
|
a strong armed
robbery
|
|
c.
|
theft
|
|
d.
|
extortion
|
382-383
11. The crime of
defiant trespass occurs when a person
|
a.
|
remains in a place
where he is not privileged to remain after notice of trespass is given
|
|
b.
|
is violent in a
place where he is not privileged to remain after notice of trespass is given
|
|
c.
|
is violent after
trespassing
|
|
d.
|
remains in a place
where he is not privileged to remain after notice of trespass is given and becomes
violent
|
391
12. Forcible stealing
is known as
|
a.
|
robbery
|
|
b.
|
burglary
|
|
c.
|
aggravated robbery
|
|
d.
|
aggravated burglary
|
376-377
13. In many
jurisdictions, the unlawful entry into a dwelling by a person who knows someone
is present in the dwelling at the time of the entry, and who is armed with a
dangerous weapon which he uses or threatens to use against someone inside the
dwelling is considered the crime of
|
a.
|
intimidation
|
|
b.
|
extortion
|
|
c.
|
home invasion
|
|
d.
|
“strong arm”
robbery
|
381-382
14. Purse snatching
without force is a form of
|
a.
|
theft
|
|
b.
|
robbery
|
|
c.
|
burglary
|
|
d.
|
home invasion
|
382-383
15. Robbery differs
from extortion in that extortion requires
|
a.
|
a threat to inflict harm in the future
|
|
b.
|
the property to be
taken from the person of the victim
|
|
c.
|
the property to be
taken by fraud or deceit
|
|
d.
|
the person to be
threatened with imminent harm
|
383-384
16. The federal act
dealing specifically with extortion is the
|
a.
|
Calvin Act
|
|
b.
|
Hobbs Act
|
|
c.
|
Lindbergh Act
|
|
d.
|
Robbery and
Extortion Act
|
384
17. The crime of
extortion requires a threat
|
a.
|
to use violence
against the victim
|
|
b.
|
to use violence or
sue the victim
|
|
c.
|
to take certain actions that are not legally protected against the
victim, including but not limited to violence, for the purpose of obtaining
anything of value from the victim
|
|
d.
|
to take steps to
tarnish the victim’s reputation
|
383-384
18. Robbery of persons
inhabiting a dwelling is called
|
a.
|
home invasion
|
|
b.
|
aggravated robbery
|
|
c.
|
burglary
|
|
d.
|
aggravated burglary
|
381-382
19. The majority rule
in the United States is that crimes like purse snatching are not robberies
unless
|
a.
|
there is some force
used greater than that needed to take the purse
|
|
b.
|
the value of the purse is greater than $100
|
|
c.
|
two or more
perpetrators participate
|
|
d.
|
another crime is
committed during the purse snatching
|
382-383
20. At common law,
burglary was limited to
|
a.
|
the dwelling of another, at night, with intent to commit a felony
|
|
b.
|
the dwelling of
another, at any time of day, with the intent to steal
|
|
c.
|
structures where
people gather or live, at night
|
|
d.
|
structures where
people gather or live, at any time of day
|
385
21. All states have
abolished the common law burglary requirement that there be
|
a.
|
a felony committed
in the building
|
|
b.
|
a breaking into the building
|
|
c.
|
something stolen
from the building
|
|
d.
|
more than one
burglar involved
|
385
22. Most courts hold
that the crime of burglary requires
|
a.
|
the burglar get
entirely inside the building
|
|
b.
|
some part of the
burglar’s body (such as an arm) get inside the building
|
|
c.
|
the burglar get in
and then out of the building
|
|
d.
|
some part of the burglar’s body or something attached to the burglar
get inside the building
|
385-387
23. At common law, the
only type of buildings that could be burglarized were
|
a.
|
dwellings
|
|
b.
|
closed businesses
and homes
|
|
c.
|
businesses
|
|
d.
|
privately owned
buildings
|
385
24. Under the common
law, the unlawful entry into and theft from a place of business
|
a.
|
would be considered
a burglary
|
|
b.
|
would be considered
a burglary depending on the value of the stolen
property
|
|
c.
|
would not be considered a burglary
|
|
d.
|
would be considered
burglary if there was a breaking
|
385
25. Today state and
federal burglary statutes
|
a.
|
restrict burglary
to only dwellings
|
|
b.
|
consider all buildings within the scope of a jurisdiction’s burglary
statute
|
|
c.
|
consider only
buildings that are inhabited within the scope of burglary
|
|
d.
