Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Law
Q:
Bribery of foreign government officials is both an ethical and a legal issue.
Q:
A business firm's profits may suffer if the firm is not a "good corporate citizen."
Q:
If the interests of different stakeholders conflict, it can be difficult to determine which group's interest should receive greater weight.
Q:
Corporations can be perceived as owing ethical duties to groups other than their shareholders.
Q:
Corporations can be good citizens by promoting goals that society deems worthwhile.
Q:
According to utilitarianism, an action that affects the majority adversely is morally wrong.
Q:
According to utilitarianism, it matters how many people suffer a negative effect from an act.
Q:
In ethical terms, a cost-benefit analysis is an assessment of the negative and positive effects of alternative actions on individuals.
Q:
The categorical imperative cannot be applied to many business actions.
Q:
Absolute mandates such as the commandment "Thou shalt not steal" can be justifiably broken if there is a benevolent motive.
Q:
According to German philosopher Immanuel Kant, individuals should evaluate their actions in light of the consequences that would follow if they were the only members of society that acted in that way.
Q:
Duty-based ethical standards often come from religious precepts or through philosophical reasoning.
Q:
Ethical reasoning is the process through which an individual links his or her moral convictions or ethical standards to the particular situation at hand.
Q:
Restricting the bonuses that are paid to executives is unethical.
Q:
Stock buybacks are illegal and serve no legitimate purposes.
Q:
The main individual beneficiaries of stock buybacks are corporate executives.
Q:
EthicsPoint is an organization through which employees can report unethical behavior as long as they are willing to identify themselves.
Q:
Some companies set up confidential systems for employees to "raise red flags" about suspected unethical practices.
Q:
Few companies provide any kind of support such as ethical training programs and seminars to make their ethical codes more effective.
Q:
An ethics program can clarify what a company considers to be unacceptable conduct.
Q:
Managers should apply the same ethical standards to themselves and to their employees.
Q:
Setting realistic workplace goals can increase the probability that employees will act unethically.
Q:
Management's behavior sets the ethical tone of a firm.
Q:
Ethical codes of conduct can set the ethical tone of a firm.
Q:
Acting in good faith gives a business firm a better chance of defending its actions in court.
Q:
A business firm can sometimes predict whether a given action is legal.
Q:
It is not possible to violate a business regulation without realizing it.
Q:
The legality of an action is always clear.
Q:
Focusing on a firm's short-term profits without considering the company's long-term needs may be acting unethically.
Q:
Obeying the law does not necessarily fulfill all ethical obligations.
Q:
An action may be legal and ethical.
Q:
Business ethics focuses on ethical behavior in the business world.
Q:
Adhering strictly to all business laws is all that is necessary to fulfill all business ethics obligations.
Q:
Ethics is concerned with the fairness or justness of an action.
Q:
Business ethics is not more complicated than personal ethics.
Q:
An unknown individual launches a series of attacks against the Web sites of Prime Sales Corporation. The attacks significantly slow the sites, leading to $100 million in damage in terms of lost work time, lost revenue, site repair costs, and other expenses. The attacker does not intend to profit from the onslaught and in fact does not realize any financial benefit from the effects. How is this attack most likely orchestrated? Who is most likely to engage in this actthat is, whose habits and limitations are clearly suited to such conductand why?
Q:
Sophie is the president of Tasty Foods Corporation, a wholesale grocery company. An inspection by Uri, a government agent, uncovers unsanitary conditions in the company's warehouse caused by Vic, a Tasty Foods employee. Will, a Tasty Foods vice president, assures Uri that the situation will be corrected, but a later inspection finds that the warehouse is still unsanitary. Sophie knows nothing about any of this. Can Tasty Foods be convicted of a crime in these circumstances? Can Sophie be held personally liable?
Q:
Patricia commits an act via e-mail against Othman Finance Company, a business in California, where the act is a cyber crime. Patricia resides in New York where the act is not a crime. Prosecution of Patricia in California involves questions of
a. jurisdiction.
b. "maximum contacts."
c. the immunity of Internet service providers.
d. encryption.
Q:
Via the Internet, Rocky sabotages the computer system of Quik Chik"n Company, a food manufacturer, to alter the levels of ingredients in thecompany's products so that consumers of the food become ill. Rocky is aa. cyberterrorist.b. botnet.c. virus.d. worm.
Q:
Farouk uses his computer to break into Global Financial Center's computer. Farouk is a
a. hacker.
b. phisher.
c. worm.
d. virus.
