Test Bank Intimate Partner Abuse (Ipa) And Stalking Ch.10 - Test Bank | The Invisible Woman 5e by Belknap by Joanne Belknap. DOCX document preview.

Test Bank Intimate Partner Abuse (Ipa) And Stalking Ch.10

Chapter 10: Intimate Partner Abuse (IPA) and Stalking

Test Bank

Multiple Choice

1. Which term has been used increasingly since the 1990s to label abuse by current or former partners, dates, and lovers?

A. marital abuse

B. intimate partner violence

C. domestic violence

D. spousal abuse

Cognitive Domain: Knowledge

Answer Location: Defining Intimate Partner Abuse (IPA)

Difficulty Level: Easy

2. According to the authors, what is the preferred label for abuse perpetrated by ex(partners)?

A. marital/spousal abuse

B. intimate partner violence

C. intimate partner abuse

D. domestic violence

Cognitive Domain: Knowledge

Answer Location: Defining Intimate Partner Abuse (IPA)

Difficulty Level: Easy

3. A course of conduct directed at a specific person that involves repeated visual or physical proximity, nonconsensual communication, or verbal, written or implied threats, or a combination thereof, that would cause a reasonable person fear is referred to as ______.

A. exploitation

B. harassment

C. stalking

D. bribery

Cognitive Domain: Knowledge

Answer Location: Defining Stalking

Difficulty Level: Easy

4. ______ is central in intimate partner abuse and stalking.

A. Coercion

B. Power

C. Force

D. Intensity

Cognitive Domain: Comprehension

Answer Location: The Significance of Coercion/Coercive Control

Difficulty Level: Medium

5. Which tactic is a part of Pence and Paymar’s (1986) Power and Control Wheel?

A. force

B. isolation

C. bribery

D. exploitation

Cognitive Domain: Analysis

Answer Location: The Significance of Coercion/Coercive Control

Difficulty Level: Medium

6. According to Tong (1984), intimate partner abuse must ______.

A. be violent in order to classify as intimate partner abuse

B. involve a manifestation of domination and control

C. result in an arrest and conviction

D. occur between people who are currently in a relationship

Cognitive Domain: Comprehension

Answer Location: IPA Tactics

Difficulty Level: Medium

7. Which intimate partner abuse tactic is considered a subtactic?

A. stalking

B. pregnancy

C. emotional

D. physical

Cognitive Domain: Analysis

Answer Location: IPA Tactics

Difficulty Level: Medium

8. Which of the following is an example of how tactics can overlap?

A. threatening a victim with harm

B. physically following a victim

C. slapping an intimate partner

D. raping a pregnant partner

Cognitive Domain: Application

Answer Location: IPA Tactics

Difficulty Level: Hard

9. Which tactic is most thought of when people think of intimate partner abuse and battered women?

A. psychological intimate partner abuse

B. sexual intimate partner abuse

C. nonsexual physical intimate partner abuse

D. pregnancy abuse

Cognitive Domain: Comprehension

Answer Location: Physical IPA

Difficulty Level: Medium

10. Which of the following statements pertaining to pregnancy abuse is true?

A. Pregnancy is one of the safest times for women in terms of intimate partner abuse.

B. Pregnancy abuse is most risky for women who are married.

C. The reasons for this type of abuse have everything to do with jealous and control.

D. Pregnancy abuse is only known to be physically harmful.

Cognitive Domain: Application

Answer Location: Pregnancy IPA

Difficulty Level: Hard

11. Which type of intimate partner abuse is often minimized but is potentially extremely harmful?

A. physical

B. sexual

C. pregnancy

D. psychological/emotional

Cognitive Domain: Comprehension

Answer Location: Psychological/Emotional Abuse

Difficulty Level: Medium

12. According to survivors, ______ is the most damaging type of intimate partner abuse.

A. psychological/emotional

B. pregnancy

C. sexual

D. physical

Cognitive Domain: Comprehension

Answer Location: Psychological/Emotional Abuse

Difficulty Level: Medium

13. Which of the following was identified as one of the main reasons victims stay in abusive relationships and one of the main reasons they leave?