|
follow the common
law requirements
|
385-387
26. What proportion of
states have modified and changed the definition of burglary in their
jurisdictions?
|
a.
|
100%
|
|
b.
|
10%
|
|
c.
|
50%
|
|
d.
|
75%
|
385-387
27. Under the common
law, which of the following was required for burglary?
|
a.
|
breaking into a
residence
|
|
b.
|
committing the
crime at night
|
|
c.
|
intent to commit a
felony
|
|
d.
|
all of these were required
|
385-387
28. In most
jurisdictions, a defendant who unlawfully enters a building with intent to
commit a rape or arson
|
a.
|
can be convicted of burglary
|
|
b.
|
can be convicted of
burglary only if they completed the crime they intended to commit when they
entered the building
|
|
c.
|
cannot be convicted
of burglary
|
|
d.
|
can be convicted of
burglary if they also stole property once inside the building
|
388-389
29. When force is not
used in the taking of property, but it is used to keep the property and to
escape from the scene of the theft
|
a.
|
all states follow
the rule that because force wasn’t used to take the property, a robbery was
not committed
|
|
b.
|
all states follow
the rule that because force was used to keep the property after it was
stolen, a robbery was committed
|
|
c.
|
some state courts have ruled a robbery occurred, while others have
ruled it did not occur
|
|
d.
|
the crime of
extortion was committed
|
379-380
30. The bad guy
unlawfully enters the victim’s house with the intent to sexually assault her
but, once inside, he realizes she is not home.
He leaves without committing rape and without stealing any property from
the home. The bad guy
|
a.
|
cannot be
prosecuted for any crime
|
|
b.
|
can only be
prosecuted for criminal trespass
|
|
c.
|
can be prosecuted
for attempted sexual assault
|
|
d.
|
can be prosecuted for burglary
|
388-389
TRUE/FALSE
1. Robbery is the
taking of property from a person or from the presence of the victim by the use
of force or threat of force.
2. Strong-arm robbery
is commonly called “armed robbery.”
3. Home invasion
requires unlawful entry of the dwelling of another with intent to commit a crime,
with persons present in the home, and the use force or threat of force to
commit a crime.
4. Theft differs from
robbery in that robbery involves force or threat of force.
5. Grabbing a victim
and turning her around to get at her purse is not enough to make purse
snatching a robbery.
6. If the threat is
to inflict harm in the future, the offense charged will be robbery rather than
extortion.
7. For the crime of
extortion, the threat need not be communicated in the actual, physical presence
of the victim.
8. In some states the
burglary statute requires the intent to commit a felony; in others, specific
crimes are listed.
9. Criminal trespass
occurs when a person unlawfully and knowingly enters the land or building of
another.
10. For purposes of a
burglary charge, general intent may be inferred from the circumstances of the
break-in itself.
COMPLETION
1. The taking of
property from a person or from the presence of a victim by use or threat of
force is the crime of ____________.
2. Armed or
aggravated robbery occurs when a weapon is used in a robbery.
3. A person who
unlawfully enters a dwelling knowing someone is present, and threatens the
person with a dangerous weapon may be charged with home __________.
4. One of the
requirements of home unlawful entry of the dwelling of another with
intent to commit a crime.
5. When Congress
enacted the __________ Act, the
statute was aimed primarily at gangsters who were extorting protection money
from businesses.
6. Purse snatching
becomes when force more than that needed to take the
property is used in the crime.
7. Under the old
common law, the punishment for burglary was ________.
8. States no longer
require _________ in their
simple burglary statutes.
9. __________
trespass occurs when the person unlawfully entering is given notice of the
trespass, but refuses to leave the premises.
10. The common law
required that burglary be committed in the ___________.
CHAPTER 15
WHITE-COLLAR CRIME, CYBER CRIME, AND COMMERCIAL CRIME
MULTIPLE CHOICE
1. A class or type of
criminal conduct that has solely economic gain to the criminal as its goal is
known as
|
a.
|
white collar crime
|
|
b.
|
racketeering
|
|
c.
|
wire fraud
|
|
d.
|
bank fraud
|
396
2. What federal
statute makes it a federal crime to defraud a financial institution that is
federally insured?
|
a.
|
false statement
|
|
b.
|
claims
|
|
c.
|
bank fraud
|
|
d.
|
wire fraud
|
396-397
3. Deceitful means or
acts used to cheat a person, corporation, or governmental agency is known as
|
a.
|
fraud
|
|
b.
|
forgery
|
|
c.
|
false statement
|
|
d.
