Exam 8: Documentary Evidence, Models, Maps, and Diagrams

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

When an investigator finds a computer while serving a search warrant, the computer should be turned on and an inventory made of all files on the computer's hard drive.

(True/False)
4.8/5
(31)

For computer generated animation depicting the crime to be admissible at trial:

(Multiple Choice)
4.9/5
(38)

In legal documents, the term "writing" refers to:

(Multiple Choice)
4.8/5
(34)

The "original" is the document itself and any copies the person making the document intended to have the same effect as the original.

(True/False)
5.0/5
(37)

All documents stored on computers used by a business are covered by the Business Records Exception to the Hearsay Rule if a technician testifies that the system has not been "hacked.".

(True/False)
4.8/5
(42)

Who must be called to testify in order to introduce a report at trial under the Business Records Exception to the Hearsay Rule?

(Multiple Choice)
4.8/5
(41)

Computer-generated animation is admissible in court only if it is based on photographs of the scene in question.

(True/False)
4.8/5
(44)

A forensic examination of a computer can:

(Multiple Choice)
4.8/5
(37)

Which of the following would be considered public records?

(Multiple Choice)
4.9/5
(36)

If lay witnesses authenticate a handwritten document, the opposing side will NOT be allowed to call a forensic document examiner to establish that the document is a forgery.

(True/False)
4.8/5
(35)

A notarized document is self-authenticating if:

(Multiple Choice)
4.9/5
(37)

Bob is on trial for the murder of Carl. The prosecution is basing its case on the theory that Bob forged Carl's will, which revoked Carl's original will and made Bob the sole beneficiary, before killing Carl. Carl's original will was witnessed by Donna and Eve. The prosecution wants to introduce several checks drawn on Carl's personal checking account that bear Carl's signature to show that the signature on the allegedly forged  will was not made by Carl. How can these signatures be authenticated?

(Multiple Choice)
4.8/5
(41)

Explain how the Business Records Exception to the Hearsay Rule. .

(Essay)
4.8/5
(41)

Bob is on trial for the murder of Carl. The prosecution is basing its case on the theory that Bob forged Carl's will, which revoked Carl's original will and made Bob the sole beneficiary, before killing Carl. Carl's original will was witnessed by Donna and Eve. The prosecution wants to introduce the original will as evidence of Carl's handwriting. Donna does not remember watching Carl sign the will because she works at a law office and witnesses the signing of wills on a daily basis. How can Donna's signature be authenticated?

(Multiple Choice)
4.7/5
(41)

When a computer was used by the suspect to commit a crime, a forensic examination of the computer can show:

(Multiple Choice)
4.7/5
(32)
Showing 41 - 55 of 55
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)