A. finances

B. shame

C. children

D. culture

Cognitive Domain: Application

Answer Location: Psychological/Emotional Abuse

Difficulty Level: Hard

14. In a study on Mexican immigrant women, researchers found that for many intimate partner abuse victims, the worse tactic used by their abusers was ______.

A. verbal humiliation

B. harming their children

C. destructing property

D. social isolation

Cognitive Domain: Comprehension

Answer Location: Psychological/Emotional Abuse

Difficulty Level: Medium

15. Which type of abuse is highly related to economic abuse?

A. systems abuse

B. spiritual abuse

C. school sabotage

D. social isolation

Cognitive Domain: Comprehension

Answer Location: Psychological/Emotional Abuse

Difficulty Level: Medium

16. When the intimate partner abusers’ friends, family members, and others also stalk their victims, usually at the abusers’ requests/demands, they are ______.

A. proxy stalking

B. revenge stalking

C. resentful stalking

D. predatory stalking

Cognitive Domain: Application

Answer Location: Psychological/Emotional Abuse

Difficulty Level: Hard

17. If an abuser engages a social service agency to harass and force meetings with the abused, then they are committing what type of abuse?

A. proxy stalking

B. systems

C. physical

D. economic

Cognitive Domain: Application

Answer Location: Psychological/Emotional Abuse

Difficulty Level: Hard

18. Systems abuse is common in which of the following scenarios?

A. while the victim and abuser are dating

B. while the victim and abuser are friends, prior to dating

C. while the victim and abuser are married

D. while the victim and abuser are separated

Cognitive Domain: Comprehension

Answer Location: Psychological/Emotional Abuse

Difficulty Level: Medium

19. In a study on Latina intimate partner abuse, researchers found that most of the women who were not born in the United States were more likely to report being ______.

A. beat up

B. raped

C. forced to have sex without a condom

D. strangled

Cognitive Domain: Comprehension

Answer Location: Immigrants

Difficulty Level: Medium

20. Studies on intimate partner abuse in LGBTQI+ relationships reported that physical abuse perpetration was most likely by ______.

A. bisexual men

B. bisexual women

C. lesbian women

D. gay men

Cognitive Domain: Comprehension

Answer Location: LGBTQI+

Difficulty Level: Medium

21. Threatening institutionalization, taking away custody of children, and conveying judgmental attitudes based on the victims’ disabilities are examples of ______ used on people with dis(abilities).

A. physical tactics

B. emotionally abusive tactics

C. neglect tactics

D. control/restraint tactics

Cognitive Domain: Application

Answer Location: People With (Dis)abilities

Difficulty Level: Hard

22. Withholding personal assistance is an example of a ______ tactic.

A. physical

B. emotional abusive

C. neglect

D. control/restraint

Cognitive Domain: Application

Answer Location: People With (Dis)abilities

Difficulty Level: Hard

23. Which of the following is an example of a neglect tactic used by abusers on people with dis(abilities)?

A. not contacting a physician when one is needed

B. withholding medication

C. threatening institutionalization

D. refusing social support

Cognitive Domain: Application

Answer Location: People With (Dis)abilities

Difficulty Level: Hard

24. Controlling assistive services is an example of which tactic used against disabled women?

A. physical

B. neglect

C. emotionally abusive

D. control/restraint

Cognitive Domain: Application

Answer Location: People With (Dis)abilities

Difficulty Level: Hard

25. Which of the following is an example of a traditional stalking tactic?

A. sending the victim unwanted gifts

B. email the victim threats

C. constantly text messaging the victim

D. GPS tracking the victim via their phone

Cognitive Domain: Application

Answer Location: Stalking Tactics

Difficulty Level: Hard

26. Which of the following concepts is at the heart of intimate partner abuse?

A. marginalized masculinity

B. complicit masculinity

C. toxic masculinity

D. hegemonic masculinity

Cognitive Domain: Analysis

Answer Location: The Historical Identification of IPA and Stalking as Social Problems

Difficulty Level: Medium

27. What is addressed as part of the platform by British and U.S. suffragists during the beginning of the 20th century?

A. wife beating

B. reproductive freedom

C. forced marriage

D. marital rape

Cognitive Domain: Knowledge

Answer Location: The Historical Identification of IPA and Stalking as Social Problems

