These laws prohibit the use of a victim’s previous sexual history to be used in a trial against his or her perpetrator.
A. rape shield laws
B. victim protection laws
C. victim privacy laws
D. victimization shield laws
A. rape shield laws
You might also like to view...
Which of the following terms is prison slang for an informant?
a. rat b. fish c. gorilla d. wolf
In the mid-1980s, a particularly violent group of Christian survivalists known as the ___________ engaged in an 18-month terrorist campaign that they believed would lead to a white revolution that would overthrow the ZOG
Fill in the blank(s) with correct word
When conducting the preliminary interview about a computer-assisted crime or cybercrime, which of the following should investigators establish?
A. Who owns the computers? B. How often do the owners visit illicit/illegal websites? C. Do the owners prefer broadband, DSL, or T1 connection? D. All of the answers are correct.
Discuss the difference between a hypothesis and a theory in the context of criminology
What will be an ideal response?