Exam Prep Gis And Crime Mapping Ch.10 1st Edition - Research Methods in Criminal Justice 1st Edition Test Bank by Callie Marie Rennison. DOCX document preview.
Chapter 10: GIS and Crime Mapping
Test Bank
Multiple Choice
1. The work of crime mapping was introduced by a(n) ______.
a. scientist and criminologist
b. mathematician and lawyer
c. criminologist and lawyer
d. anthropologist and mathematician
2. Schematics that use shaded or patterned areas to represent the proportion of the variable being displayed are called ______.
a. choropleth maps
b. scale bars
c. geocoding
d. recapture rate indexes
3. Which of the following type of data tracks how often something has happened?
a. raster data
b. frequency data
c. vector data
d. geospatial data
4. ______ collects, stores, manipulates, analyses, manages, and presents data that is geo-spatially referenced.
a. Geographic Information System
b. Recapture Rate Index
c. Risk Terrain Modeling
d. Near Repeat Calculator
5. The following are all interrelated parts of geographic information systems with the exception of ______.
a. data
b. technology
c. funding
d. application
6. Data with geographic coordinates associated with corresponding physical locations is called ______.
a. vector data
b. frequency data
c. spatial data
d. raster data
7. Data representing characteristics on a map of the real world is called ______.
a. frequency data
b. raster data
c. spectral data
d. vector data
8. Which of the following are types of spatial data used in geographic information systems?
a. frequency data and cross-sectional data
b. raster data and vector data
c. spectral data and longitudinal data
d. vector data and cross-sectional data
9. Points, lines, and polygons are types of ______ data that are used in geographic information systems on maps.
a. raster data
b. frequency data
c. vector data
d. spectral data
10. Geographic data that is a matrix of cells organized into rows and columns, similar to a grid, is called ______.
a. vector data
b. frequency data
c. spectral data
d. raster data
11. Satellite images and aerial photographs are examples of which of the following type of data?
a. vector data
b. frequency data
c. spectral data
d. raster data
12. Physical equipment making up a geographic information system, like servers for example, is known as ______.
a. applications
b. software
c. generators
d. hardware
13. Invisible technology, such as programming used in crime analysis is called ______.
a. generators
b. software
c. applications
d. hardware
14. Local and municipal governments are examples of which of the following perspectives of application?
a. area of application
b. nature of application
c. approach of application
d. design of application
15. Using geographic information systems to support public safety and law enforcement is an example of which of the following perspectives of application?
a. area of application
b. nature of application
c. approach of application
d. design of application
16. A person or organization requesting support from geographic information system specialists is called a(n) ______.
a. specialist
b. user
c. consumer
d. expert
17. ______ identifies spatiotemporal patterns in crime data.
a. Crime mapping
b. Crime analysis
c. Crime generators
d. Crime attractors
18. Administrative crime analysis includes all of the following practices with the exception of ______.
a. districting analysis
b. tactical analysis
c. cost-benefit analysis
d. patrol staffing analysis
19. Crime analysis includes all of the following approaches with the exception of ______.
a. strategic
b. tactical
c. administrative
d. educational
20. Which of the following type of crime analysis has the goal of quickly clearing criminal cases by collecting data, identifying patterns, and developing possible leads?
a. strategic
b. tactical
c. administrative
d. educational
21. Tactical crime analysis falls under which umbrella of analysis?
a. cost-benefit analysis
b. re-districting analysis
c. point-pattern analysis
d. patrol staffing analysis
22. CompStat is used under which of the following crime analysis techniques?
a. strategic
b. educational
c. administrative
d. tactical
23. Tactical crime analysis techniques include the following with the exception of ______.
a. repeat incident analysis
b. crime pattern analysis
c. point-pattern analysis
d. districting analysis
24. ______ works to develop solutions to chronic crime-related problems.
a. Tactical crime analysis
b. Strategic crime analysis
c. Administrative crime analysis
d. Educational crime analysis
25. Identifying similar types of crimes clumped together in space or time is called ______.
a. cluster analysis
b. trend analysis
c. hot spot analysis
d. problem analysis
26. Strategic crime analysis techniques include the following with the exception of ______.
a. cluster analysis
b. problem analysis
c. hot spot analysis
d. repeat incident analysis
27. Which one of the following researchers tested the efficacy of an offender-focused intervention strategy using crime analysis techniques?
a. Dodge
b. Zaykowski
c. Cuevas
d. Santos
28. Spatial-statistical methods that use locations where recorded crime incidents occurred to identify areas with non-random, high concentrations of crime events is called ______.
a. hot spot mapping
b. risk terrain modeling
c. predictive policing
d. map legend
29. Which of the following methods focuses on the spatial clustering of crimes across an entire study area?
a. hot spot mapping techniques
b. risk terrain modeling
c. global statistical tests
d. local indicators of spatial association statistics
30. Hot spot mapping techniques focus on ______ data.
a. raster
b. point-pattern
c. vector
d. frequency
31. Hot spot mapping techniques utilize all of the following tests with the exception of ______.
a. quadrat mapping
b. kernel density estimation
c. nearest neighbor index
d. thematic mapping
32. PredPol develops crime forecasts based on the following with the exception of ______.
a. the type of offender that committed the crime
b. the location of historical crime data
c. when the crimes occurred
d. the type of crime that was committed
33. Hunchlab, a predictive policing company, uses predictive software analyzing ______ data.
a. vector
b. raster
c. cartographic
d. point-pattern
34. ______ is/are defined by the number of crime incidents that fall within a predicted crime hot spot.
