SlideShare a Scribd company logo
Solution
1 ) The purpose of criminal law is to help maintain social order and stability . The purpose of
criminal law is to establish a system of prohibitions , penalties and correctional measures to deal
with conduct that unjustifiably or inexcusably causes or threatens harm to those individual or
public interests for which state protection is appropriate .
2) Classification according to the nature of crimes
Mala in se : These are acts that are immoral or wrong in themselves or acts that are naturally evil
. Ex : Murder, rape , arson , burglary etc
Mala prohibita : These crimes are not naturally evil , but are prohibited by statute because they
infringe upon the right of the others . This type of act is not wrong in some societies but wrong in
other societies . Example : Traffic offenses , gambling etc .
Classification according to degree :
a) Felonies : Crimes that are punishable by death or imprisonment in a state prision or
penitentiary are felonies .
b) Misdemeanors : Crimes or offenses not amounting to felonies are Misdemeanors . They are
offenses for which the punishment is other than death or imprisonment in a state prison , or that
have not been designated felonies by statute.
c) Treason : Treason is the only crime described in the constitution and it is given a higher
classification than felony .
3) Example of white-collar crimes are bank fraud, blackmail , bribery , computer fraud,
counterfeiting , credit card fraud , currency schemes, embezzelement , environmental schemes .
The punishment for these crimes should be recovery of all the money made by white collar
crimes and to put the white collar criminals in prision .

More Related Content

Similar to Solution1 ) The purpose of criminal law is to help maintain social.pdf

Criminologypowerpointone 2008-090519124504-phpapp01
Criminologypowerpointone 2008-090519124504-phpapp01Criminologypowerpointone 2008-090519124504-phpapp01
Criminologypowerpointone 2008-090519124504-phpapp01Drahcir Codnubac
 
Scly 4 globalisation
Scly 4 globalisationScly 4 globalisation
Scly 4 globalisation
Sandy Thedab
 
Criminology Powerpoint One 2008
Criminology Powerpoint One 2008Criminology Powerpoint One 2008
Criminology Powerpoint One 2008
University of Dayton
 
Lecture-1, Crime and Criminal, types of crime, classification of crime
Lecture-1, Crime and Criminal, types of crime, classification of crimeLecture-1, Crime and Criminal, types of crime, classification of crime
Lecture-1, Crime and Criminal, types of crime, classification of crime
Manzoor86
 
Criminology powerpoint one
Criminology powerpoint oneCriminology powerpoint one
Criminology powerpoint one
University of Dayton
 
CHAPTER 7 Criminal Law and CybercrimeNew York Police Departmen.docx
CHAPTER 7 Criminal Law and CybercrimeNew York Police Departmen.docxCHAPTER 7 Criminal Law and CybercrimeNew York Police Departmen.docx
CHAPTER 7 Criminal Law and CybercrimeNew York Police Departmen.docx
bissacr
 
Ch. 1 Criminal Justice
Ch. 1 Criminal JusticeCh. 1 Criminal Justice
Ch. 1 Criminal Justice
Katrina Homer
 
Unit 5 criminal law
Unit 5 criminal lawUnit 5 criminal law
Unit 5 criminal law
J-Ahmedi
 
Globalisation, Green Crime, Human Rights, State Crime
Globalisation, Green Crime, Human Rights, State CrimeGlobalisation, Green Crime, Human Rights, State Crime
Globalisation, Green Crime, Human Rights, State Crime
Beth Lee
 
Criminology.pdf
Criminology.pdfCriminology.pdf
Criminology.pdf
MahiMozumder
 
CRIMINAL LAW THEORY AND DOCTRINE
CRIMINAL LAW THEORY AND DOCTRINECRIMINAL LAW THEORY AND DOCTRINE
CRIMINAL LAW THEORY AND DOCTRINE
PALAWAN STATE UNIVERSITY
 