Difficulty Level: Easy

28. The first step in the current abused women’s movement was ______.

A. furthering research pertaining to women’s rights and sharing the information with the public

B. setting up of emergency shelters by women within each community

C. assisting in the implementation of government policy and programs that helped women

D. enacting legislation in accordance with women’s rights

Cognitive Domain: Comprehension

Answer Location: The Historical Identification of IPA and Stalking as Social Problems

Difficulty Level: Medium

29. The “pure victim” is characterized by which of the following?

A. is violent, even when not self-defending

B. has only experienced physical violence

C. suffers from abuse infrequently

D. is terrified by the abuse

Cognitive Domain: Analysis

Answer Location: The Historical Identification of IPA and Stalking as Social Problems

Difficulty Level: Medium

30. Which of the following findings pertaining to victimization and offending is true?

A. Men/boys are more likely than women to report being stalked by an (ex)partner.

B. Women/girls report significantly higher levels of fear.

C. Men/boys are far more likely to use violence in intimate patterns out of retaliation.

D. Women/girls are more likely to report that they find their victimization humorous.

Cognitive Domain: Application

Answer Location: The Myth of IPA Gender Symmetry

Difficulty Level: Hard

31. In an analysis of written narratives by men seeking protection orders against women (ex)partners, Durfee (2011) identified which of the following themes?

A. The men’s descriptions of the violence they experienced focused on how they were no longer in control of the relationship.

B. The men described their active resistance to the abuse but were careful to note that their actions were not “abusive” and that they were not the “abusers.”

C. Most of the men described both verbal and physical abuse and expressed fear of their partner.

D. Men typically underestimated their partner’s ability to inflict physical injuries.

Cognitive Domain: Analysis

Answer Location: The Myth of IPA Gender Symmetry

Difficulty Level: Medium

32. During which phase of the cycle theory of violence do victims typically feel mounting pressure and the inevitability of an abusive explosion?

A. tension building

B. acute abuse incident

C. honeymoon

D. reemergence

Cognitive Domain: Comprehension

Answer Location: Walker’s Cycle Theory of Violence

Difficulty Level: Medium

33. Which phase is considered to be the briefest of the three phases in the cycle theory of violence?

A. tension building

B. acute abuse incident

C. honeymoon

D. separation

Cognitive Domain: Comprehension

Answer Location: Walker’s Cycle Theory of Violence

Difficulty Level: Medium

34. If the police are notified at all, it is usually done during which phase of the cycle theory of violence?

A. honeymoon

B. separation

C. tension-building

D. acute abuse incident

Cognitive Domain: Comprehension

Answer Location: Walker’s Cycle Theory of Violence

Difficulty Level: Medium

35. Which phase is characterized by kindness and contrite loving behavior from the abuser who begs forgiveness and promises not to be violent again?

A. honeymoon

B. separation

C. tension-building

D. acute abuse incident

Cognitive Domain: Analysis

Answer Location: Walker’s Cycle Theory of Violence

Difficulty Level: Medium

36. Excuses are related to situational characteristics, such as ______.

A. being a bad cook

B. being unfaithful

C. being drunk

D. being too independent

Cognitive Domain: Analysis

Answer Location: Who Are the Intimate Partner Abusers?

Difficulty Level: Medium

37. Which of the following is characteristic that abusers use to deny wrongness?

A. being frustrated

B. losing control

C. being drunk

D. being unfaithful

Cognitive Domain: Analysis

Answer Location: Who Are the Intimate Partner Abusers?

Difficulty Level: Medium

38. Which of the following statements pertaining to justifications is true?

A. They are related to situational characteristics.

B. They legitimize abuse.

C. They include irrationalizing abuse.

D. They are often made up and sexist.

Cognitive Domain: Application

Answer Location: Who Are the Intimate Partner Abusers?

Difficulty Level: Hard

39. The two most significant characteristics common among intimate partner abusers are that they are ______.

A. hostile and controlling

B. controlling and jealous

C. jealous and aggressive

D. aggressive and bitter

Cognitive Domain: Analysis

Answer Location: Who Are the Intimate Partner Abusers?

