1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
luda_lava [24]
3 years ago
6

A crime has been committed at a dinner party. The police begin to take aside the guests to question them one by one. The suspect

s include a wealthy philanthropist, a famous actress, a professor at a prominent university, and the butler. According to the theory of radical criminology, who is MOST likely to be arrested for the crime?
the philanthropist

the actress

the professor

the butler
Law
1 answer:
nignag [31]3 years ago
0 0
I’d say professor? they are intelligent and could easily think of a well thought out plan to murder someone but also the actress could be a best bet too because they would least expect it to be her so she would probably ultimately be their last choice but because she is so famous she has connections and could hire a hit man to commit the crime. I feel like the butler would be to easy to assume because he knows how to handle knives and stuff like that so why would he do that if he could be easily caught? I think the best answer is the actress
You might be interested in
Please help (For MUN)
ivann1987 [24]

Answer:

A solution to locate and punish cyber intruders is to promote software capable of identifying the IP of intruder computers, that is, those that do not have an IP authorized by the software. This software must also be able to store unauthorized and therefore intrusive IPs.

Explanation:

DISEC is the acronym that refers to the Disarmament and International Security Committee, which is a UN department that deals with global disarmament issues, with the aim of promoting security and combating threats to world peace. It is extremely important that the files and work of the DISEC community, be restricted to people who work directly with this, for this reason, it is necessary that strategies are created that prevent cybernetic invaders from having access to any information in this sector. In this case, it would be beneficial to create software capable of identifying and storing the IP of attacking computers, allowing these attackers to be found and punished.

A computer's IP is an identifier of the computer, the network used for access and the location where access was made. By having the IP of invading computers, the UN would have access to the location of the users of these computers, being able to find and punish them.

3 0
3 years ago
Which statement describes Max Weber's theory about power?
pychu [463]
D: power is held by bureaucrats and administrators.
5 0
3 years ago
Read 2 more answers
What are some potential problems or risks of relying on the information provided by anonymous 9-1-1 callers to serve as proof of
Alona [7]
You don’t really have the necessary proof the convict or act upon the situation
7 0
3 years ago
How can pavement markings indicate that you are driving in the right<br> direction?
Allushta [10]
The yellow line between the roads separate the oncoming traffic lane, so the drivers won't get confused. Since the driver is on the right side of the road, the yellow line would be on their left, since the middle line (yellow line) is in the middle of the road.
6 0
3 years ago
Why is notice important in determining who holds titile to real estate
Dafna11 [192]
Good question it is importantly because If no one knew then it would be chaos
5 0
3 years ago
Other questions:
  • According to John F. Galliher, legal definitions of criminality are arrived at through a __________ process.
    9·1 answer
  • Describe three earlier types of corporal punishment used to correct offenders, and identify the goals of each.
    9·1 answer
  • Which of the following units of local government has home rule status under t<br>Constitution?​
    13·1 answer
  • This question has me very confused help plzzzz
    10·1 answer
  • (MC)Law enforcement begins with whom?
    13·1 answer
  • "Democratization of rights" can best be explained as___.
    9·2 answers
  • What are all the ranks in brainly and how much question do you need to answer to achive them all
    12·2 answers
  • If a judge rules that a party has lost its case because of the Statute of Frauds, the judge has essentially stated that: A. the
    15·1 answer
  • How many times is god mentioned in the constitution
    8·2 answers
  • Describe the secret that felt like a knife cutting into Brian why was this thought so upsetting to him?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!