International Crimes
International Crimes International Crimes
Crime
CrimeCrime
SocioEconomic Offenses
SocioEconomic OffensesSocioEconomic Offenses
SocioEconomic Offenses
Kathmandu University School of Law
 
Laws of crime
Laws of crimeLaws of crime
Crime PREVENTION
Crime PREVENTIONCrime PREVENTION
Crime PREVENTION
Adamas University
 
I need answers to both discussions questions as well as replies to f.docx
I need answers to both discussions questions as well as replies to f.docxI need answers to both discussions questions as well as replies to f.docx
I need answers to both discussions questions as well as replies to f.docx
anthonybrooks84958
 
Theoretical Perspective of Criminology.pptx
Theoretical Perspective of Criminology.pptxTheoretical Perspective of Criminology.pptx
Theoretical Perspective of Criminology.pptx
RohitkumarSharma69
 

Similar to Solution1 ) The purpose of criminal law is to help maintain social.pdf (20)

Criminologypowerpointone 2008-090519124504-phpapp01
Criminologypowerpointone 2008-090519124504-phpapp01Criminologypowerpointone 2008-090519124504-phpapp01
Criminologypowerpointone 2008-090519124504-phpapp01
 
Scly 4 globalisation
Scly 4 globalisationScly 4 globalisation
Scly 4 globalisation
 
Criminology Powerpoint One 2008
Criminology Powerpoint One 2008Criminology Powerpoint One 2008
Criminology Powerpoint One 2008
 
Offence: concept and composition
Offence: concept and compositionOffence: concept and composition
Offence: concept and composition
 
Lecture-1, Crime and Criminal, types of crime, classification of crime
Lecture-1, Crime and Criminal, types of crime, classification of crimeLecture-1, Crime and Criminal, types of crime, classification of crime
Lecture-1, Crime and Criminal, types of crime, classification of crime
 
Criminology powerpoint one
Criminology powerpoint oneCriminology powerpoint one
Criminology powerpoint one
 
CHAPTER 7 Criminal Law and CybercrimeNew York Police Departmen.docx
CHAPTER 7 Criminal Law and CybercrimeNew York Police Departmen.docxCHAPTER 7 Criminal Law and CybercrimeNew York Police Departmen.docx
CHAPTER 7 Criminal Law and CybercrimeNew York Police Departmen.docx
 
Ch. 1 Criminal Justice
Ch. 1 Criminal JusticeCh. 1 Criminal Justice
Ch. 1 Criminal Justice
 
Unit 5 criminal law
Unit 5 criminal lawUnit 5 criminal law
Unit 5 criminal law
 
Globalisation, Green Crime, Human Rights, State Crime
Globalisation, Green Crime, Human Rights, State CrimeGlobalisation, Green Crime, Human Rights, State Crime
Globalisation, Green Crime, Human Rights, State Crime
 
Criminology.pdf
Criminology.pdfCriminology.pdf
Criminology.pdf
 
CRIMINAL LAW THEORY AND DOCTRINE
CRIMINAL LAW THEORY AND DOCTRINECRIMINAL LAW THEORY AND DOCTRINE
CRIMINAL LAW THEORY AND DOCTRINE
 
International Crimes
International Crimes International Crimes
International Crimes
 
Crime
CrimeCrime
Crime
 
SocioEconomic Offenses
SocioEconomic OffensesSocioEconomic Offenses
SocioEconomic Offenses
 
Crime
CrimeCrime
Crime
 
Laws of crime
Laws of crimeLaws of crime
Laws of crime
 
Crime PREVENTION
Crime PREVENTIONCrime PREVENTION
Crime PREVENTION
 
I need answers to both discussions questions as well as replies to f.docx
I need answers to both discussions questions as well as replies to f.docxI need answers to both discussions questions as well as replies to f.docx
I need answers to both discussions questions as well as replies to f.docx
 
Theoretical Perspective of Criminology.pptx
Theoretical Perspective of Criminology.pptxTheoretical Perspective of Criminology.pptx
Theoretical Perspective of Criminology.pptx
 

