Final exam Day 3 Flashcards Preview

Criminal investigation > Final exam Day 3 > Flashcards

Flashcards in Final exam Day 3 Deck (15)
Loading flashcards...
1
Q

Business related or occupational crime that involves illegal acts characterized by fraud, concealment, or a violation of trust and does not depend on the actual or threatened use of physical force or violence.

A

White Collar Crime

2
Q

A model of vehicle with a high theft rate that is selected and placed in a high crime area as bait for motor vehicle theft.

A

Bait Car

3
Q

Made interstate transportation of a stolen motor vehicle a federal crime and allowed for federal assistance in prosecuting such cases.

A

Dyer Act

4
Q

Simply taking a vehicle for fun, often driving recklessly and without regard for any damage caused to the vehicle itself or other property, and then abandoning it.

A

Joyriding

5
Q

Any self-propelled device for moving persons or property or pulling implements, whether operated on land, on water, or in the air.

A

motor vehicle

6
Q

Primary non duplicated, serialized number assigned by the manufacturer to each vehicle manufactured

A

vehicle identification number (VIN)-

7
Q

Malicious, willful burning of a building or property

A

Arson

8
Q

Substances that cause fires to burn faster and hotter.

A

Accelerant

9
Q

Behavior that conveys a low level of intent to inflict harm and an absence of malice.

A

Fire play

10
Q

Describes a fire ignited intentionally and maliciously under circumstances in which a person knows that the fire should not be set.

A

Incendiary

11
Q

Breaking off of surface pieces of concrete, cement or brick because of intense heat.

A

Spalling

12
Q

An internet currency used in online payment programs.

A

Bitcoins

13
Q

Part of the larger category of computer crime, a criminal act that is carried out using cyber-technology and that takes place in cyberspace.

A

Cybercrime

14
Q

Premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in harm to noncombatant targets by subnational groups or clandestine agents

A

Cyberterrorism

15
Q

Secretly attaches another program to a company’s computer system.

A

Logic Bomb