1/59
Chapters 9-14.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
(CH9) The geographic areas used by the Census Bureau for aggregating population data is called a _____.
a. Geographic Information System
b. Cross-Sectional Data
c. Block Group
D. Geospatial Data Set
c. Block Group
(CH9) Advantages of conducting secondary data analysis include which of the following?
a. reproducing empirical knowledge
b. Requiring more institutional resources than collecting primary data
c. Easy online Access
d. Allowing researchers to change or adapt their research questions to best fit the data.
c. Easy online Access
(CH9) Collecting data on individuals’ income, education, levels, employment status, and housing characteristics is the function of the _____.
a. American Community Survey
b. Current Population Survey
c. National Crime Victimization Survey
d. Police-Public Contact Survey
a. American Community Survey
(CH9) Data that includes longitude and latitude coordinates of a particular research area is called _____ data.
a. de-identified
b. cross-sectional
c. Public use
d. Geospatial
d. Geospatial
(CH9) Opting to leave a question blank on a survey or questionnaire is referred to as _____.
a. Not Applicable
b. Bias
c. Nonresponse
d. Sample Error
c. Nonresponse
(CH9) Secondary use data that is available for anyone to use is called ________ data.
a. Geospatial
b. De-Identified
c. Human Subject
d. Public Use
d. Public Use
(CH9) The Federal Bureau of Investigation manages which of the following collection programs?
a. Summary Reporting System
b. National Incident-Based Reporting System
c. National Crime Victimization Survey
d. Uniform Crime Reporting Program
d. Uniform Crime Reporting Program
(CH9) The Interuniversity Consortium for Political and Social Research’s main role is to archieve data from which of the following fields?
a. Political and social research.
b. Political and health and human development research.
c. Social research and natural science research.
d. Health and human development and natural science research.
a. political and social research.
(CH9) The National Archive of Criminal Justice Data is maintained by the _____.
a. National Institute of Justice
b. Statistical Analysis Center
c. Bureau of Justice Statistics
d. Interuniversity Consortium for Political and Social Research
d. Interuniversity Consortium for Political and Social Research
(CH9) The National Crime Victimization Survey, an example of secondary data, is known for which of the following?
a. It contains a small sample size.
b. It is considered to be high quality.
c. It is locally representative.
d. Is not easily accessible.
b. It is considered to be high quality.
(CH10) A method used to identify the area where a serial offender most likely lives is called _____.
a. Risk Terrain Modeling
b. Geographic Profiling
c. Predictive Policing
d. Hot Spot Mapping
b. Geographic Profiling
(CH10) A statistical method used for determining the 24-hr rhythm of crimes is called ______ analysis.
a. Aoristic
b. Tactical
c. Administrative
d. Strategic
a. Aoristic
(CH10) Academics can use applied crime analysis as research methodology.
a. True
b. False
a. True
(CH10) CompStat is used under which of the following crime analysis techniques?
a. Strategic
b. Educational
c. Administrative
d. Tactical
d. Tactical
(CH10) Crime ______ identifies spatiotemporal patterns in crime data.
a. Mapping
b. Analysis
c. Generators
d. Attractors
b. Analysis
(CH10) Data with geographic coordinates associated with corresponding physical locations are called _____ data.
a. Vector
b. Frequency
c. Spatial
d. Raster
c. Spatial
(CH10) Geographic areas with bar districts are examples of crime ______.
a. Stoppers
b. Enablers
c. Attractors
d. Generators
c. Attractors
(CH10) Locations like malls or sporting events that attract large numbers of both crime offenders and victims are called crime ______.
a. Stoppers
b. Enablers
c. Attractors
d. Generators
d. Generators
(CH10) Schematics that use shaded or patterned areas to represent the proportion of the variable being displayed are called _____.
a. Choropleth Maps
b. Scale bars
c. Geocoding
d. Recapture Rate Indexes
a. Choropleth Maps
(CH10) The work of crime mapping was introduced by a(n) ______.
a. Scientist and Criminologist
b. Mathematician and Lawyer
c. Criminologist and Lawyer
d. Anthropologist and Mathematician
b. Mathematician and Lawyer
(CH11) A _____ evaluation provides information about planning and improving the program.
a. Process
b. Formative
c. Summative
d. Needs Assessment
b. Formative
(CH11) A ______ evaluation provides informaiton about whether a program is reaching its objectives or not.
a. Process
b. Formative
c. Summative
d. Needs assessment
c. Summative
(CH11) A gap analysis is usually conducted as a part of a(n) ______ evaluation.
a. Process
b. Needs assessment
c. Summative
d. Outcome
b. Needs assessment
(CH11) Cost-effectiveness is a criterion associated with which of the following standards of an effective evaluation?
a. Feasibility
b. Utility
c. Accuracy
d. Propriety
a. Feasibility
(CH11) Evaluator credibility is a criterion associated with which iof the following standards of an effective evaluation?
a. Feasibility
b. Propriety
c. Utility
d. Accuracy
c. Utility
(CH11) Identifying the problem to be solved and then advocating for it to be considered by policy makers is referred to as ______.
a. Policy Formation
b. Policy Implementation
c. Agenda Setting
d. Evaluation
c. Agenda Setting
(CH11) Principles, rules, and laws that guide a government, organization, or people are called _____.
a. Interactions
b. Politics
c. Programs
d. Policies
d. Policies
(CH11) Which of the following standards of an effective evaluation addresses the need that evaluation research to be practical, reasonable, and affordable?
a. Accuracy
b. Utility
c. Propriety
d. Feasibility
d. Feasibility
(CH11) Which of the following standards of an effective evaluation requires evaluations to be ethical and legal?
