Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
59 Cards in this Set
- Front
- Back
The entire width between the boundary lines of everywhere your place |
Highway |
|
The portion of a highway |
Roadway |
|
Portion of the highway for emergency |
Shoulder |
|
Unstable add situation on the traffic way |
Crash |
|
A __________ crash Resulting in injury or death to any person or property damage excess of 500$ |
Reportable crash |
|
A dividing section in the center of the roadway to separate travel in opposite directions |
Median |
|
Area of land where to roadway separate |
Gore |
|
Only colored ink allowed on the crash report |
Black |
|
Type of time use in a crash report |
Military |
|
If a child is under the age of one what age should be listed on the report |
01 |
|
What are the three types of burglars, (JUS) |
Juvenile, unskilled, skilled |
|
Characteristics of a juvenile burglar: They enter through ______ and _____ that have been left _____ or can be easily forced open
______ Is come of this type burglar |
Windows & doors, unlocked
Vandalism |
|
Characteristics of an unskilled burglar:
Petty offenders or opportunists (looking for ______ ______ in a house)
Attempt any crime that seem _______ & _______ |
Open windows
Safe and easy |
|
Characteristics of a skilled burglar:
They have ______ ______ and tools |
Special skills |
|
The five methods which burglars operate (HHTSS) |
Housebreaker Hideout Tunnel Safe cracker Smash and grab |
|
Responding to a prowler call C U C C C C |
Coordination of responding units Quiet or black out approach Containment of area Contact complainant Conduct controlled search Check for clues |
|
Police are considered what of the police department? |
Backbone |
|
Functions of patrol: Deter _____ Enhance _____ of public _____ Officers available 24/7/_____ |
Crime Feelings & safety 365 |
|
Evenly distribute the patrol workload is the use of what kind of assignment? |
Proportional |
|
What enforcement theory allows the department to maximize personnel? |
Selective |
|
T/F the three things at officer should know when notified of a crash are Exact location, time crash occurred, in the seriousness of the car crash |
True |
|
T/F when in route to the crash the officer should be aware of damage vehicles, roadway conditions, weather conditions, and other conditions that have contributed |
True |
|
T/F The officer should record the final resting point of the vehicles and body involved along with tiremarks of the vehicle |
True |
|
On the initial diagram the officer should include:
True ______ Final ______ ______ Relevant ______ Location of _______ _______ configuration |
True north Resting points Evidence Debris Roadway |
|
The Plainview doctrine:
Items in sight of an officer who is _____ in view Items are immediately ________ to subject a seizure |
Legally Recognizable |
|
Requirements for Plainview doctrine:
Awareness solely by _____ In Physical position ______ _______ Apparent that it is a seIzable item |
Sight Legally Immediately |
|
Case: H vs. C Fourth amendment does not prohibit Wharton a seizure even though evidence was not inadvertent |
Horton vs. California |
|
Open _____ are not protected by 4th amendment, so they can be taken without a _____ or ______ ______ |
Fields Warrant Probably cause |
|
The area extended from a man’s home and privacy of life |
Curtilage |
|
Test to determine curtilage: P_____ of area E_____ surrounding Home N_____ and use of area C_____ steps for privacy |
Proximity Enclosure Nature Conceal |
|
Open fields doctrine: the seizable items are not __ __ _____.
Open view doctrine: seizable items are in a structure, however require _____, ______, or ______ circumstances |
In a structure
Consent, search warrant, exigentcase |
|
Case: O vs. U An area with the no trust passing sign locked gate and located more than a mile from the owner’s house has no reasonable expectation of privacy |
Oliver vs. US |
|
Abandonment is giving up a _____ or _____. abandonment implies giving up _______, or ______ |
Thing or item Possession or ownership |
|
Two basic guidelines to determine abandonment:
Where property was ____ _____ to abandon property |
Left Intent |
|
Electronic surveillance: New concept - wiretaps violates 4th amendment
K vs. U.S. |
Katz vs. United States |
|
Intentional communication that circumstance dangerous to life causing members of the general public to be insisting to fear for their safety |
Terrorizing |
|
Intentional taking enticing or the going away for a lawful purpose of any child not his own in under the age of 14 years |
Simple kidnapping |
|
Intentional confinement or detention of another |
False imprisonment |
|
Intentionally damaging or setting fire to anything where it is foreseeable human life might be in danger |
Aggravated arson |
|
Intentionally damaging or setting fire without consent; offender is engaged in the perpetration of another felony in the fender does not have the intent to start a fire |
Simple arson |
|
Intentional entry by a person without authorization into any dwelling or structure belong to another used in whole or in part such as a business |
Looting |
|
Taking anything of value in immediate control of another by use of force or intimidation well armed with a dangerous weapon |
Armed robbery |
|
Taking anything of value in the immediate control of another when the offender leads the victim to REASONABLY believe he is armed with the dentist weapon |
First degree robbery |
|
Taking anything of value in immediate control of another And intentionally inflicting serious bodily injury |
Second degree robbery |
|
Taking anything of value in immediate control of another but NOT armed with a dangerous weapon |
Simple robbery |
|
Theft of anything of value contained within a purse or wallet at the time of the theft |
Purse snatching |
|
Intentional and repeated following or harassing of another person |
Stalking |
|
Taking anything of value which belongs to another without consent or intent to deprive the other permanently |
Theft |
|
A person who is 17 years of age or older than sexual intercourse with concern with the person who is 13 years of age or older but less than 17 years of age and the victim is not the spouse of the offender in the age between victim and the offender is 4 years or greater |
Felony carnal knowledge of a juvenile |
|
Commission by anyone over the age of 17 have any lewd or lascivious act upon the person or any child under the age of 17 |
Molestation of a juvenile |
|
A person 17 years of age or older knowingly contacts to the use of electronic textbook communication with the person who is not yet attained the age of 17 in the age difference is greater than two years |
Computer aided solicitation |
|
Electronic mail or electronic communication threatening to inflict bodily harm to any person or to such person’s child sibling spouse or dependent |
Cyberstalking |
|
Electronic textual visual written or oral communication with malicious and Will for intent to coerce abuse or tournament anyone under the age of 18 |
Cyber bullying |
|
Active anal oral or vaginal sexual intercourse with a male or female person committed without the person’s lawful consent |
Rape |
|
Committed upon a Person 65 years of age or older or under the age of 13 |
First degree rape |
|
Committed without lawful consent or the victim is in capable of resisting or understanding the nature by reason of support or a normal condition of the mind |
Second degree rape |
|
Committed without lawful consent or when the victim is temporarily or permanently in capable of understanding the nature of the act or when the female victim submit under the belief that the person committing the act is her husband in such believe is intentional |
Third degree rape |
|
Forcibly seizing and caring any person from one place to another or enticing or persuading of any person to go from one place to another |
Aggravated kidnapping |
|
Victim is used as a shield or hostage used to facilitate the commission of a felony he will the flight after an attempt to commit or commission of a felony |
Second degree kidnapping |