Difficulty Level: Medium

40. Which theory contends that children who witness intimate partner abuse and/or are abused by their parents learn that violence is an acceptable way to resolve conflict?

A. differential association

B. cycle theory of violence

C. intergenerational transmission of violence

D. just world hypothesis

Cognitive Domain: Comprehension

Answer Location: Who Are the Intimate Partner Abusers?

Difficulty Level: Medium

41. Which of the following characteristics makes people vulnerable to all types of abuses?

A. having an education

B. having a steady job

C. having dependent children

D. have had no childhood victimization

Cognitive Domain: Analysis

Answer Location: IPA and Stalking Victims/Survivors

Difficulty Level: Medium

42. Research indicates that ______ women experience significantly higher risks of intimate partner abuse victimization.

A. African American

B. White

C. Latinx

D. American Indian

Cognitive Domain: Knowledge

Answer Location: IPA and Stalking Victims/Survivors

Difficulty Level: Easy

43. A study of intimate partner abused mothers preparing to leave their abusers found that all mothers ______.

A. went through a phase of active planning

B. changed their minds and stayed

C. used mentally planning

D. went directly to leaving

Cognitive Domain: Knowledge

Answer Location: Inhibitors to Leaving/Returning to an Abusive Relationship and What Helps Survivors Leave

Difficulty Level: Easy

44. The degrees of abuse/threats to the victims and children are considered to be ______.

A. survivors’ circumstances

B. victim characteristics

C. abuse tactics/subtactics

D. inhibitors to leaving/returning

Cognitive Domain: Comprehension

Answer Location: Inhibitors to Leaving/Returning to an Abusive Relationship and What Helps Survivors Leave

Difficulty Level: Medium

45. Abusers’ threats to kill children and pets are examples of the phenomenon of ______.

A. force

B. compulsion

C. duress

D. entrapment

Cognitive Domain: Application

Answer Location: Risk Factors for Staying With and Leaving IP Abusers

Difficulty Level: Hard

46. According to a study of heterosexual African American women college students, which of the following is the first stage in the process of leaving their relationships?

A. assessing the relationship

B. separating from the abusive partner

C. reestablishing social networks

D. gaining a sense of self-empowerment

Cognitive Domain: Application

Answer Location: Characteristics Related to IPA Survivors’ Staying/Leaving Decisions

Difficulty Level: Medium

47. According to research, ______ women who had been with their abusive partners for more than 5 years were more likely to leave than the others.

A. White

B. African American

C. Latinx

D. Asian American

Cognitive Domain: Knowledge

Answer Location: Characteristics Related to IPA Survivors’ Staying/Leaving Decisions

Difficulty Level: Easy

48. In the 1960s, which type of training and policies were implemented in police departments?

A. mediation

B. defensive tactics

C. negotiation

D. first aid

Cognitive Domain: Knowledge

Answer Location: The Police

Difficulty Level: Easy

49. Which is a feminist concern with pro-arrest policies?

A. The policies take decision making away from the victims.

B. The policies discriminate against victims.

C. The policies are not implemented uniformly across jurisdictions.

D. The polices do not impact subsequent violence toward abusers victims.

Cognitive Domain: Comprehension

Answer Location: The Police

Difficulty Level: Medium

50. Which of the following statements pertaining to protection orders is true?

A. The more severely abused the woman, the more likely she is to obtain an order.

B. Most are sought by women with abusive ex(partners).

C. They have been found to be more useful to dependent survivors.

D. It is fairly simple and easy for all women to obtain them.

Cognitive Domain: Application

Answer Location: Protection/Restraining Orders (POs)

Difficulty Level: Hard

True/False

1. The most common victim–offender relationship in stalking is a current or former romantic/intimate partner.

Cognitive Domain: Comprehension

Answer Location: Defining Intimate Partner Abuse (IPA) and Stalking

Difficulty Level: Medium

2. Much of the abuse perpetrated by (ex)partners is not violent per se.

Cognitive Domain: Comprehension

Answer Location: Defining Intimate Partner Abuse (IPA) and Stalking

Difficulty Level: Medium

3. All scholars believe that intimate partner abuse cannot be a 1-time phenomenon.

Cognitive Domain: Comprehension

Answer Location: IPA Tactics

Difficulty Level: Medium

4. Pregnancy is one of the most dangerous, including lethal, times for women and girls abused by intimate partners.

Cognitive Domain: Comprehension

Answer Location: Pregnancy IPA

Difficulty Level: Medium

5. Genderist attacks take place when intimate partner abusers rely on a binary definition that sex/gender can only be female or male and employ transphobia in their abuse.

