Law Aqa A2 Unit 3 Model Answer

In: Other Topics

Submitted By fayewhite
Words 336
Pages 2
June 2013 LAW UNIT 3 EXAM

Discuss the possible criminal liability of Niccy for the murder of Owen, and the possible criminal liability of Paul for the murder of Steve. (25 marks)

PART (A) ONLY:

The actus reus of murder is the unlawful killing of a reasonable person in being under the Queen’s peace and within the jurisdiction of the Crown Court, with malice aforethought, expressed or implied. In this case, the actus reus of murder is present, as she stabbed Owen unlawfully. Niccy is the factual cause of Owen’s death, as 'but for' her actions he wouldn’t have died - as seen in the case of White. She is also the legal cause because she was more than the minimal cause, as demonstrated in the case of Pagett.
The mens rea of murder is malice aforethought, which includes express malice - the intention to kill, or implied malice - intention to cause serious GBH. Niccy had the mens rea for murder, because she intended to kill Owen; she claimed he “must be eliminated”. She also had clear actus reus as she was the sole cause of his death. Therefore she could be liable for Owen's murder.

Paul could also be liable for the murder of Steve, as he had the clear actus reus to cause serious harm to Steve. The jury would have to decide whether Paul had the intention for murder, as it is a specific intent crime and the scenario states that Paul only intended to break Steve’s arm. The jury would be able to find the necessary intention if the consequences of Paul’s actions were virtually certain and that Paul knew this, as seen in Nedrick and Woolin. It is foreseeable that if you attack someone with a hammer there could be fatal results, and Paul would have known this, so it is likely that the jury would find the necessary intention. Therefore Paul has implied malice because he intended to cause GBH by wanting to break Steve’s arm. Therefore, Paul could be…...

Similar Documents

Sociology Aqa as Unit 01 Workbook

...WORKBOOK ANSWERS AQA AS Sociology Unit 1 Families and Households This Answers book provides some possible answers that might be given for the questions asked in the workbook. They are not exhaustive and other answers may well be acceptable, but they are intended as a guide to give teachers and students feedback. The responses for the longer essay-style questions are intended to give some idea about how the exam questions might be answered. Again, these are not the only ways to answer such questions but they can be treated as one way of approaching questions of these types. Topic 1 Functionalist and New Right views of the family How have functionalist and New Right thinkers explained family life and the relationship between families and social change? 1 The organic analogy refers to the extended comparison made by functionalists between the human or other living body and society, with the organs of the body equivalent to institutions and structures in society. 2 Primary socialisation refers to the first and most important stage of the socialisation process by which young children absorb the norms and values of their culture, mainly from their parents. Note: make sure your answer explains both ‘primary’ and ‘socialisation’. 3 One way in which the nuclear family is more suited than other types of family to modern industrial society is that it allows for geographical mobility; it is easier to move a nuclear family to a new area for, say, a...

Words: 7450 - Pages: 30

Unit 3 Assignment 1 Networking Models Review

...Networking Models Review (Unit 3) 1. Which of the following is true about a TCP/IP network? B 2. Which of the following terms is not a common synonym for TCP/IP model? (Choose two answers.) C & D 3. Think generically about the idea of a networking standard, ignoring any particular standard or standards group. Which of the following is typically true of a standard? (Choose two answers.) A & C 4. Contrast an international standard as compared to a de facto standard. (Choose two answers.) B & D 5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.) C & D 6. The TCP/IP model refers to standards other than those the IETF defines in RFCs. Which of these standards groups is typically the source of external LAN standards? (Choose two answers.) B & C 7. Which of the following is not a typical reason for a group of ten companies to start a vendor group, for the purpose of pushing a new networking technology? D 8. The TCP/IP and OSI models have some obvious differences, like the number of layers. Think about the more commonly used version of the TCP/IP model discussed in this chapter, and then think about how to talk about TCP/IP using OSI terms. Which of the following is a correctly phrased statement for how to use OSI terminology? B 9. Historically, which of the following models were the earliest models used in corporate networks? A 10. Which of......

