SlideShare a Scribd company logo
John Smith wrote fraudulent checks and made false statements when applying for credit. He is
most likely guilty of a white collar crime.
True
False
Solution
The answer is given below
True
White collar crime in general terms means fraudulent activities with regards to finance and
money laundering.
In the above case John Smith is involved with financial fradulent crime by writing false
statement when applying for credit.

More Related Content

More from kisgstin23

Below are common errors. State what was done incorrectly and correct.pdf
Below are common errors. State what was done incorrectly and correct.pdfBelow are common errors. State what was done incorrectly and correct.pdf
Below are common errors. State what was done incorrectly and correct.pdf
kisgstin23
 
A linked stack is implemented using a standard Node class as follows.pdf
A linked stack is implemented using a standard Node class as follows.pdfA linked stack is implemented using a standard Node class as follows.pdf
A linked stack is implemented using a standard Node class as follows.pdf
kisgstin23
 
A. Karl Marx B. Max Weber C. Erik Olin Wright D. Kingsley Davi.pdf
A. Karl Marx  B. Max Weber  C. Erik Olin Wright  D. Kingsley Davi.pdfA. Karl Marx  B. Max Weber  C. Erik Olin Wright  D. Kingsley Davi.pdf
A. Karl Marx B. Max Weber C. Erik Olin Wright D. Kingsley Davi.pdf
kisgstin23
 
3. Implement the UnsortedList class to store a list of numbers that .pdf
3. Implement the UnsortedList class to store a list of numbers that .pdf3. Implement the UnsortedList class to store a list of numbers that .pdf
3. Implement the UnsortedList class to store a list of numbers that .pdf
kisgstin23
 
4 (Opportunity Cost) You can either spend Spring Break working at hom.pdf
4 (Opportunity Cost) You can either spend Spring Break working at hom.pdf4 (Opportunity Cost) You can either spend Spring Break working at hom.pdf
4 (Opportunity Cost) You can either spend Spring Break working at hom.pdf
kisgstin23
 
You isolated an enveloped virus whose virions are able to hemadsorb .pdf
You isolated an enveloped virus whose virions are able to hemadsorb .pdfYou isolated an enveloped virus whose virions are able to hemadsorb .pdf
You isolated an enveloped virus whose virions are able to hemadsorb .pdf
kisgstin23
 
What professions were represented on the teamWhat role did each m.pdf
What professions were represented on the teamWhat role did each m.pdfWhat professions were represented on the teamWhat role did each m.pdf
What professions were represented on the teamWhat role did each m.pdf
kisgstin23
 
what is the threat and solution for when alice sends a password and .pdf
what is the threat and solution for when alice sends a password and .pdfwhat is the threat and solution for when alice sends a password and .pdf
what is the threat and solution for when alice sends a password and .pdf
kisgstin23
 
What is the mechanism of action of Staphylococcus alpha toxinSol.pdf
What is the mechanism of action of Staphylococcus alpha toxinSol.pdfWhat is the mechanism of action of Staphylococcus alpha toxinSol.pdf
What is the mechanism of action of Staphylococcus alpha toxinSol.pdf
kisgstin23
 
What is a charismatic leader What problems are charismatic leaders .pdf
What is a charismatic leader What problems are charismatic leaders .pdfWhat is a charismatic leader What problems are charismatic leaders .pdf
What is a charismatic leader What problems are charismatic leaders .pdf
kisgstin23
 
What is the difference between sequential file access and random fil.pdf
What is the difference between sequential file access and random fil.pdfWhat is the difference between sequential file access and random fil.pdf
What is the difference between sequential file access and random fil.pdf
kisgstin23
 
This theorem was conjectured by Legendre, Gauss, Dirichlet, Riemann, .pdf
This theorem was conjectured by Legendre, Gauss, Dirichlet, Riemann, .pdfThis theorem was conjectured by Legendre, Gauss, Dirichlet, Riemann, .pdf
This theorem was conjectured by Legendre, Gauss, Dirichlet, Riemann, .pdf
kisgstin23
 
This class will implement a hash table. The hash table will hold data.pdf
This class will implement a hash table. The hash table will hold data.pdfThis class will implement a hash table. The hash table will hold data.pdf
This class will implement a hash table. The hash table will hold data.pdf
kisgstin23
 
