Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Question

White smoke results from the burning of which of the following?
click to flip
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't know

Question

Blue smoke results from the burning of which of the following?
Remaining cards (124)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Criminal Investigati

Criminal Investigation Final

QuestionAnswer
White smoke results from the burning of which of the following? Vegetable compounds
Blue smoke results from the burning of which of the following? Alcohol
Black smoke results from the burning of which of the following? Petroleum
Yellow or brownish smoke results from the burning of which of the following? Sulfur, nitric acid or hydrochloric acid
Matches, candles, lighters or chemical devices can all be used as: Igniters
The biggest difference between traditional evidence and computer evidence is the latter’s: Fragility
A method of tricking someone into voluntarily providing personal information about someone so that the information can be used illegally is called: Phishing
Theft of intellectual property: Involves the pirating of proprietary information and copyrighted material
A virus attack may replace or destroy data on the computer’s hard drive and: Leave a “back door” open to later effect a DoS
.) A victimless crime is any illegal activity in which al involved are willing participants. True
Local patrol officers can provide very limited information concerning organized crime False
The U.S. Congress has defined a drug addict as any person who habitually uses any habit-forming narcotic drug so as to endanger the public morals, health, safety, or welfare, or who is or has been so far addicted to the used of habit-forming narcotic drug True
pupilometer allows police to check if someone is under the influence of alcohol or drugs by measuring the pupils in their eyes as subject to light True
Because of their experience with drugs, drug users are not likely to sell drugs themselves False
Occult murders are usually sacrificial shootings. False
Black men in interracial relationships are one of the groups at highest risk for hate crime. False
Federal legislation creates a blanket standard for hate crime that can be applied anywhere in the United States. False
.) Law enforcement agencies do not need to be concerned about records of the monikers (nick names) for gang members. False
Rohypnol is one of the ______________ drugs Club
_______________________ is the most widely available and most commonly used illicit drug in the United States. Marijuana
____________________ is produced by mixing cocaine with baking soda and water. Crack
People under the influence of illicit stimulants such as cocaine may exhibit extremely agitated and incoherent behavior, a condition known as excited _____________________. Delirium
.) In a cult, the color ____________ may stand for darkness, night, sorrow, evil, or the devil. black
.) ________________ incidents involve behavior that, although motivated by bias, is not criminal acts. Hate
A(n) _________________________ is a verbal spell. incantation
Arson fires usually show the same burn patterns as regular fires False
Strikers start fires because of an irresistible urge or passion for fire False
Knowing the fire’s point of origin is of little importance to an arson investigator. False
.) Evidence of accelerants is a primary form of physical evidence at an arson scene. True
Cybercriminals are solitary by nature and do not operate in groups. False
A search warrant is not needed to search a computer connected to the internet because there is no expectation of privacy. False
When removing a computer from a site, the first thing the investigator should do, for safety, is to turn the machine off and unplug the computer from the wall. False
Electronic evidence is fragile` True
Cyber-terrorism is a premeditated, politically motivated attack against information, computer systems, computer programs, and data that result in violence against non-combatant targets. True
.) In the Model Arson Law, attempting to burn buildings or property is classified as _________-degree arson. 4th
A fire in which arson is suspected but proof is lacking is classified as a(n) __________________ fire. Suspicious
The most common and accurate types of flammable vapor detectors used by arson investigators are ______________________ combustion detectors. Catalytic
The breaking off of surface pieces of concrete or brick due to intense heat is referred to as __________________________. spalling
The FBI defines computer crime as “that which involves the addition, deletion, change or theft of __________________ from a computer.” information
IP stands for Internet __________________, the address needed to access the Internet. Protocal
A computer program such as Internet Explorer that accesses and displays data from the Internet or other networks is called a ____________________. browser
In 1914 the federal government passed this act which made the sale or use of certain drugs illegal: The Harrison Narcotic Act
With reference to drugs, OTC stands for what type of drugs? Over-the-counter
Mescaline and Peyote are Hallucinigens
Drugs can be classified as Depressants, stimulants, narcotics, hallucinogens, cannabis, or inhalants
Designer drugs are illicit drugs which are an offshoot of the legal drug from which they are created. These resulting illicit drugs may cause muscles to stiffen and give the appearance of someone suffering from Parkinson’s disease. These illicit drugs are Analogs
All but one of the below is a sign that a youth may be in a gang. Select the one that in not an indicator wears baggy jeans with underwear showing
The Southern Poverty Law Center is a Watchdog organization for bias and hate crimes
Which 1990 act encouraged departments to report data on hate crime to the FBI? Hate Crime Statistics Act
Which of the following is characteristic of a street gang, as opposed to a drug gang? Loose leadership
In what type of interview do you carefully question the victim about the rapist’s behavior, analyze the behavior to ascertain the motivation underlying the assault, and then compile a profile of the individual likely to have committed the crime? Behavior-oriented interview
A common date rape drug is? Rohypnol
Sex offenses include all but one of the following Pornography
The largest number of people illegally trafficked in the U.S. are from East Asia and the Pacific
The term that has been substituted for rape in most state statutes is Illegal Intercourse
.) Sex offenders, particularly pedophiles – those who abuse young children – are referred to as Chicken Hawks
Most reports of child abuse are made by Third Parties
.) MSBP stands for Munchausen’s Syndrome by Proxy
The most common habitual child sex abuser is the Pedophile
Rohypnol is the oldest drug used in date rape crimes and is up to 10 times more powerful than Valium and Halcion in producing a slowing of physical and mental responses, muscle reflexes, and amnesia True
The civil commitment of sex offenders has been ruled unconstitutional False
Police should allow professional medical personnel to obtain the personal details of a sexual attack False
Police should not accept blind reporting because they do not get to investigate the crime False
Officers sometimes pose as children online to attract child molesters; however, the courts have ruled that this constitutes entrapment and is not legal False