Q:
Posing as Platinum Bank, Oswald e-mails Nadia, asking her to update her personal banking information through a link in the e-mail. She clicks on the link and types in the data, which Oswald promptly sells to Moe. This is
a. hacking.
b. identity theft.
c. cyberterrorism.
d. bribery.
Q:
Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to her computer torecord her keystrokes and send the data to Travis. He uses the data to obtain her personal information and access her financial resources. This isa. identity theft.b. cyberterrorism.c. entrapment.d. no crime.
Q:
Gina sells "Bulk Up" steroids over the Internet. She is arrested and charged with the sale of a controlled substance. This is cyber crime, which is
a. a new category of crime that is not related to older types of crime.
b. a crime that occurs the virtual community of the Internet.
c. a crime that is less real than the same crime in the physical world.
d. no crime.
Q:
Herb, a computer programmer for Inventory Control Corporation, is arrested in his employer's parking lot on suspicion of larceny. Herb must be informed of his right to
a. a trial by jury.
b. punishment.
c. question witnesses.
d. remain silent.
Q:
Jackson is accused of a crime. Jackson can refuse to provide information about his allegedly criminal activities
a. if he suspects the information will be used to prosecute him.
b. if the police do not promise to keep the information confidential.
c. if the information is "fruit of the poisonous tree."
d. under no circumstances.
Q:
Alan, the president of Bayside Investments, Inc., and Colin, Bayside's accountant, are charged with a crime, after the police search Bayside's offices. Under the exclusionary rule
a. certain Bayside records are excluded from subpoena.
b. certain parties to a criminal action may be excluded from a trial.
c. illegally obtained evidence must be excluded from a trial.
d. persons who have biases that would prevent them from fairly deciding the case may be excluded from the jury.
Q:
Justin is charged with a crime. He insists that he should have an opportunity to object to the charges before a "fair, neutral decision maker." No one can be deprived of "life, liberty, or property without due process of law" under the
a. Second Amendment.
b. Fourth Amendment.
c. Fifth Amendment.
d. Eighth Amendment.
Q:
Maya, a police officer, wants to search the offices of Niles Corporation. Maya asks Judge Orion to issue a warrant. Under the Fourth Amendment,no warrants for a search or an arrest can be issued withouta. double jeopardy.b. probable cause.c. reasonable doubt.d. immunity.
Q:
Mae is granted immunity after she agrees to testify about a crime. Mae has an absolute privilege against self-incrimination and
a. can be prosecuted only for a crime about which she agreed to testify.
b. cannot be prosecuted for any crime.
c. cannot refuse to testify on Fifth Amendment grounds.
d. can refuse to testify on Fifth Amendment grounds.
Q:
Davis points a gun at Eton, threatening to shoot him if he does not steal from his employer, Freddy's Convenience Store, and give the stolen funds to Davis. Charged with theft, Eton can successfully claim, as a defensea. nothing.b. duress.c. entrapment.d. self-defense.
Q:
Evan is charged with a crime. Almost all federal courts and some state courts would not hold Evan liable if, at the time of the offense, as a result of a mental disease or defect, Evan lacked substantial capacity to
a. appreciate the wrongfulness of his conduct only.
b. appreciate the wrongfulness of his conduct and obey the law.
c. appreciate the wrongfulness of his conduct or obey the law.
d. obey the law only.
Q:
Vance points a gun at Workman and threatens to shoot him. Workman hits Vance, causing his death. Charged with homicide, Workman can successfully claim as a defense
a. nothing.
b. duress.
c. entrapment.
d. self-defense.
Q:
Smitty, driving while intoxicated, causes a car accident that results in the death of Tiffany. Smitty is arrested and charged with a felony. A felony is a crime punishable by death or imprisonment for
a. any period of time.
b. more than one year.
c. more than six months.
d. more than ten days.
Q:
Megan is charged with jaywalking, which is classified as
a. a misdemeanor.
b. a felony.
c. a petty offense.
d. no crime.
Q:
Jared is arrested and found guilty of a misdemeanor. His punishment will not include
a. imprisonment for six months.
b. a fine of $100.
c. death.
d. imprisonment for six months and a fine of $500.
Q:
Bruno is a businessperson with investments in legal and illegal operations. Bruno may be subject to penalties under RICO
a. for making an unprofitable, but legal, investment.
b. for the commission of any business fraud.
c. only in a case involving a "racket."
d. only in a case involving organized crime.