a. Hit rates
b. Predictive accuracy indexes
c. Recapture rate indexes
d. Scale bars
35. When one calculates the ratio of the hit rate to the proportion of a study area of a previous hotspot, in order to assess the quality of prospective hotspot maps, it is called ______.
a. hit rates
b. predictive accurate index
c. recapture rate index
d. near repeat calculator
36. Which of the following metrics for determining the quality of crime hot spot predictions is based on the ratio of hotspot density for the present time period and the previous time period?
a. hit rates
b. predictive accurate index
c. recapture rate index
d. near repeat calculator
37. Using a holistic strategy, the predictive crime analysis forecasting technique guided by criminological theory is called ______.
a. recapture rate indexes
b. predictive accurate indexes
c. risk terrain modeling
d. hit rates
38. Locations like malls or sporting events that attract large numbers of both crime offenders and victims are called ______.
a. crime stoppers
b. crime enablers
c. crime attractors
d. crime generators
39. Geographic areas with bar districts are examples of ______.
a. crime stoppers
b. crime enablers
c. crime attractors
d. crime generators
40. Locations with little or no behavioral regulations, lack of control, or monitoring are called ______.
a. crime stoppers
b. crime enablers
c. crime attractors
d. crime generators
41. A statistical method used for determining the 24-hour rhythm of crimes is called ______.
a. aoristic analysis
b. tactical analysis
c. administrative analysis
d. strategic analysis
42. A method used to identify the area where a serial offender most likely lives is called ______.
a. risk terrain modeling
b. geographic profiling
c. predictive policing
d. hot spot mapping
43. Which of the following types of geospatial data should be included in a map?
a. frequency data
b. vector data
c. raster data
d. cross-sectional data
44. Geographic information systems and crime-mapping findings are primarily reported in ______.
a. charts
b. graphs
c. tabular form
d. maps
45. The average distance something, such as hot spots, is from the mean value is known as the ______.
a. standard deviation unit
b. north arrow
c. map legend
d. scale bar
1. When crime mapping, positional accuracy is a term for how close each geocoded coordinate is to the real address the coordinate is meant to represent.
2. An arrow pointing north orients readers to maps.
3. Spatiotemporal refers to space and time.
4. Resource deployment for special events is an example of tactical crime analysis.
5. Administrative crime analysis includes typical administrative tasks that are not analytic.
6. Performing basic technology support is an example of administrative crime analysis.
7. Tactical crime analysis includes criminal profiling or criminal investigative analysis.
8. Academics can use applied crime analysis as research methodology.
9. Academics, practitioners, and crime analysts think of crime analysis in the same way.
10. Academics can use crime analysis to test criminological theories.
11. Researchers and academics can use crime analysis to test social disorganization theory.
12. The primary crime analysis technique used by academics is called spot mapping.
13. Examining an event retrospectively means looking at it in the future.
14. To assess the existence of clusters within a whole study area, researchers use local indicators of spatial association statistics.
15. Hot spot mapping techniques focus on the analysis of vector data.
16. GIS and crime mapping findings are primarily reported in graph form.
17. When titling a map reporting findings from GIS and crime mapping studies, make the title direct and concise and include information about the area studied, and if applicable, the date range.
18. Map legends explain what symbols on the map represent.
19. Academics reporting their findings are advised to use more than seven color categories in a color ramp.
20. The scale on a map shows the ratio of distances, and how they correspond to actual measurements in the real world.
21. In order to be placed on a map as crime data, addresses must be given spatial reference.
22. Street geocoding uses reference data about street networks and locations.
23. Coordinates are the most common way that location is conceptualized in geographic information systems.
24. Completeness refers to the percentage of records that can reliably be geocoded, and is commonly referred to as the hit rate.
25. Census blocks typically contain one household.
1. Identify the three different types of analysis that are conducted by law enforcement agencies.
2. Define hot spot mapping.
3. Identify the three retrospective crime hot spot categories.
4. What is predictive policing?
5. What are the two of the most well-known predictive policing algorithms used by law enforcement agencies?
6. Identify the three most common approaches to evaluating prospective crime hot spot maps.
7. Identify the various ways that researchers can report their geographic information systems and crime mapping findings.
8. Identify the various components that need to be included when reporting geographic information systems and crime mapping findings on a map.
9. Identify the two common pitfalls of GIS and crime mapping analysis.
10. What is geocoding?
1. Discuss the history of crime mapping and analysis. Who were the pioneers of these techniques?
2. How is crime analysis used by academics?
3. Discuss the three metrics for crime hot spot mapping. What is the purpose of using the metrics for crime spot identification?
4. Discuss the three most common approaches to evaluating prospective crime hot spot maps. If academics were unable to combine these approaches, which one do you believe would be the most accurate? Why?
5. Discuss the dilemma concerning privacy and data integrity. What can academics, practitioners, and crime analysts do to prevent ethical issues concerning privacy, while still maintaining the integrity of the data?
Document Information
Connected Book
Research Methods in Criminal Justice 1st Edition Test Bank
By Callie Marie Rennison