Topicswhat technology affect customers when purchasing a travel t.pdf
Topicswhat technology affect customers when purchasing a travel t.pdfTopicswhat technology affect customers when purchasing a travel t.pdf
Topicswhat technology affect customers when purchasing a travel t.pdf
kisgstin23
 
The Statement of Cash Flows for a proprietary fund must include whi.pdf
The Statement of Cash Flows for a proprietary fund must include whi.pdfThe Statement of Cash Flows for a proprietary fund must include whi.pdf
The Statement of Cash Flows for a proprietary fund must include whi.pdf
kisgstin23
 
The Miami Beach police department is sick and tired of the college a.pdf
The Miami Beach police department is sick and tired of the college a.pdfThe Miami Beach police department is sick and tired of the college a.pdf
The Miami Beach police department is sick and tired of the college a.pdf
kisgstin23
 
The magnitude, R, on the Richter scale of an earthquake of intensity .pdf
The magnitude, R, on the Richter scale of an earthquake of intensity .pdfThe magnitude, R, on the Richter scale of an earthquake of intensity .pdf
The magnitude, R, on the Richter scale of an earthquake of intensity .pdf
kisgstin23
 
The below test includes 10 questions, randomly selected from a large.pdf
The below test includes 10 questions, randomly selected from a large.pdfThe below test includes 10 questions, randomly selected from a large.pdf
The below test includes 10 questions, randomly selected from a large.pdf
kisgstin23
 
A quantity of 19.1 cm^3 of water at 12.4 degree C is placed in a Free.pdf
A quantity of 19.1 cm^3 of water at 12.4 degree C is placed in a Free.pdfA quantity of 19.1 cm^3 of water at 12.4 degree C is placed in a Free.pdf
A quantity of 19.1 cm^3 of water at 12.4 degree C is placed in a Free.pdf
kisgstin23
 
Six people apply for three identical jobs and all are qualified for .pdf
Six people apply for three identical jobs and all are qualified for .pdfSix people apply for three identical jobs and all are qualified for .pdf
Six people apply for three identical jobs and all are qualified for .pdf
kisgstin23
 

More from kisgstin23 (20)

Below are common errors. State what was done incorrectly and correct.pdf
Below are common errors. State what was done incorrectly and correct.pdfBelow are common errors. State what was done incorrectly and correct.pdf
Below are common errors. State what was done incorrectly and correct.pdf
 
A linked stack is implemented using a standard Node class as follows.pdf
A linked stack is implemented using a standard Node class as follows.pdfA linked stack is implemented using a standard Node class as follows.pdf
A linked stack is implemented using a standard Node class as follows.pdf
 
A. Karl Marx B. Max Weber C. Erik Olin Wright D. Kingsley Davi.pdf
A. Karl Marx  B. Max Weber  C. Erik Olin Wright  D. Kingsley Davi.pdfA. Karl Marx  B. Max Weber  C. Erik Olin Wright  D. Kingsley Davi.pdf
A. Karl Marx B. Max Weber C. Erik Olin Wright D. Kingsley Davi.pdf
 
3. Implement the UnsortedList class to store a list of numbers that .pdf
3. Implement the UnsortedList class to store a list of numbers that .pdf3. Implement the UnsortedList class to store a list of numbers that .pdf
3. Implement the UnsortedList class to store a list of numbers that .pdf
 
4 (Opportunity Cost) You can either spend Spring Break working at hom.pdf
4 (Opportunity Cost) You can either spend Spring Break working at hom.pdf4 (Opportunity Cost) You can either spend Spring Break working at hom.pdf
4 (Opportunity Cost) You can either spend Spring Break working at hom.pdf
 
You isolated an enveloped virus whose virions are able to hemadsorb .pdf
You isolated an enveloped virus whose virions are able to hemadsorb .pdfYou isolated an enveloped virus whose virions are able to hemadsorb .pdf
You isolated an enveloped virus whose virions are able to hemadsorb .pdf
 