|
false claims
|
396
4. Books, movies, and
songs are protected by the
|
a.
|
federal copyright act
|
|
b.
|
the “fair use”
doctrine
|
|
c.
|
federal and state
laws that protect trade secrets
|
|
d.
|
federal wire fraud
laws
|
398
5. A scheme to
deprive another of the intangible right of honest services is known as a
|
a.
|
scheme of artifice
|
|
b.
|
scheme of neglect
|
|
c.
|
scheme of fraud
|
|
d.
|
scheme of
deprivation
|
397
6. Laws protecting
intellectual property do NOT include which of the following?
|
a.
|
copyright laws
|
|
b.
|
trade secrets
|
|
c.
|
wire fraud
|
|
d.
|
all of these are included
|
398-399
7. The reason fraud
convictions require action done knowingly is because
|
a.
|
fraud is a crime of
deceit
|
|
b.
|
fraud causes more harm
than most other crimes
|
|
c.
|
too many people
would be falsely convicted otherwise
|
|
d.
|
persons committing fraud do not always know what they are doing
|
396-397
8. Martha Stewart was
investigated for insider trading
|
a.
|
and was convicted
of that charge
|
|
b.
|
but was convicted of making false statements to federal investigators
|
|
c.
|
but was convicted
of security fraud
|
|
d.
|
and was never
convicted
|
405
9. Which of the
following is not a type of fraud?
|
a.
|
material fraud
|
|
b.
|
bank fraud
|
|
c.
|
health care fraud
|
|
d.
|
intellectual property fraud
|
396
- 398
10. Offering a gift or
payment to another with the specific intent to obtain some unlawful particular
quid pro quo for the gift or payment is known as
|
a.
|
bribery
|
|
b.
|
bank fraud
|
|
c.
|
health care fraud
|
|
d.
|
intellectual property fraud
|
401-403
11. Under the Hobbs
Act, what is required of an official regarding the quid pro quo requirement?
|
a.
|
exercise of some
influence
|
|
b.
|
an agreement on a
specific official act
|
|
c.
|
multiple exercises
of some influence
|
|
d.
|
an agreement on
numerous specific official acts
|
402
12. The term meaning
giving something of value for something else is
|
a.
|
quid pro quo
|
|
b.
|
pro bono
|
|
c.
|
pro rata
|
|
d.
|
quid pro bono
|
402
13. Bribery under the
federal statute is similar to extortion because it is not necessary in an
extortion prosecution to prove an official threatened to use his official
authority if
|
a.
|
the extortion
amount was not paid
|
|
b.
|
the extortion
amount was paid
|
|
c.
|
the extortion was
carried out
|
|
d.
|
none of these
answers is correct
|
402-403
14. What are the two
types of identity theft?
|
a.
|
true name and
synthetic identity
|
|
b.
|
false name and synthetic identity
|
|
c.
|
true name and false
identity
|
|
d.
|
synthetic name and
true identity
|
408
15. Insider trading
includes using information acquired by an insider and
|
a.
|
not available to
the public to profit in a sale of securities
|
|
b.
|
paid for through
bribery
|
|
c.
|
received by
extorting a government official
|
|
d.
|
gained through
illegal entry
|
403-405
16. Which of the
following consequences could result from importation of a counterfeit product
into the United States?
|
a.
|
prosecution under
the criminal code of a state
|
|
b.
|
civil suit and
sanctions
|
|
c.
|
federal prosecution
under the mail fraud statute
|
|
d.
|
all of these
answers are correct
|
410-411
17. Criminal acts
implemented through use of a computer are known as
|
a.
|
cyber crime
|
|
b.
|
identity theft
|
|
c.
|
wire fraud
|
|
d.
|
video voyeurism
|
411-415
18. Unlawful access to
a computer or computer system with intent to commit a crime is known as
|
a.
|
computer trespass
|
|
b.
|
identity theft
|
|
c.
|
wire fraud
|
|
d.
|
video voyeurism
|
414
19. To convict someone
of trafficking in stolen goods, the state is ordinarily required to prove that
the
|
a.
|
property involved
was stolen property
|
|
b.
|
defendant received,
concealed, possessed, purchased, or transferred the -property as forbidden by
the statutes of that state
|
|
c.
|
defendant knew the
property was stolen
|
|
d.
|
all of these answers are correct
|
415
20. A person who traffics
in stolen property is called a
|
a.
|
fence
|
|
b.
|
trafficker
|
|
c.
|
mobster
|
|
d.