Words: 599 - Pages: 3

Unit 3 Discussion 1: Access Control Models

...Shingles is a small construction company consisting of 12 computers that have internet access. Discretionary Access Controls should be used in this scenario because the company is small and not in need of high security environment. This solution is the simplest to maintain and monitor for a small business. 2. Top Ads is a small advertising company consisting of 12 computers that have internet access. All employees communicate using smart phones. Mandatory Access Controls should be used in this scenario because the employees primarily communicate using smart phones, which opens up a security risk. Mandatory Access Controls are a step up stronger than Discretionary Access Controls, but are still relatively simple to monitor for a small business. 3. NetSecIT is a multinational IT services company consisting of 120,000 computers that have internet access and 45,000 servers. All employees communicate using smart phones and e-mail. Many employees work from home and travel extensively. Role Based Access Control should be used in this scenario because this is a large company with employees who travel and work from home. The roles should be controlled by a Security Administrator who could provide different levels of security to individual users. There would be some overhead in startup to get up and running but once in place this should be easy to manage. 4. Backordered Parts is a defense contractor that builds communication parts for the military. All employees communicate using......

Words: 407 - Pages: 2

Nt 1420 Unit 3 Answers

...Short Answers Unit 3 1. WHAT TWO THINGS MUST YOU NORMALLY SPECIFY IN A VARIABLE DECLARATION? The variable’s name The variable’s data type 2. WHAT VALUE IS STORED IN UNINITIALIZED VARIABLES? =0 Research Unit 3 1. WHAT IS REVERSE ENGINEERING? The process of taking a piece of software or hardware an analyzing its functions an information flow and then translating those processes. 2. WHAT ARE THE ADVANTAGES AND DISADVANTAGES TO USE REVERSE ENGINEERING TO DISCOVER THE LOGICS OF A SOFTWARE PROGRAM? Advantages- one can repair certain bugs, see how a program operates, and improve the operation of the program. Disadvantages- certain other bugs may be introduced during the process 3. FIND ANY ONE TOOL AVAILABLE TO PERFORM REVERSE ENGINEERING OF SOFTWARE PROGRAMS. LIST AT LEAST FIVE FEATURES OF THAT TOOL. GDB-GNU DEBUGGER  Allows taking a program and breaking it down to the assembly language level  Debug your programs  Examine your programs  Command line based tool which makes it easier to issue different parameters  Debug the kernel of any operating system UNIT 3: ALGORITHM WORKBENCH 3. SET B= (2 + A) SET A= (B + 4) SET B=( A/ 3.14) SET A= (8-B) 4. A. Set result = x + y 12 = 4 +8 B. Set result = z * 2 4 = 2 * 2 C. Set result = y / x 2 = 8 / 4 D. Set result = y – z 6 = 8 – 2 5. Dim cost1 As Double = 0 6. Dim cost1 As Integer = 0 7. Dim cost1 As Integer = 27 8. Total = 10 + 14 9. due......

Words: 257 - Pages: 2

Biology A2 Aqa Note

...A2 level Biology notes By bssjonny Contents A2 level Biology notes 1 Contents 2 Section 1.1 – Populations and ecosystems 2 Section 1.2 – Investigating Populations 3 Section 1.3 – Variation in population size 4 Section 1.4 / 1.5 – Competition / Predation 5 Section 1.6 – Human Populations 6 Section 2.1 – Energy and ATP 8 Section 3.1 + 3.2 – Photosynthesis and the light dependent reaction 10 Section 3.3 – The light – independent reaction 11 Section 3.4 – Factors affecting photosynthesis 12 Section 4.1 – Glycolysis 13 Section 4.2 – Link reaction + Kreb cycle 14 Section 4.3 – Electron transport chain 15 Section 4.4 – Anaerobic respiration 16 Section 5.1 – Food chains and food webs 17 Section 5.2 – Energy transfer between trophic levels 18 Section 5.3 – Ecological pyramids 19 Section 5.4 – Agricultural ecosystems 20 Section 5.5 – Chemical and biological control of agricultural pests 21 Section 5.6 – Intensive rearing of domestic livestock 22 Section 6.1 – The carbon cycle 23 Section 6.2 - The greenhouse effect and global warming 24 Section 6.3 – The nitrogen cycle 25 Section 6.4 – Use of natural and artificial fertilisers 26 Section 6.5 – Environmental consequences of using fertilisers 27 Section 7.1 – Populations and Ecosystems 28 Section 7.2 – Conservation of habitats 29 Section 8.1 – Studying......