What professions were represented on the teamWhat role did each m.pdf
What professions were represented on the teamWhat role did each m.pdfWhat professions were represented on the teamWhat role did each m.pdf
What professions were represented on the teamWhat role did each m.pdf
 
what is the threat and solution for when alice sends a password and .pdf
what is the threat and solution for when alice sends a password and .pdfwhat is the threat and solution for when alice sends a password and .pdf
what is the threat and solution for when alice sends a password and .pdf
 
What is the mechanism of action of Staphylococcus alpha toxinSol.pdf
What is the mechanism of action of Staphylococcus alpha toxinSol.pdfWhat is the mechanism of action of Staphylococcus alpha toxinSol.pdf
What is the mechanism of action of Staphylococcus alpha toxinSol.pdf
 
What is a charismatic leader What problems are charismatic leaders .pdf
What is a charismatic leader What problems are charismatic leaders .pdfWhat is a charismatic leader What problems are charismatic leaders .pdf
What is a charismatic leader What problems are charismatic leaders .pdf
 
What is the difference between sequential file access and random fil.pdf
What is the difference between sequential file access and random fil.pdfWhat is the difference between sequential file access and random fil.pdf
What is the difference between sequential file access and random fil.pdf
 
This theorem was conjectured by Legendre, Gauss, Dirichlet, Riemann, .pdf
This theorem was conjectured by Legendre, Gauss, Dirichlet, Riemann, .pdfThis theorem was conjectured by Legendre, Gauss, Dirichlet, Riemann, .pdf
This theorem was conjectured by Legendre, Gauss, Dirichlet, Riemann, .pdf
 
This class will implement a hash table. The hash table will hold data.pdf
This class will implement a hash table. The hash table will hold data.pdfThis class will implement a hash table. The hash table will hold data.pdf
This class will implement a hash table. The hash table will hold data.pdf
 
Topicswhat technology affect customers when purchasing a travel t.pdf
Topicswhat technology affect customers when purchasing a travel t.pdfTopicswhat technology affect customers when purchasing a travel t.pdf
Topicswhat technology affect customers when purchasing a travel t.pdf
 
The Statement of Cash Flows for a proprietary fund must include whi.pdf
The Statement of Cash Flows for a proprietary fund must include whi.pdfThe Statement of Cash Flows for a proprietary fund must include whi.pdf
The Statement of Cash Flows for a proprietary fund must include whi.pdf
 
The Miami Beach police department is sick and tired of the college a.pdf
The Miami Beach police department is sick and tired of the college a.pdfThe Miami Beach police department is sick and tired of the college a.pdf
The Miami Beach police department is sick and tired of the college a.pdf
 
The magnitude, R, on the Richter scale of an earthquake of intensity .pdf
The magnitude, R, on the Richter scale of an earthquake of intensity .pdfThe magnitude, R, on the Richter scale of an earthquake of intensity .pdf
The magnitude, R, on the Richter scale of an earthquake of intensity .pdf
 
The below test includes 10 questions, randomly selected from a large.pdf
The below test includes 10 questions, randomly selected from a large.pdfThe below test includes 10 questions, randomly selected from a large.pdf
The below test includes 10 questions, randomly selected from a large.pdf
 
A quantity of 19.1 cm^3 of water at 12.4 degree C is placed in a Free.pdf
A quantity of 19.1 cm^3 of water at 12.4 degree C is placed in a Free.pdfA quantity of 19.1 cm^3 of water at 12.4 degree C is placed in a Free.pdf
A quantity of 19.1 cm^3 of water at 12.4 degree C is placed in a Free.pdf
 
Six people apply for three identical jobs and all are qualified for .pdf
Six people apply for three identical jobs and all are qualified for .pdfSix people apply for three identical jobs and all are qualified for .pdf
Six people apply for three identical jobs and all are qualified for .pdf
 

Recently uploaded

Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 

Recently uploaded (20)

Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 

John Smith wrote fraudulent checks and made false statements when ap.pdf

  • 1. John Smith wrote fraudulent checks and made false statements when applying for credit. He is most likely guilty of a white collar crime. True False Solution The answer is given below True White collar crime in general terms means fraudulent activities with regards to finance and money laundering. In the above case John Smith is involved with financial fradulent crime by writing false statement when applying for credit.