More from ANSAPPARELS

yes, roasting essentially means heating the ore, .pdf
                     yes, roasting essentially means heating the ore, .pdf                     yes, roasting essentially means heating the ore, .pdf
yes, roasting essentially means heating the ore, .pdf
ANSAPPARELS
 
There is no figure,Please upload it .pdf
                     There is no figure,Please upload it              .pdf                     There is no figure,Please upload it              .pdf
There is no figure,Please upload it .pdf
ANSAPPARELS
 
The adition is slow because the benzyne formed is.pdf
                     The adition is slow because the benzyne formed is.pdf                     The adition is slow because the benzyne formed is.pdf
The adition is slow because the benzyne formed is.pdf
ANSAPPARELS
 
only 1(I) .pdf
                     only 1(I)                                      .pdf                     only 1(I)                                      .pdf
only 1(I) .pdf
ANSAPPARELS
 
Yes, I do agree, that some eukaryotic cells survive only on the reso.pdf
Yes, I do agree, that some eukaryotic cells survive only on the reso.pdfYes, I do agree, that some eukaryotic cells survive only on the reso.pdf
Yes, I do agree, that some eukaryotic cells survive only on the reso.pdf
ANSAPPARELS
 
What are the key components of an internal audit What are the impli.pdf
What are the key components of an internal audit What are the impli.pdfWhat are the key components of an internal audit What are the impli.pdf
What are the key components of an internal audit What are the impli.pdf
ANSAPPARELS
 
IV I II III Solution .pdf
                     IV  I  II  III   Solution                 .pdf                     IV  I  II  III   Solution                 .pdf
IV I II III Solution .pdf
ANSAPPARELS
 
To differentiate between the mutated and normal genes, the DNA of th.pdf
To differentiate between the mutated and normal genes, the DNA of th.pdfTo differentiate between the mutated and normal genes, the DNA of th.pdf
To differentiate between the mutated and normal genes, the DNA of th.pdf
ANSAPPARELS
 
The most critical shortcomings of these assumptions are1.The flow .pdf
The most critical shortcomings of these assumptions are1.The flow .pdfThe most critical shortcomings of these assumptions are1.The flow .pdf
The most critical shortcomings of these assumptions are1.The flow .pdf
ANSAPPARELS
 
The following statements are true1. The tendency of water to mini.pdf
The following statements are true1. The tendency of water to mini.pdfThe following statements are true1. The tendency of water to mini.pdf
The following statements are true1. The tendency of water to mini.pdf
ANSAPPARELS
 
The data is Quantitative as there are numbers , and its an observati.pdf
The data is Quantitative as there are numbers , and its an observati.pdfThe data is Quantitative as there are numbers , and its an observati.pdf
The data is Quantitative as there are numbers , and its an observati.pdf
ANSAPPARELS
 
Thank you everyone! The answer was O(n!)SolutionThank you ever.pdf
Thank you everyone! The answer was O(n!)SolutionThank you ever.pdfThank you everyone! The answer was O(n!)SolutionThank you ever.pdf
Thank you everyone! The answer was O(n!)SolutionThank you ever.pdf
ANSAPPARELS
 
question not visibleSolutionquestion not visible.pdf
question not visibleSolutionquestion not visible.pdfquestion not visibleSolutionquestion not visible.pdf
question not visibleSolutionquestion not visible.pdf
ANSAPPARELS
 
num.txt(Save this file under D Drive.Then the path of the file is D.pdf
num.txt(Save this file under D Drive.Then the path of the file is D.pdfnum.txt(Save this file under D Drive.Then the path of the file is D.pdf
num.txt(Save this file under D Drive.Then the path of the file is D.pdf
ANSAPPARELS
 
n = 7 which is odd so median is the middle value of te data after ar.pdf
n = 7 which is odd so median is the middle value of te data after ar.pdfn = 7 which is odd so median is the middle value of te data after ar.pdf
n = 7 which is odd so median is the middle value of te data after ar.pdf
ANSAPPARELS
 
