Criminal Investigation Third Edition Test Bank
Criminal Investigation Third Edition Test Bank is your go-to study guide, providing essential notes and practice exercises for exam success.
Joseph Wilson
Contributor
4.7
36
1 day ago
Preview (16 of 127)
Sign in to access the full document!
Brandl,
Criminal
Investigations
3rd Edition
Instructor
Resource
1. In the Unabomber investigation, which of the following proved to be
valuable in identifying Ted Kaczynski as the perpetrator?
a. The reference to wood
b. The initials FC
c. The "call Nathan R" note
d. The social security number
*e. none of the above
2. The most common activities performed in investigations are:
a. Searching for witnesses and victims
b. Interviewing witnesses and victims
c. Reading and writing reports
*d. All of the above
3. Stings, decoys, undercover fencing operations, and stakeouts are
types of:
*a. Undercover investigations
b. Reactive investigations
c. Initial investigations
d. Follow-up investigations
4. According to the information theory as it applies to the criminal
investigation process:
a. Computer technology must be incorporated into criminal
investigations
*b. The criminal investigation process resembles a battle between
the police and the perpetrator over crime-related information
c. All statements made to the media concerning ongoing
investigations should come from one designated police official
d. A case screening model should be used in the investigation
process in order for the consideration of irrelevant case
information
5. What factors help explain why the police solve so "few" crimes?
a. The structure of most crimes
b. The nature of the police response (reactive)
c. Police powers limited by law
Criminal
Investigations
3rd Edition
Instructor
Resource
1. In the Unabomber investigation, which of the following proved to be
valuable in identifying Ted Kaczynski as the perpetrator?
a. The reference to wood
b. The initials FC
c. The "call Nathan R" note
d. The social security number
*e. none of the above
2. The most common activities performed in investigations are:
a. Searching for witnesses and victims
b. Interviewing witnesses and victims
c. Reading and writing reports
*d. All of the above
3. Stings, decoys, undercover fencing operations, and stakeouts are
types of:
*a. Undercover investigations
b. Reactive investigations
c. Initial investigations
d. Follow-up investigations
4. According to the information theory as it applies to the criminal
investigation process:
a. Computer technology must be incorporated into criminal
investigations
*b. The criminal investigation process resembles a battle between
the police and the perpetrator over crime-related information
c. All statements made to the media concerning ongoing
investigations should come from one designated police official
d. A case screening model should be used in the investigation
process in order for the consideration of irrelevant case
information
5. What factors help explain why the police solve so "few" crimes?
a. The structure of most crimes
b. The nature of the police response (reactive)
c. Police powers limited by law
Loading page 6...
Loading page 7...
Loading page 8...
Loading page 9...
Loading page 10...
Loading page 11...
Loading page 12...
Loading page 13...
Loading page 14...
Loading page 15...
Loading page 16...
15 more pages available. Scroll down to load them.
Preview Mode
Sign in to access the full document!
100%
Study Now!
XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat
Document Details
Subject
Criminal Justice