Q:
Dirk, an employee of Ergonomic Elevators, Inc., pays Ferbie, an employee of Ergonomics' competitor G-Force Risers Company, for a secret G-Force pricing schedule. This isa. an effective marketing strategy.b. commercial bribery.c. creative legal bookkeeping.d. money laundering.
Q:
Mona offers Ned, a building inspector, $5,000 to overlook the violations in her new warehouse. Ned accepts the cash and overlooks the violations. Mona is charged with the crime of bribery. The crime occurred when
a. Mona decided to offer the bribe.
b. Mona offered the bribe.
c. Ned accepted the bribe.
d. Ned overlooked the violations.
Q:
Robert uses the Internet to defraud Prairie Valley Credit Union. He is found guilty of wire fraud. He can be punished by
a. imprisonment for not more than one year.
b. imprisonment for up to thirty years and fines of up to $1 million.
c. fines for not more than $50,000.
d. death.
Q:
After Edie solicits clients to invest in a nonexistent business, she is charged with "mail fraud." This requires, among other things,
a. claiming that an item is "in the mail" when it is not.
b. deceiving postal authorities as to the content of an item of mail.
c. depositing items in the postal system without proper postage.
d. mailing or causing someone else to mail a writing.
Q:
Briana, an employee of Cotillion Bank, is charged with embezzlement, which requires
a. fraudulently appropriating another's property.
b. obtaining lawful possession of property.
c. physically taking property from its owner.
d. the use of force or fear.
Q:
Jake is charged with embezzlement. Embezzlement may be committed without
a. a criminal act.
b. a criminal intent.
c. taking property from its owner.
d. the use of force or fear.
Q:
Ivan signs Jeb's name, without his authorization, to the back of a check.
This is
a. no crime.
b. forgery.
c. larceny.
d. robbery.
Q:
Leah gains access to government records and alters certain dates and amounts in her favor. This is
a. embezzlement.
b. forgery.
c. larceny.
d. no crime.
Q:
Susan is unhappy with the way her mother has made out her will. Susan has a lawyer draft a new will and then signs her mother's name to it without her mother's consent. Susan has committed
a. larceny.
b. no crime.
c. robbery.
d. forgery.
Q:
Plato works for Quirky Squirters, Inc. During work hours, Plato "steals" time, space, and data on his employer's computer system to start up his own business, Rowdy Drenchers. This is
a. burglary.
b. robbery.
c. larceny.
d. no crime.
Q:
Scott, a State Bank employee, deposits into his account checks that are given to him by bank customers to deposit into their accounts. This is
a. embezzlement.
b. larceny.
c. money laundering.
d. no crime.
Q:
Mariah takes off her ring and places it on her desk while she works. Without her knowledge or consent, her coworker Nita picks up the ring, puts it on, and walks away. Nita has likely committed
a. burglary.
b. forgery.
c. larceny.
d. no crime.
Q:
William goes to Saddle Up Stables in the middle of the night when no one is around and takes five saddles. William's crime is
a. forgery.
b. larceny.
c. robbery.
d. embezzlement.
Q:
Mary enters a gas station and points a gun at the clerk. She then forces the clerk to open the cash register and give her all the money. Mary can be charged with
a. robbery.
b. forgery.
c. larceny.
d. embezzlement.
Q:
Ludwig receives from Milo a marimba stolen from Nadine. To be criminally liable, Ludwig must know
a. Milo.
b. Nadine.
c. that the marimba is stolen and Ludwig must intend to keep it.
d. what a marimba is.
Q:
Mike is arrested at a warehouse in North Industrial Park and is charged with the crime of theft. Mike will be prosecuted by
a. the owner of the warehouse.
b. the owner of the property that Mike is charged with stealing.
c. a public official.
d. any third party unrelated to Mike, the property, or the crime.
Q:
A hacker is someone who uses one computer to break into another.
Q:
Identity theft occurs when a wrongdoer steals another's form of identification and uses it to access the victim's financial resources.
Q:
Any criminal activity occurring via a computer in the virtual community of the Internet is a cyber crime.
Q:
All persons who are arrested have the constitutional right to remain silent.
Q:
Individuals who are arrested must be informed of certain constitutional rights.
Q:
Under the exclusionary rule, all evidence must be included in a criminal prosecution.
Q:
The purpose of the exclusionary rule is to deter police from misconduct.
Q:
Under the exclusionary rule, illegally obtained evidence may not be included in any criminal prosecution.