Molybdenum is the elementSolutionMolybdenum is the element.pdf
Molybdenum is the elementSolutionMolybdenum is the element.pdfMolybdenum is the elementSolutionMolybdenum is the element.pdf
Molybdenum is the elementSolutionMolybdenum is the element.pdf
ANSAPPARELS
 
Mean absolute deviationSolutionMean absolute deviation.pdf
Mean absolute deviationSolutionMean absolute deviation.pdfMean absolute deviationSolutionMean absolute deviation.pdf
Mean absolute deviationSolutionMean absolute deviation.pdf
ANSAPPARELS
 
elements involved are C and N .pdf
                     elements involved are C and N                    .pdf                     elements involved are C and N                    .pdf
elements involved are C and N .pdf
ANSAPPARELS
 
Information security means protecting information (data) and informa.pdf
Information security means protecting information (data) and informa.pdfInformation security means protecting information (data) and informa.pdf
Information security means protecting information (data) and informa.pdf
ANSAPPARELS
 
Given that T is unitaryT = 1I-ieH =1det (-T) = (-1)ndet T.pdf
Given that T is unitaryT = 1I-ieH =1det (-T) = (-1)ndet T.pdfGiven that T is unitaryT = 1I-ieH =1det (-T) = (-1)ndet T.pdf
Given that T is unitaryT = 1I-ieH =1det (-T) = (-1)ndet T.pdf
ANSAPPARELS
 

More from ANSAPPARELS (20)

yes, roasting essentially means heating the ore, .pdf
                     yes, roasting essentially means heating the ore, .pdf                     yes, roasting essentially means heating the ore, .pdf
yes, roasting essentially means heating the ore, .pdf
 
There is no figure,Please upload it .pdf
                     There is no figure,Please upload it              .pdf                     There is no figure,Please upload it              .pdf
There is no figure,Please upload it .pdf
 
The adition is slow because the benzyne formed is.pdf
                     The adition is slow because the benzyne formed is.pdf                     The adition is slow because the benzyne formed is.pdf
The adition is slow because the benzyne formed is.pdf
 
only 1(I) .pdf
                     only 1(I)                                      .pdf                     only 1(I)                                      .pdf
only 1(I) .pdf
 
Yes, I do agree, that some eukaryotic cells survive only on the reso.pdf
Yes, I do agree, that some eukaryotic cells survive only on the reso.pdfYes, I do agree, that some eukaryotic cells survive only on the reso.pdf
Yes, I do agree, that some eukaryotic cells survive only on the reso.pdf
 
What are the key components of an internal audit What are the impli.pdf
What are the key components of an internal audit What are the impli.pdfWhat are the key components of an internal audit What are the impli.pdf
What are the key components of an internal audit What are the impli.pdf
 
IV I II III Solution .pdf
                     IV  I  II  III   Solution                 .pdf                     IV  I  II  III   Solution                 .pdf
IV I II III Solution .pdf
 
To differentiate between the mutated and normal genes, the DNA of th.pdf
To differentiate between the mutated and normal genes, the DNA of th.pdfTo differentiate between the mutated and normal genes, the DNA of th.pdf
To differentiate between the mutated and normal genes, the DNA of th.pdf
 
The most critical shortcomings of these assumptions are1.The flow .pdf
The most critical shortcomings of these assumptions are1.The flow .pdfThe most critical shortcomings of these assumptions are1.The flow .pdf
The most critical shortcomings of these assumptions are1.The flow .pdf
 
The following statements are true1. The tendency of water to mini.pdf
The following statements are true1. The tendency of water to mini.pdfThe following statements are true1. The tendency of water to mini.pdf
The following statements are true1. The tendency of water to mini.pdf
 
The data is Quantitative as there are numbers , and its an observati.pdf
The data is Quantitative as there are numbers , and its an observati.pdfThe data is Quantitative as there are numbers , and its an observati.pdf
The data is Quantitative as there are numbers , and its an observati.pdf
 