Words: 8554 - Pages: 35

A2 Cold War, Unit 3

...Ideologies : Communism v. capitalism Capitalism: production of goods and distribution is dependent on private capital with a view to making profit; capitalist economies run by individuals rather than by state Communism: hostile to capitalism, which exploits workers; ideally all property, businesses & industry should be state-owned, ‘each gives according to their ability to those according to their need’ Economics: Marshall Plan (1947) – provision of fuel, raw materials, goods, loans, food, ……………..machinery advisers US exploited it financial power to export Western values – dollar imperialism 1948-52, US Congress voted nearly $13bn economic aid to Europe Trade war with Communist countries, e.g. Cuba Military tensions: Korean War (1950-3), Vietnam (early 1960s -1973); US …………military …………..build-up, e.g. 1960 2.4 US military personnel around world; …………1959, 1,500 ………….military bases in 31 countries Treaties: NATO (1949) – North Atlantic Treaty Organisation SEATO (1954)– South East Asia Treaty Organisation Warsaw Pact (1955)– military defensive pact amongst eastern European nations COMECON (1949)– Council for Mutual Economic Assistance Propaganda: European Recovery Program – propaganda as much as economic ………..exercise Benefits of Marshall Plan advertised Italy became a focus of economic rebuilding after WWII - ‘Operation Bambi’ used minstrels, puppet shows and film Espionage: CIA (1947) – founded to co-ordinate information gathering on ………USSR and......

Words: 1286 - Pages: 6

Unit 3 Business Paper Unit 3 Aqa

...paying more for raw materials since so desperate to supply so paying more or paying workers over time to meet orders. However if the company decides to sell their British products to the Chinese, this would be considered as market development. With Andrews idea of entering new geographical markets will mean that they will be able to diverse their products and be able to suit it for different types of markets meaning Andrew will be able to provide the needs and wants of these small markets to get his target market area in China since this is a new market they have not been into before. Another reason why they should not develop new products for the Chinese market but offer the Chinese the British products is because the business has secured a 3% market share in the Chinese market and have products already existing. The market share has been achieved because of the business’s high quality British brand, which the business is hoping to achieve 5% market share from the advertising campaign in China. The budget which they had formed for marketing shows that the budget has increased from 2% to 20% showing that it is obviously effectively working and they can see more potential with growth for the long term for business shown in Appendix C of 2011-2015 with market growth in China rising to 10%. However the business will have to diverse their products since they are entering a new market. However with their research they are able to determine a rise in growth in the Chinese......

Words: 1065 - Pages: 5

Unit 3 Discussion 1: Access Control Models

...Unit 3 Discussion 1: Access Control Models Scenario 1: (DAC) Discretionary Access Control. Being that the business is small and not in need of higher security measures, it would be the easiest to maintain and monitor for a small business. Scenario 2: (MAC) Mandatory Access Control. The employees primarily communicate using smartphones; which proves as a possible security risk. MAC is stronger than DAC but, still easily monitored for a small business; which makes this the top choice for Top Ads. Scenario 3: (RBAC) Role Based Access Control. With the company being as large as it is and the employees traveling and/or working from home, the roles set by a Security Administrator would be the most secure and efficient way of providing different levels of clearance to individual users. It would take time to start from nothing but, once the security measures are in place it would be easy to monitor and to manage. Scenario 4: Content-Dependent Access Control. Since everything that the company does depends on the individual material being manufactured the above Access Control type should be apparent. Giving permissions by what is contained in each individual file is more costly but, a lot more secure. It also allows the company to monitor the data sent less as each document is given its own set of roles. Scenario 5: (RBAC) Role Based Access Control. With RBAC in place the security measures would be assigned to each user and monitored by the security administrator(s). Using this......

Words: 295 - Pages: 2

Psychology A2 Aqa

...attitudes to food will affect their children's attitudes to them. Children also learn what to eat by watching their parents. This can be explained by social learning theory. This occurs when children observe their parents eating. In this sense, the parents act as eating role models. Observing parents getting rewarded by enjoying eating certain foods, the children learn to imitate these food preferences as they expect to receive similar rewards by doing so. This theory would therefore argue that children should show similar preferences as their parents having learned these preferences from them through a process of vicarious learning. There is a great deal of research support the SLT. For example, Brown and Ogden found consistent correlations between parents and their children in terms of snack food intake, eating motivations and body dissatisfaction. These findings show that observation in childhood in the home is a significant factor in determining eating behaviour and so parental attitudes and behaviour is therefore an essential part of the social learning process of food choice and eating behaviour. However, it can be argued that the majority of eating behaviour can be learned alternative role models than just our parents. Meyer and Gast surveyed 10 - 12 year old girls and boys, and found a significant positive correlation between peer influence and disordered eating, especially when the ‘likeability’ of the peer was taken into account. This means that children......