a. Accuracy
b. Utility
c. Propriety
d. Feasibility
c. Propriety
(CH11) Which of the following types of evaluation is used to understand whether an existing program is changing over time?
a. Process Evaluation
b. Needs Assessment Evaluation
c. Summative Evaluation
d. Outcome Evaluation
a. Process Evaluation
(CH12) The primary purpose of researchers conducting research is to _____.
a. publish their work
b. Receive notoriety for their findings
c. Answer a research
d. teach students how to conduct research
c. answer a research question
(CH12) A bivariate analysis involve the analysis of how many variables?
a. 1
b. 2
c. 3
d. 4+
b. 2
(CH12) A table that displays the number of times a particular value or category is observed in the data is referred to as ________.
a. a descriptive analysis
b. a frequency distribution
c. measures of dispersion
d. measures of central tendency
b. a frequency distribution
(CH12) The following are measures of central tendency with the exception of ______.
a. Mean
b. Range
c. Median
d. mode
b. Range
(CH12) A group of descriptive statistics that numerically describe the "typical" case and include the mean, median, and mode are referred to as _______.
a. situational contexts
b. spatial descriptions
c. measures of dispersion
d. measures of central tendency
d. measures of central tendency
(CH12) Which of the following is the most commonly used measure of central tendency?
a. Median
b. Mean
c. Range
d. Mode
b. Mean
(CH12) Extreme values in a data distribution that are much lower or higher than the other distribution scores are called ________.
a. deductions
b. variances
c. ranges
d. outliers
d. outliers
(CH12) The value appearing most often in a data set is called the ______.
a. range
b. mode
c. median
d. mean
b. mode
(CH12) Measures of dispersion include the following with the exception of ______.
a. range
b. interquartile range
c. standard deviation
d. distribution
d. distribution
(CH12) The variance is the ______ of the standard deviation.
a. Product
b. Denominator
c. Square root
d. Divisor
e. Square
e. Square
(CH13) The principles, rules, and laws guiding a government, organization, or people are called _____.
a. Policies
b. Relationships
c. Regulations
d. Problems
a. Policies
(CH13) Which of the following terms establishes proper steps 10 take to accomplish a policy?
a. Policy
b. Procedures
c. Regulations
d. Guidelines
b. Procedures
(CH13) When policy briefs contain technical information, the inclusion of ______ explains that information.
a. abstracts
b. appendices
c. works cited
d. glossaries
b. appendices
(CH13) The following are competing sources of influence with the exception of _____.
a. media
fb. ear
c. budgets
d. ethics
d. ethics
(CH13) A media tactic in which a specific crime or violent event is repeatedly exposed is called _____.
a. networking
b. communicating
c. regulating
d. looping
d. looping
(CH13) A group of individuals working together to help influence public opinion and policy makers about specific criminal justice issues is called a(n) ______.
a. network
b. advocacy group
c. research team
d. student union
b. advocacy group
(CH13) A set of ideas shaping ones economic, political, or social view of how the world functions is called _____.
a. Ideology
b. Ethics
c. Religion
d. Opinions
a. Ideology
(CH13) Which of the following is considered to the first stage af the policy process?
a. implementation
b. adoption
c. agenda setting
d. evaluation
c. agenda setting
(CH13) A summative evaluation provides essential evaluative information in which of the following stages of policy process?
a. policy evaluation
b. policy formulation
c. policy adoption
d. policy implementation
a. policy evaluation
(CH13) Which of the following sections of a policy brief states the overall purpose and findings of the policy brief for policy makers?
a. Introduction
b. approach and results
c. Conclusion
d. executive summary
d. executive summary
(CH14) The three most important documents for job hunting include all of the following EXCEPT _____.
a. Cover Letter
b. Letters of recommendation
c. Resume
d. References
d. References
(CH14) A formal letter to a hiring official introducing yourself and describing your interest in working for a specific organization is called a _____.
a. Letter of recommendation
b. Cover letter
c. Resume
d. References
b. Cover letter
(CH14) A _____ is a document in which an applicant's former employer or professional acquaintances assesses the qualities, characteristics, and capabilities of the applicant.
a. reference page
b. cover letter
c. resume
d. letter of recommendation
d. letter of recommendation
(CH14) The following sources are appropriate for providing letters of recommendation with the exception of _____.
a. former or current employers
b. former or current professors,
c. leaders in the community
d. family and friends
d. family and friends
(CH14) Which of the following is considered a traditional interview?
a. one-on-one, face-to-face
b. Skype
c. telephone
d. group interview
a. one-on-one, face-to-face
(CH14) The following are common, legal interview questions with the exception of _____.
a. Why should we hire you?
b. What is your marital status?
c. Why are you leaving or have you left your job?
d. What is your greatest strength?
b. What is your marital status?
(CH14) Santos' professional interviewing tips included the following with the exception of _____.
a. Dress appropriately
b. look people in the eye
c. ask interviewers personal questions
d. bring a portfolio
c. ask interviewers personal questions
(CH14) Dodge's professional interviewing tips included all of the following except for _____.
a. remove any unusual jewelry
b. avoid using the word "like"
c. dress appropriately
d. ask for compensation and vacation information
d. ask for compensation and vacation information
(CH14) Both public and private sector jobs include positions that require research methods skills.
a. True
b. False
a. True
(CH14) A professional portfolio includes the following with the exception of _____.
a. Introductory statements
b. Reflections on documents
c. Glossaries
d. Statements of professional preparation
c. Glossaries