Thank you everyone! The answer was O(n!)SolutionThank you ever.pdf
Thank you everyone! The answer was O(n!)SolutionThank you ever.pdfThank you everyone! The answer was O(n!)SolutionThank you ever.pdf
Thank you everyone! The answer was O(n!)SolutionThank you ever.pdf
 
question not visibleSolutionquestion not visible.pdf
question not visibleSolutionquestion not visible.pdfquestion not visibleSolutionquestion not visible.pdf
question not visibleSolutionquestion not visible.pdf
 
num.txt(Save this file under D Drive.Then the path of the file is D.pdf
num.txt(Save this file under D Drive.Then the path of the file is D.pdfnum.txt(Save this file under D Drive.Then the path of the file is D.pdf
num.txt(Save this file under D Drive.Then the path of the file is D.pdf
 
n = 7 which is odd so median is the middle value of te data after ar.pdf
n = 7 which is odd so median is the middle value of te data after ar.pdfn = 7 which is odd so median is the middle value of te data after ar.pdf
n = 7 which is odd so median is the middle value of te data after ar.pdf
 
Molybdenum is the elementSolutionMolybdenum is the element.pdf
Molybdenum is the elementSolutionMolybdenum is the element.pdfMolybdenum is the elementSolutionMolybdenum is the element.pdf
Molybdenum is the elementSolutionMolybdenum is the element.pdf
 
Mean absolute deviationSolutionMean absolute deviation.pdf
Mean absolute deviationSolutionMean absolute deviation.pdfMean absolute deviationSolutionMean absolute deviation.pdf
Mean absolute deviationSolutionMean absolute deviation.pdf
 
elements involved are C and N .pdf
                     elements involved are C and N                    .pdf                     elements involved are C and N                    .pdf
elements involved are C and N .pdf
 
Information security means protecting information (data) and informa.pdf
Information security means protecting information (data) and informa.pdfInformation security means protecting information (data) and informa.pdf
Information security means protecting information (data) and informa.pdf
 
Given that T is unitaryT = 1I-ieH =1det (-T) = (-1)ndet T.pdf
Given that T is unitaryT = 1I-ieH =1det (-T) = (-1)ndet T.pdfGiven that T is unitaryT = 1I-ieH =1det (-T) = (-1)ndet T.pdf
Given that T is unitaryT = 1I-ieH =1det (-T) = (-1)ndet T.pdf
 

Recently uploaded

The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 

Recently uploaded (20)

The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 

Solution1 ) The purpose of criminal law is to help maintain social.pdf

  • 1. Solution 1 ) The purpose of criminal law is to help maintain social order and stability . The purpose of criminal law is to establish a system of prohibitions , penalties and correctional measures to deal with conduct that unjustifiably or inexcusably causes or threatens harm to those individual or public interests for which state protection is appropriate . 2) Classification according to the nature of crimes Mala in se : These are acts that are immoral or wrong in themselves or acts that are naturally evil . Ex : Murder, rape , arson , burglary etc Mala prohibita : These crimes are not naturally evil , but are prohibited by statute because they infringe upon the right of the others . This type of act is not wrong in some societies but wrong in other societies . Example : Traffic offenses , gambling etc . Classification according to degree : a) Felonies : Crimes that are punishable by death or imprisonment in a state prision or penitentiary are felonies . b) Misdemeanors : Crimes or offenses not amounting to felonies are Misdemeanors . They are offenses for which the punishment is other than death or imprisonment in a state prison , or that have not been designated felonies by statute. c) Treason : Treason is the only crime described in the constitution and it is given a higher classification than felony . 3) Example of white-collar crimes are bank fraud, blackmail , bribery , computer fraud, counterfeiting , credit card fraud , currency schemes, embezzelement , environmental schemes . The punishment for these crimes should be recovery of all the money made by white collar crimes and to put the white collar criminals in prision .