Words: 6669 - Pages: 27

Law Aqa

...observations * Visit to a prison * Visit to young offenders’ institution * Visit to probation service facility * After completion can start to sit in court * New magistrate then develops in role * After a year receives consolidation training * Normally for two days equivalent * Includes training on law procedures and skills * Best way to learn is from experience in court * All new magistrates given a mentor - especially trained magistrates * In first year have at least 6 sessions with mentor * After 2 years opportunities to specialize * Youth court or Family Proceedings Court * Can undertake training to become chairman of bench * Also new legislation training or sentencing policy * Materials include: Adult Bench Book, Family Bench Book, Youth Bench Book & a New Magistrates Workbook Past exam question * January 2013 * 1 7 Outline the qualifications for appointment as a lay magistrate. Briefly explain the training undertaken by a lay magistrate following appointment. (10 marks) * We are going to answer the second half of this question * Understand how an appointed lay magistrate is trained (grade E) * Explain the different levels of training and why each is appropriate (grade C) * Justify how effective the training is for lay magistrates (grade A) What content did they guide you to cover? * Potential Content * (A) Brief......

Words: 394 - Pages: 2

Unit 3 Discussion 1: Access Control Models

...Unit 3 Assignment 1: Remote Access Control Policy Definition Learning Objectives and Outcomes * You will learn how to design a remote access control policy definition for an IT infrastructure. Assignment Requirements Richman Investments is an investment and consulting firm. The company wants to expand its business operations both in the U.S. and in foreign countries. It intends to eventually have 10,000 employees in 20 countries. The Richman corporate headquarters is located in Phoenix, Arizona. Currently, there are eight branch offices in: * Atlanta, Georgia * Chicago, Illinois * Cincinnati, Ohio * Denver, Colorado * Los Angeles, California * Montreal, Canada * New York City, New York * Washington, D.C. The North American offices have a total of 5,000 employees who use desktops, mobile computers, and wireless devices. The Phoenix office has an Internet connection to all remote offices because redundancy is extremely important to the company. There are several sensitive applications that all offices use. The management from each office share application information that is hosted at the corporate office. Design a remote access control policy for Richman using the appropriate access controls for systems, applications, and data access. Include the design and justification for using the selected access controls for systems, applications, and data access. Required Resources * None Submission Requirements ...

Words: 277 - Pages: 2

As Law Paer 2 Model Answers

...AS LAW MODEL ANSWERS Define the actus reus of a crime (7 mins) The actus reus is the physical and external part of a crime. It means the guilty act. The actus reus must be a positive and voluntary act as illustrated in the case of Hill vs Baxter. In this case the judge said that driving whilst fighting off a swarm of bees would prevent the act from being voluntary, therefore preventing the actus reus from being satisfied. If the actus reus of a crime is not satisfied the defendant can never be found guilty. However there are six situations where a failure to act (omission) will satisfy the actus reus of a crime. These are exceptions to the rule in Hill v Baxter that the act committed must be positive. A person will have a duty to act if they assume the duty voluntarily, as illustrated in Stone v Dobinson, where the defendants failed to provide adequate care for their aunt when they said they would look after her. Pittwood illustrates that a contract can require a person to act, in this case the defendant failed to shut a gate, causing death, which he was required to under contract. In Miller the defendant created a dangerous situation and satisfied the actus reus of a crime as he did not take any steps to extinguish a fire which he created. In Dytham the policeman held an official position, which required him to act, therefore he was guilty of misconduct when he failed to act while someone got kicked to death. Gibbins v Proctor illustrates that parents have a......

