CH 14 theft related offenses Flashcards

1
Q

It is estimated that _______ commit most burglaries

A

opportunist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the average dollar loss per burglary is

A

$2,251

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a person who buys and sells stolen property with criminal intent

A

fence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

One method of showing possession of stolen property is to ___________

A

locate the property on the premises of the suspect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

______ is the most commonly committed crime of personal gain

A

larceny-theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the average value of property taken during larceny-theft was

A

$941 per offense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ consists of drawing cash on accounts made up of uncollected funds. By using 2 different banking institutions, they may use funds from one bank to cover checks drawn on another. each time the bank pays out funds against the account balance, they have been successful in cheating the bank out of its own funds

A

check kinging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the most common way of overcoming embezzellment is for the investigator to _____________

A

solicit the victims help in providing technical support during the investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the destruction, theft or unauthorized use, modification, or copying of information, programs, services, equipment or communication networks

A

cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

perhaps one of the most frightening statistics of all cybercimes involving child predators is that in _____ percent of cases, the victim met up willingly with the attacker, thinking they were meeting someone entirely different

A

100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

another commanlity in computer crimes is that they are largely investigative in nature, using ___ percent traditional police work and )) percent technical skill

A
  1. 10
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

After copying computer crime evidence, the ____, not the _____, is returned to the rightful owner

A

copy, original

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The 9th character of the vin is called

A

check digit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Some of the most common vehicle theft fraud schemes:

A

owner give ups; 30 day specials; export fraud; phantom vehicles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____ is the second most costly white collar crimes in america behind tax evasion

A

fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly