Are you looking for CSS Criminology 2024 MCQs? Here are the 20 MCQs from the CSS 2024 Criminology past paper. The FPSC examiner set these MCQs from various criminology topics including crime theories, the criminal justice system, juvenile delinquency, policing, and penal reforms. These MCQs will help you in preparation for the CSS Criminology 2024 paper. There are twenty MCQs that you attempt while also learning their topic explanation by clicking on the explanation button below. Finally, the practice of these MCQs can help you in covering various topics of criminology as FPSC usually repeats MCQs in the exam.
Score: 0 / 25
Incorrect As: 0
Q 1: Children who continue to commit status offense despite repeated intervention by the family, school, social service, and Law Enforcement Agencies are called:
A) Life course persistent offender
B) Chronic status offender
C) Recidivist
D) None of these
Chronic status offenders are minors who repeatedly commit non-criminal acts that are considered offenses only because of their age, such as truancy, running away from home, or violating curfew. Despite interventions from family, school, social services, and law enforcement, these children continue their behavior. Their repeated offenses indicate a failure of early intervention and require more structured rehabilitation programs.
Q 2: Cesare Beccaria had written a book on crime and punishment in:
A) 1764
B) 1738
C) 1799
D) None of these
Cesare Beccaria, an Italian criminologist, wrote his famous work On Crimes and Punishments in 1764. This book argued against torture and the death penalty and promoted the idea that punishments should be proportionate to the crime. Beccaria\'s work laid the foundation for modern criminal justice systems and emphasized rationality, deterrence, and humane treatment of offenders.
Q 3: Parens patriae is:
A) The supreme guardian of every child
B) Ultimate guardian of every child
C) Both (A) & (B)
D) None of these
Parens patriae is a legal doctrine meaning parent of the nation. It allows the state to step in as a guardian for children or vulnerable individuals when their parents fail to provide proper care. This principle serves as the foundation of juvenile justice systems, emphasizing rehabilitation rather than punishment.
Q 4: The first specialized correctional institute for youth in the United States was:
A) Borstal institution
B) Juvenile court
C) House of commons
D) None of these
The first specialized correctional institution for youth in the United States was the House of Refuge, established in New York in 1825. It aimed to provide shelter, discipline, and education to juvenile offenders and children at risk. This institution marked the beginning of the formal juvenile justice system in the U.S.
Q 5: Who is called the father of probation.
A) Blackstone
B) John Augustus
C) Travis Hirschi
D) None of these
John Augustus, a Boston shoemaker, is known as the Father of Probation. In the mid-19th century, he voluntarily supervised offenders, helping them reform and reintegrate into society instead of serving prison time. His efforts laid the groundwork for modern probation systems worldwide.
Q 6: A philosophy of punishment based on society’s moral outrage or disapproval of a crime is called:
A) Individual justice
B) Utilitarian philosophy
C) Retribution
D) None of these
Retribution is a punishment philosophy based on society’s moral outrage or disapproval of a crime. It suggests that criminals should suffer consequences proportionate to their offenses. This principle emphasizes justice and moral balance rather than rehabilitation or deterrence.
Q 7: Social Disorganization Theory was proposed by:
A) Wilson & Kelin
B) Robert K. Merton
C) Edwin Sutherland
D) None of these
The Social Disorganization Theory was proposed by sociologists Clifford Shaw and Henry McKay. It explains how environmental factors, such as poverty, urban decay, and lack of social cohesion, contribute to crime and delinquency. The theory suggests that crime rates are higher in neighborhoods with weak community ties and limited social control.
Q 8: Many of the rules prescribed severe penalties which apply the dictum An eye for an eye, a tooth for a tooth. was related to:
A) The code of severe punishment
B) The Code of Hammurabi
C) Societal laws of UK
D) None of these
The Code of Hammurabi, one of the oldest legal codes, was established by King Hammurabi of Babylon around 1754 BCE. It is famous for the principle of an eye for an eye, a tooth for a tooth, symbolizing proportional justice. This code laid an early foundation for legal systems by formalizing rules and punishments.
Q 9: According to Strain theory, ___________ are those individuals who have traditional success goals, but substitute deviant means to achieve them.
