Exam 8: Documentary Evidence, Models, Maps, and Diagrams
Exam 1: Introduction55 Questions
Exam 2: The Role of the Courts55 Questions
Exam 3: The Adjudication Process55 Questions
Exam 4: Types of Evidence55 Questions
Exam 5: Direct and Circumstantial Evidence55 Questions
Exam 6: Witnesses55 Questions
Exam 7: Crime Scene Evidence and Experiments55 Questions
Exam 8: Documentary Evidence, Models, Maps, and Diagrams55 Questions
Exam 9: Hearsay and Its Exceptions55 Questions
Exam 10: Privileged Communications55 Questions
Exam 11: Developing Law of Search and Seizure55 Questions
Exam 12: Field Interviews, Arrests and Jail Searches55 Questions
Exam 13: Plain View, Consent, Vehicle, and Administrative Searches55 Questions
Exam 14: USA Patriot Act, Foreign Intelligence, and Other Types of Electronic Surveillance Covered by Federal Law55 Questions
Exam 15: Self-Incrimination55 Questions
Exam 16: Identification Procedures55 Questions
Exam 17: Preparing the Case for Court55 Questions
Select questions type
When an investigator finds a computer while serving a search warrant, the computer should be turned on and an inventory made of all files on the computer's hard drive.
(True/False)
4.8/5
(31)
For computer generated animation depicting the crime to be admissible at trial:
(Multiple Choice)
4.9/5
(38)
The "original" is the document itself and any copies the person making the document intended to have the same effect as the original.
(True/False)
5.0/5
(37)
All documents stored on computers used by a business are covered by the Business Records Exception to the Hearsay Rule if a technician testifies that the system has not been "hacked.".
(True/False)
4.8/5
(42)
Who must be called to testify in order to introduce a report at trial under the Business Records Exception to the Hearsay Rule?
(Multiple Choice)
4.8/5
(41)
Computer-generated animation is admissible in court only if it is based on photographs of the scene in question.
(True/False)
4.8/5
(44)
If lay witnesses authenticate a handwritten document, the opposing side will NOT be allowed to call a forensic document examiner to establish that the document is a forgery.
(True/False)
4.8/5
(35)
Bob is on trial for the murder of Carl. The prosecution is basing its case on the theory that Bob forged Carl's will, which revoked Carl's original will and made Bob the sole beneficiary, before killing Carl. Carl's original will was witnessed by Donna and Eve. The prosecution wants to introduce several checks drawn on Carl's personal checking account that bear Carl's signature to show that the signature on the allegedly forged will was not made by Carl. How can these signatures be authenticated?
(Multiple Choice)
4.8/5
(41)
Bob is on trial for the murder of Carl. The prosecution is basing its case on the theory that Bob forged Carl's will, which revoked Carl's original will and made Bob the sole beneficiary, before killing Carl. Carl's original will was witnessed by Donna and Eve. The prosecution wants to introduce the original will as evidence of Carl's handwriting. Donna does not remember watching Carl sign the will because she works at a law office and witnesses the signing of wills on a daily basis. How can Donna's signature be authenticated?
(Multiple Choice)
4.7/5
(41)
When a computer was used by the suspect to commit a crime, a forensic examination of the computer can show:
(Multiple Choice)
4.7/5
(32)
Showing 41 - 55 of 55
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)