41) Canada has been operating expedited traveller systems for the last decade, first with the CANPASS border clearance system and more recently with the ________ system for travellers into both Canada and the United States. a. NextPass b. CanPort c. NEXUS d. NextStop e. CANUS 42) Canada will soon include biometric technologies in its ________________, as the United Kingdom and the United States currently do. a. Transnational criminal activity system b. Visa application process c. Information technology d. Human trafficking system e. Cybercrime system 43) According to Richter H. Moore, Jr., within a few decades, “criminal organizations will be able to afford ______________________.†a. biometric iris scanners b. global storefront operations c. their own satellites d. enculturalization e. new computers 44) Biometric technologies typically involve ________ when they are used in the area of crime prevention. a. Identification b. Verification c. hand geometry d. finger scanning e. recognition 45) Foresight’s Crime Prevention Panel outlines three social characteristics that are relevant to understanding and predicting future forms of criminality. They are: individuality and independence; Information Communication Technology (ITC) usage; and ___________________________. a. Technology b. Criminality c. defensible space d. Globalization (the increasingly international character of social life) e. territorial reinforcement 46) The creation and transmission of destructive computer viruses and other malicious forms of programming code are a type of computer crime that is typically committed by ________. a. adult males b. adult females c. young females d. young males e. young “disaffected technonerds” 47) Based on various reports, the Criminal Intelligence Directorate (CID) of the RCMP estimates that anywhere between _________________ persons are trafficked from Canada into the United States each year. a. 1 000 and 1500 b. 1500 and 2200 c. 2000 and 3000 d. 5000 and 10 000 e. 10 000 and 15 000 48) In Canada, trafficking in humans wasn’t recognized as an offence until ___________. a. November 2001 b. November 2003 c. March 2004 d. March 2008 e. April 2008 49) According to the FBI, computer-manipulation crimes include all of the following EXCEPT: a. embezzlement. b. electronic money laundering. c. electronic fund transfer fraud. d. other fraud/phishing. e. extortion threats/electronic terrorism. 50) A number of specialized computer programs, such as ImAger and Compusketch assist police artists in rendering composite images of ______________. a. veins in the face b. radiant heat from a person’s face c. suspects and missing victims d. lost pets e. facial hairs on the chin of the subject