Cognitive Domain: Comprehension

Answer Location: LGBTQI+

Difficulty Level: Medium

6. Hegemonic masculinity is a biologically determined pattern of men’s domination of women.

Cognitive Domain: Comprehension

Answer Location: The Historical Identification of IPA and Stalking as Social Problems

Difficulty Level: Medium

7. Most intimate partner abuse cases result in a call to the police.

Cognitive Domain: Knowledge

Answer Location: IPA Rates

Difficulty Level: Easy

8. Walker’s cycle theory of violence fits all intimate partner abuse victims’ experiences and reactions.

Cognitive Domain: Comprehension

Answer Location: Walker’s Cycle Theory of Violence

Difficulty Level: Medium

9. Abusers are more likely to use justifications than excuses.

Cognitive Domain: Comprehension

Answer Location: Who Are the Intimate Partner Abusers?

Difficulty Level: Medium

10. Stalking is highly gendered.

Cognitive Domain: Comprehension

Answer Location: Who Are the Stalkers?

Difficulty Level: Medium

11. The most common motivations for stalking are romantic pursuit, harassment, control, retaliation, anger, spite, and/or disruption of a new romantic relationship by the stalker.

Cognitive Domain: Comprehension

Answer Location: Who Are the Stalkers?

Difficulty Level: Medium

12. The risk factors for staying with and leaving abusers are considerably different.

Cognitive Domain: Comprehension

Answer Location: Risk Factors for Staying With and Leaving IP Abusers

Difficulty Level: Medium

13. Mediation is considered to be an ineffective tactic, as it does not deter intimate partner violence.

Cognitive Domain: Comprehension

Answer Location: The Police

Difficulty Level: Medium

14. All feminists support pro-arrest policies.

Cognitive Domain: Knowledge

Answer Location: The Police

Difficulty Level: Easy

15. Dual or retaliatory arrests are often the result of some victims who resist or fight back against their abusers.

Cognitive Domain: Comprehension

Answer Location: The Police

Difficulty Level: Easy

16. A legal intervention in which one person who is deemed to be a threat to another is ordered to have no contact with the person, and usually to stay a specified distance away is referred to as a protection order.

Cognitive Domain: Knowledge

Answer Location: Protection/Restraining Orders (POs)

Difficulty Level: Easy

17. Protection orders are an important negotiating tool survivors use to gain power in their relationships with their abusers and to stop the abuse.

Cognitive Domain: Comprehension

Answer Location: Protection/Restraining Orders (POs)

Difficulty Level: Medium

18. Historically, the courts have failed to response to the plight of abused women.

Cognitive Domain: Knowledge

Answer Location: The Courts

Difficulty Level: Easy

19. For a woman who has decided to press charges and follow through, the pretrial period is a particularly vulnerable time.

Cognitive Domain: Comprehension

Answer Location: The Courts

Difficulty Level: Medium

20. Intimate partner abuse and stalking have a significant overlap among offenders and survivors.

Cognitive Domain: Comprehension

Answer Location: Summary

Difficulty Level: Medium

Essay

1. Explain why naming the phenomenon of people who abuse their (ex)partners has been problematic.

2. Illustrate Pence’s and Paymar’s Power and Control Wheel.

3. Identify the four primary intimate partner abuse tactics and subtactics. Illustrate how some of the tactics can overlap.

4. Explain the different phases of Walker’s (1979) cycle theory of violence.

5. Explain the purpose of protection orders.

Cognitive Domain: Comprehension

Answer Location: Protection/Restraining Orders (POs)

Difficulty Level: Medium

Document Information

Document Type:
DOCX
Chapter Number:
10
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 10 Intimate Partner Abuse (Ipa) And Stalking
Author:
Joanne Belknap

Connected Book

Test Bank | The Invisible Woman 5e by Belknap

By Joanne Belknap

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party