Sexual abuse victims are not significantly more likely to be arrested as adults than their counterparts even after taking into consideration a childhood history characterized by family problems serious enough to have resulted in a dependency hearing False
Child abuse and neglect affect a significant proportion of children’s lives, and children who have been abused are more aggressive and have higher levels of impaired social functioning than their counterparts True
Child pornography is a highly organized, multimillion dollar industry True
An offender’s computer is a good source of information when arresting an individual for child pornography True
Additional evidence in date rape cases may include the presence of _________________ in the victims system Alcohol, drugs or both
Rapists are classified as __________ rapists and ___________rapists power, anger
The police may use _______________ to trace obscene phone calls if given a signed affidavit from the victim stating the facts related to the calls traps
The characteristics of excessive force may identify a rapist as a ________________. anger rapist
Commercial __________________ of children involves the use of children with monetary or other material gain as a direct or indirect goal. sexual exploitation
_______________ Alert is an early-warning network that law enforcement can use to quickly convey key information to the general public via television and radio soon after a child has been abducted. Amber
In a ______________ sex ring, pedophiles keep their activities and photographs totally secret. solo
Physical evidence at the scene of a robbery might include which of the following? All of the above
False robbery reports may be identified by: All of the above
Generally, the three elements of a robbery are: The wrongful taking of personal property, from a person or in the person’s presence, against the person’s will by force or threat of force
The main elements of robbery include: force or fear
Which of the following correctly list priorities at a hostage situation Preserve life, apprehend the hostage taker, and recover or protect property
Burglary differs from robbery in that: Burglars are usually working unseen, while robbers confront their victims
The elements of the crime of burglary include all but which of the following during the nighttime
Most burglary laws increase the severity of the crime of burglary if the burglar possesses: explosives or weapons
Most amateur burglars are between the ages of: 15 and 25
Lack of cooperation in the investigation of a robbery is almost absolute proof that the robbery was staged. False
Robbers may use various types of disguises to keep from being identified, including ski masks, paper sacks, and other types of clothing. True
Officers should rush hostage-takers in order to catch them off-guard. False
The Stockholm Syndrome refers to a situation in which hostages attack the hostage-takers since they know they are about to be killed. False
Police do not need to obtain a search warrant before inspecting pawn shop records. True
Research shows that premises that have previously been burglarized are likely to be burglarized again. True
Providing clearly visible addresses on stores and homes helps prevent burglaries True
DNA is not important in burglary investigations. False
Entering a safe using a sledge and chisels or other instruments to chop a hole in the bottom of a safe is called chopping. True
Most robbers are visibly armed with a weapon or dangerous device and make a(n) ________________ demand of the victim. oral
___________________ know that many Asian families distrust banks and keep large amounts of cash and jewelry in their homes. Home invaders
About eight percent of convenience stores account for more than ____________ percent of all convenience store robberies. 50
The phenomenon in which hostages begin to identify with and sympathize with their captures is known as the ____________________ Syndrome Stockholm
A _____________ burglary is one that occurs in buildings, structures or attachments that are used as or are suitable for dwellings. residential
Breaking and entering is strong __________________ evidence that a crime is intended, meaning that it provides a reasonable basis for belief that the crime was intended. ` presumptive
The opposite method of pulling a safe is ____________________ a safe. punching
With reference to art theft, NSAF stands for: National Stolen Art Files
Which of the following types of larceny is most frequent? Theft from motor vehicles
The most common type of insurance fraud is: The pocketing of customer payments by insurance agents and brokers
Which of the following is not a reason why bicycle thefts are difficult to investigate: Stolen bikes are often altered, dismantled, repainted, and sold
The elements of larceny/theft are: The felonious stealing, taking, carrying, leading or driving away, of another’s personal goods or property of value, with the intent to permanently deprive the owner of the property or goods
Motor vehicle thefts are often associated with: Joyriding, transportation, commission of another crime, stripping vehicles for parts or accessories, reselling vehicles for profit
A business that takes stolen cars apart to sell the parts for profit is known as a: Chop shop
The elements of motor vehicle theft are: Intentionally taking or driving a motor vehicle without consent of the owner or the owner's authorized agent
The elements of interstate transportation of a motor vehicle are: The motor vehicle was stolen, it was transported in interstate or foreign commerce, the person transporting or causing it to be transported knew it was stolen, and the person receiving, concealing, selling, or bartering it knew it was stolen
Phony home repairs are a way that confidence people take money from others. True
The cost of insurance scams totals over 40 million dollars a year. True
Jamming the unauthorized switch of a long-distance carrier, represents the fastest-growing category of complaints to the FCC. False
Farmers create a market for stolen pesticides and herbicides by purchasing them at reduced rates. True
Installing brighter lights in areas where cars are parked has been successfully used to combat auto theft. True
K-9 vehicles are much more likely to be stolen than other police vehicles. False
Construction equipment is rarely stolen. False
Snowmobiles do not generally have specific identification numbers False
One method of improving an officer’s ability to find stolen motor vehicles is by developing a checking system to rapidly determine whether a suspicious vehicle is stolen. True
The FBI has jurisdiction in jewel thefts in which the jewels are moved _______________________. Interstate or by foreign commerce
The phrase “goods or property” refers to all forms of ___________________ property, real or persona. Tangible
The ____________ value at the time of the theft is generally used to determine value of property stolen. market
Shoplifting, also known as __________________, involves taking items from retail stores without paying for them. boosting
Setting up a ______________ operation is one method of combating motor vehicle theft sting
VIN stands for _______________________________________. vehicle identification number
NICB stands for National ______________ Crime Bureau. Insurance
Created by: SydneyO
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards