Exam 19: Computers and Technological Crime
Exam 1: The Role of the Investigator22 Questions
Exam 2: Physical Evidence: Development, Interpretation, Investigative Value23 Questions
Exam 3: The Crime Scene25 Questions
Exam 4: Managing Criminal Investigations20 Questions
Exam 5: Records and Files23 Questions
Exam 6: Eyewitness Identification20 Questions
Exam 7: Victims, Witnesses, and Human Resources22 Questions
Exam 8: Surveillance25 Questions
Exam 9: Interrogation of Suspects and Hostile Witnesses26 Questions
Exam 10: Reconstructing the Past: Methods, Evidence, Examples24 Questions
Exam 11: Crime and Constitutional Law25 Questions
Exam 12: Evidence and Effective Testimony22 Questions
Exam 13: Homicide25 Questions
Exam 14: Robbery20 Questions
Exam 15: Rape and Other Sex Crimes24 Questions
Exam 16: Burglary24 Questions
Exam 17: Enterprise Crime: Organized, Economic, and White-Collar Crime22 Questions
Exam 18: Arson and Explosives25 Questions
Exam 19: Computers and Technological Crime25 Questions
Exam 20: Increasing Threats and Emerging Crime21 Questions
Exam 21: Terrorism and Urban Disorder Glossary22 Questions
Select questions type
At the heart of virtually all information technology lies a computer system or ___________.
(Multiple Choice)
4.8/5
(47)
According to the text, a criminal investigator confronted with a crime scene involving computers should protect the area and call for a component service technician.
(True/False)
4.8/5
(34)
Which of the following is not one of the more common types of crime using information technology?
(Multiple Choice)
5.0/5
(40)
A number of federal agencies monitor web sites of suspected violent groups, primarily as a means of keeping track of:
(Multiple Choice)
4.8/5
(29)
If an activated computer is a part of the criminal investigation, it should be immediately turned off to prevent any software from destroying the data on the hard drive.
(True/False)
4.9/5
(35)
Showing 21 - 25 of 25
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)