McGraw-Hill OnlineMcGraw-Hill Higher EducationLearning Center
Student Center | Instructor Center | Information Center | Home
Glossary
Career Opportunities
PowerPoint Presentations
Spotlight on Terrorism
Chapter Overview
Chapter Outline
Chapter Objectives
Multiple Choice Quiz
Flashcards
Internet Exercises
Interactive Exercise
Feedback
Help Center


Swanson, Criminal Investigation 8/e
Criminal Investigation, 8/e
Charles R. Swanson, University of Georgia
Neil C. Chamelin, Assistant State Attorney, Second Judicial Circuit
Leonard Territo, University of South Florida- Tampa

Investigative Resources

Multiple Choice Quiz



1

The International Association of Law Enforcement Intelligence Analysts suggests that each police department should have at least ______ intelligence analyst(s) for every five investigators dealing with sophisticated specialized crimes.
A)Five
B)One
C)Two
D)Zero
2

The intelligence analysis process is driven by the needs of the _____________.
A)End-user
B)Community
C)Supervisor of an investigation unit working on a string of violent convenience store robberies.
D)NCIC
3

Which of the following is the first step in the intelligence analysis process?
A)Collection and management
B)Dissemination
C)Planning and direction
D)Processing
4

______________ is how raw information from all sources is converted into a form which can be used by analysts.
A)Analysis and production
B)Processing
C)Dissemination
D)Tactical
5

All of the following are typical agency-generated sources of information for intelligence analysts except…
A)Incident investigations
B)Field interview cards
C)Annual corporate filings
D)Traffic citations
6

_________________ are generally crimes committed across a large geographic area over an extended period of time.
A)Series
B)Patterns
C)Strategic crimes
D)Trends
7

Which of the following best illustrates the actions of a typical crimogen?
A)A geographic location where various crimes are committed on a regular basis
B)A group of kids walking through a neighborhood vandalizing cars
C)Operator of a convenience store who regularly reports gas drive-offs
D)As students return to campus in fall the theft of laptops from dormitories rises.
8

What type of crime analysis is most likely to solve a recent crime quickly?
A)Strategic
B)Administrative
C)Tactical
D)Series
9

_________________ may be utilized by crime analysts to disseminate general interest information.
A)E-mail intercepts
B)TEC
C)Telephone record analysis
D)Crime bulletins
10

All of the following are criticisms of criminal profiling except…
A)Profilers are inadequately trained.
B)Profilers rely on inadequate databases.
C)Racial profiling is problematic.
D)Profiling is sometimes successful.
11

Who is credited with creating a criminal profile leading to the arrest of a bombing suspect in 1957?
A)Dr. James Brussels
B)Howard Teten
C)Pat Mullany
D)David Canter.
12

Which of the following approaches to profiling has a strong crime scene focus?
A)Investigative psychology
B)Behavioral evidence analysis
C)Geographic profiling
D)Organized/disorganized offender model
13

All of the following are fundamental assumptions in the BEA except…
A)No offender acts without motivation.
B)Every single offense should be investigated as though it was caused by unique behaviors and motivations.
C)Different offenders exhibit the same or similar behavior for completely different reasons.
D)A criminal career assessment (whether the offender may have engaged in criminal activity before and what kind of activity it most likely was) must be completed for every offender.
14

___________ is the thorough study and analysis of the victim’s characteristics.
A)Victimology
B)Signature behavior
C)Equivocal forensic analysis
D)BEA
15

Which of the following is not an example of a hard offender characteristic?
A)DNA
B)Age
C)Fingerprints
D)Victim statement
16

________________ is an investigative strategy that uses the locations of a series of crimes to determine the most probable area of the offender’s residence.
A)GIS
B)Geoprofiling
C)Visits to each crime scene
D)Studying street maps
17

All of the following are classifications of predatory criminals used in geographic profiling except…
A)Trappers
B)Poachers
C)Trollers
D)Transient
18

A __________ searches for victims, often using his or her own residence as a home base.
A)Hunter
B)Poacher
C)Trapper
D)Raptor
19

All of the following are business indicators of financial difficulty except…
A)Decreasing revenue
B)Failure to record depreciation
C)Marital discord
D)Liens on assets
20

What agency is responsible for preventing and detecting money laundering by arms dealers, terrorists and others?
A)FinCen
B)NCAVC
C)CASMIRC
D)VICAP
21

Which of the following is not an accomplishment attributable to the information available in the NCIC?
A)Identification of fingerprints in the slaying of Dr. Martin Luther King
B)Identification of Oklahoma City bombing suspect
C)Identification of suspects in the slaying of Dr. Martin Luther King.
D)Identification of suspects in the slaying of President Kennedy.
22

All of the following are databases contained in NCIC 2000 except…
A)Stolen guns
B)Deported felons
C)Likely guilty criminal list
D)Mugshots
23

Which database may be used to search for DNA evidence?
A)CODIS
B)AFIS
C)LEO
D)NCIC
24

______________ allows a latent print from an unknown source to be checked rapidly against voluminous fingerprint files using computers.
A)CODIS
B)Library of Congress
C)AFIS
D)NCIC 2000
25

Which of the following is not a potential use of LEO?
A)Obtain mission critical information
B)Providing online educational programs
C)E-mail
D)Determine guilt of criminals