Words: 1220 - Pages: 5

Ged 260 Criminology Unit 3 Examination Answers

...GED 260 Criminology Unit 3 Examination Answers Follow Below Link to Download Tutorial http://homeworklance.com/downloads/ged-260-criminology-unit-3-examination-answers/ For More Information Visit Our Website ( http://homeworklance.com/ ) Email us At: Support@homeworklance.com or lancehomework@gmail.com 1) Which of the following is not one of the ideas contributed to the criminologicalliterature by labeling theory? 1. A) Deviant individuals achieve their status by virtue of social definition. 2. B) Deviance is the consequence of a quality inherent in human activity. 3. C) Labeling by society tends to perpetuate crime. 4. D) Negative self-images follow from processing by the formal criminal justicesystem. 2) The dramaturgical perspective was developed by 1. A) Ronald Akers. 2. B) Edwin Lemert. 3. C) Erving Goffman. 4. D) Howard Becker. 3) Elder’s principle of __________ refers to the fact that the developmental impact of a succession of life transitions is contingent on when in a person’s life-they occur. 1. A) historical time and place 2. B) linked lives 3. C) timing in lives 4. D) human agency 4) According to Moffit, a __________ results when adolescents begin to desireautonomy but are prevented from achieving it because of preexisting social expectations. 1. A) moral enterprise 2. B) social bond 3. C) maturity gap 4. D) control ratio 5) Lawrence E. Cohen and Richard Machelek pioneered the __________ theory. 1. A) delinquent......

Words: 980 - Pages: 4

Ged 260 Criminology Unit 3 Examination Answers

...GED 260 Criminology Unit 3 Examination Answers Follow Below Link to Download Tutorial http://homeworklance.com/downloads/ged-260-criminology-unit-3-examination-answers/ For More Information Visit Our Website ( http://homeworklance.com/ ) Email us At: Support@homeworklance.com or lancehomework@gmail.com 1) Which of the following is not one of the ideas contributed to the criminologicalliterature by labeling theory? 1. A) Deviant individuals achieve their status by virtue of social definition. 2. B) Deviance is the consequence of a quality inherent in human activity. 3. C) Labeling by society tends to perpetuate crime. 4. D) Negative self-images follow from processing by the formal criminal justicesystem. 2) The dramaturgical perspective was developed by 1. A) Ronald Akers. 2. B) Edwin Lemert. 3. C) Erving Goffman. 4. D) Howard Becker. 3) Elder’s principle of __________ refers to the fact that the developmental impact of a succession of life transitions is contingent on when in a person’s life-they occur. 1. A) historical time and place 2. B) linked lives 3. C) timing in lives 4. D) human agency 4) According to Moffit, a __________ results when adolescents begin to desireautonomy but are prevented from achieving it because of preexisting social expectations. 1. A) moral enterprise 2. B) social bond 3. C) maturity gap 4. D) control ratio 5) Lawrence E. Cohen and Richard Machelek pioneered the __________ theory. 1. A)......

Words: 980 - Pages: 4

Ged 260 Criminology Unit 3 Examination Answers

...GED 260 Criminology Unit 3 Examination Answers Follow Below Link to Download Tutorial http://homeworklance.com/downloads/ged-260-criminology-unit-3-examination-answers/ For More Information Visit Our Website ( http://homeworklance.com/ ) Email us At: Support@homeworklance.com or lancehomework@gmail.com 1) Which of the following is not one of the ideas contributed to the criminologicalliterature by labeling theory? 1. A) Deviant individuals achieve their status by virtue of social definition. 2. B) Deviance is the consequence of a quality inherent in human activity. 3. C) Labeling by society tends to perpetuate crime. 4. D) Negative self-images follow from processing by the formal criminal justicesystem. 2) The dramaturgical perspective was developed by 1. A) Ronald Akers. 2. B) Edwin Lemert. 3. C) Erving Goffman. 4. D) Howard Becker. 3) Elder’s principle of __________ refers to the fact that the developmental impact of a succession of life transitions is contingent on when in a person’s life-they occur. 1. A) historical time and place 2. B) linked lives 3. C) timing in lives 4. D) human agency 4) According to Moffit, a __________ results when adolescents begin to desireautonomy but are prevented from achieving it because of preexisting social expectations. 1. A) moral enterprise 2. B) social bond 3. C) maturity gap 4. D) control ratio 5) Lawrence E. Cohen and Richard Machelek pioneered the __________ theory. 1. A) delinquent......

Words: 980 - Pages: 4