ANSWERS
_______________ terrorism refers to only the acts of terrorism that occurs outside the
United States. - answer-International
________________ includes computer worms and Trojan horses. - answer-Malware
__________________ incapacitation seeks to identify the most dangerous criminals and
incarcerate them to protect society. - answer-Selective
___________________ is a form of high-technology fraud that uses official- looking e-
mail messages to steal valuable information by directing victims to phony websites.
- answer-Phishing
______________________ applies scientific techniques to the detection and evaluation
of criminal evidence. - answer-Criminalistics
_____________________________________ is a nontechnical type of cyber intrusion that
involves tricking people into breaking security procedures, such as persuading them
to give out password details. - answer-Social engineering
A ______________ sentence is a combination of a juvenile disposition and an adult
criminal sentence. - answer-blended
A ________________ criminologist is involved in the cross-national study of crime. -
answer-comparative
A correctional officer is a criminalist. - answer-False
A juvenile confined in a private facility is likely to be __________________. - answer-a
white male
A law enforcement agency that wants to compare a DNA profile they obtained from
a crime scene with other DNA profiles around the country would use which national
database? - answer-CODIS
According to the Juvenile Justice and Delinquency Prevention Act, status offenders
must be deinstitutionalized. - answer-True
Age is correlated with rates of current illicit drug use. - answer-True
An important security tool in medium- security prisons is _________________. -
answer-the count
An inmate organization whose members act together to pose a threat to the safety
of corrections staff or the public is a ____________________. - answer-security threat
group
, Children who purchase cigarettes or alcohol are considered to be
_______________________. - answer-status offenders
CODIS is a DNA database that allows law enforcement agencies to compare DNA
profiles to identify suspects or link serial crimes. - answer-True
Crop control is a successful program by the U.S. government designed to control
the foreign production of illegal drugs. - answer-True
Death row inmates are place in maximum security institutions. - answer-True
DNA analysis can prove either guilt or innocence. - answer-True
Drugs refer specifically to bioactive or psychoactive chemical substances proscribed
by law. - answer-False
Human smuggling and human trafficking arise from similar underlying conditions. -
answer-True
Human smuggling is a form of illegal immigration. - answer-True
In the case of In re Winship, the Supreme Court held that delinquency must be
established ____________________________. - answer-beyond a reasonable doubt
In the case of Kent v. United States, the Supreme Court said that courts must
provide the essentials of due process in juvenile proceedings. - answer-False
In which part of the world does software piracy appear to be most common? -
answer-Asia
Inmates who challenge prison conditions must show deliberate indifference on the
part of prison officials. - answer-True
Inmates whose sexual orientation is not primarily heterosexual are more likely to be
sexually victimized in prison. - answer-True
Jails rarely provide programs for inmates who need drug treatment. - answer-False
Lex talionis is also known as the law of: - answer-retaliation
Michael Faye received ___ lashes. - answer-4
Most women's prisons do not have programs specifically designed for female
offenders. - answer-True
Phishing is usually done through texts and calls from cell phones. - answer-True
President Reagan created the cabinet-level position of ________________ as part of his
focus on the War on Drugs. - answer-Drug Czar