|
dealer
|
415-416
21. Possession of
burglary tools is
|
a.
|
difficult to prove
|
|
b.
|
easy to prove
|
|
c.
|
not a crime
|
|
d.
|
legal in most states
|
417
22. While the “white collar”
language suggests the status of the wrongdoer, most definitions of the term
focus on what rather than the identity of the criminal?
|
a.
|
the kind of
behavior made criminal
|
|
b.
|
the socio-economic
status of the criminal
|
|
c.
|
the thinking of the
criminal
|
|
d.
|
the social impact
of the criminal
|
396
23. The economic cost
of white collar crimes is
|
a.
|
enormous
|
|
b.
|
slight
|
|
c.
|
the same as many other crimes
|
|
d.
|
less than many other crimes
|
396
24. What criminal
charge is often used in fraud cases?
|
a.
|
theft by fraud or
larceny by fraud
|
|
b.
|
theft by fraud
|
|
c.
|
larceny by fraud
|
|
d.
|
none of these answers is correct
|
396
25. The U.S. Supreme
Court has held that any “scheme of artifice” must include which of the
following?
|
a.
|
a material
falsehood
|
|
b.
|
a legal falsehood
|
|
c.
|
a criminal
falsehood
|
|
d.
|
a falsehood
|
397
26. It has been
estimated that the yearly cost of healthcare fraud is more than
|
a.
|
$13 billion
|
|
b.
|
$14 billion
|
|
c.
|
$15 billion
|
|
d.
|
$16 billion
|
397
27. Insider trading
includes a person called the
|
a.
|
tippee
|
|
b.
|
tipper
|
|
c.
|
rippee
|
|
d.
|
ripper
|
403-405
28. Although Martha
Stewart was ultimately convicted of conspiracy and making false statements to
federal investigators, what was she initially charged with?
|
a.
|
insider trading
|
|
b.
|
wire fraud
|
|
c.
|
bank fraud
|
|
d.
|
identity theft
|
405
29. What is the name of
the crime that occurs when an actual person’s identity is stolen?
|
a.
|
true name identity
theft
|
|
b.
|
synthetic identity
theft
|
|
c.
|
cyber identity
theft
|
|
d.
|
wire identity theft
|
408-410
30. Which of the
following elements is included in wire fraud but NOT necessary in bank fraud?
|
a.
|
the wire
communication must cross state lines
|
|
b.
|
the bank fraud must
cross state lines
|
|
c.
|
the wire
communication must cross international borders
|
|
d.
|
the bank fraud must
cross international borders
|
407-408
TRUE/FALSE
1. Fraud involves
deceitful means or acts to cheat a person, corporation, or governmental agency.
2. Stock market and
corporate fraud declined significantly from 1990-2004.
3. Fraud schemes may
be prosecuted on the federal, but not state level.
4. The federal
government has no general Health Care Fraud statute which makes it a crime to
willfully execute a “scheme of artifice” intended to defraud a “health care
benefit” program.
5. A federal officer
that “solicits” a bribe in exchange for some official act may also threaten to
use his official position to prevent the official act from occurring has
committed extortion in addition to bribery.
6. The principal laws
protecting intellectual property are the federal copyright, patent, and
trademark laws, as well as state trade secret laws.
7. The state bank
fraud act and the wire fraud act are frequently used to convict white collar
criminals.
8. A communication
under the bank fraud act must cross state lines.
9. Insider trading
includes using information acquired by an insider and not available to the
public to profit in a sale of securities.
10. The federal
identity theft statute requires the defendant know the identification document
belongs to another person.
COMPLETION
1. Using deceitful
acts to cheat another is called __________.
2. The federal
government has passed many criminal laws directed at health care fraud, such as
the False Claims Statute.
3. The _______________ Claims Act makes it a
crime to present a claim to the U.S. government that is false or fraudulent.
4. A class or type of
criminal conduct that has solely economic gain to the criminal as its goal is
the definition of white crime.
5. Among the crimes
created to protect stock markets and financial markets of the U.S. is the crime
of insider _________.
6. Fraud is in
essence a crime of .
7. Congress has power
to punish most large fraud schemes under the __________ commerce clause.
8. The receipt of
unlawful payment to an official may prove ,
and also could prove bribery.
9. The primary
criminal laws aimed at property fraud are the federal copyright and
patent acts and federal and state trade secret acts.
10. The federal fraud act and the wire fraud act are
frequently used to convict white collar criminals.
Comments
Post a Comment