A) Conformists
B) Innovators
C) Rebels
D) None of these
In Strain Theory, proposed by Robert K. Merton, innovators are individuals who accept society\'s goals (e.g., wealth or success) but use unconventional or illegal means to achieve them. For example, a person might engage in fraud or theft to gain financial success when legitimate opportunities are unavailable.
Q 10: Who coined the term Criminology.
A) Cesare Beccaria
B) Cesare Lombroso
C) Becker
D) None of these
The term criminology was coined by Italian jurist Raffaele Garofalo in 1885. He was one of the key figures in the Positivist School of Criminology, advocating for a scientific approach to studying crime and criminals. Garofalo emphasized identifying the causes of criminal behavior and applying tailored punishments.
Q 11: Who is considered the father of Criminology?
A) Cesare Beccaria
B) Jermy Bentham
C) Cesare Lombroso
D) None of these
Cesare Lombroso, an Italian criminologist, is considered the Father of Criminology. He introduced the concept of the born criminal, suggesting that criminality is inherited and identifiable through physical traits. Although his theories are now outdated, Lombroso was instrumental in shifting criminology toward scientific methods.
Q 12: ___________ is a malicious software that inserts itself into other programs.
A) Worms
B) Malware
C) Virus
D) None of these
A virus is a type of malicious software (malware) that can replicate itself and spread to other programs or files on a computer. It often damages or disrupts system operations. Unlike worms, viruses require user intervention (e.g., opening an infected file) to activate and spread.
A virus damages or disrupts data and software on a computer, while spyware secretly gathers sensitive information, such as passwords or financial details, without the user\'s consent. Both are examples of malicious software but differ in their primary objectives.
Q 14: Phishing is a form of:
A) Impersonation
B) Spamming
C) Identity theft
D) None of these
Phishing is a cybercrime where attackers pose as legitimate entities (e.g., banks or tech companies) to trick individuals into providing sensitive information, such as passwords or credit card numbers. It is a form of identity theft because the stolen information is often used to impersonate victims for financial gain.
Q 15: A working definition of the problem is formulated during which stage of the SARA problem-solving approach?
A) Assessment
B) Analysis
C) Response
D) None of these
In the SARA (Scanning, Analysis, Response, Assessment) problem-solving model, the Analysis stage focuses on identifying the root causes and patterns of a problem. It involves gathering data, analyzing trends, and understanding contributing factors before developing a response plan.
Q 16: Community policing recommends _________________, with less reliance on the patrol car and more emphasis on face-to-face interactions.
A) Prevention Emphasis
B) Geographic Focus
C) Both (A) & (B)
D) None of these
Community policing emphasizes crime prevention through community engagement, face-to-face interactions, and proactive strategies rather than reactive responses. It also focuses on specific geographic areas, fostering strong relationships between law enforcement and community members.
Q 17: ____________ is when a company or person sends unwanted email to another person.
A) Skimming
B) Spoofing
C) Spamming
D) None of these
Spamming refers to sending unsolicited bulk emails, often for advertising or malicious purposes. These emails can flood inboxes, slow down servers, and sometimes carry phishing links or malware attachments.
Q 18: A person who frequently has been convicted of criminal behavior and is presumed to be a danger.
A) Occasional Criminals
B) Habitual Criminals
C) Professional Criminals
D) None of these
Habitual criminals are individuals who repeatedly commit crimes and have a history of multiple convictions. They are often seen as persistent threats to public safety and may face stricter penalties due to their recurring offenses.
Q 19: _________________ applied a positivist approach in analyzing crimes.
A) Cesare Lombroso
B) R. K. Merton
C) Cesare Beccaria
D) None of these
Cesare Lombroso applied a positivist approach to criminology, emphasizing scientific methods to understand criminal behavior. He believed in biological determinism, suggesting that criminal tendencies could be inherited and identified through physical characteristics.
Q 20: _____________ describes repeat offending by those who have been in prison.
A) Repetition
B) Receprocal
C) Recidivism
D) None of these
Recidivism refers to the tendency of a convicted criminal to re-offend after being released from prison. High recidivism rates indicate flaws in rehabilitation programs or a lack of post-release support systems. Addressing recidivism often requires comprehensive reintegration strategies.