Exam 13: Cyber Evidence and Demonstrative Evidence in the Pursuit of Justice
Exam 1: The Evolution of the Law of Criminal Evidence58 Questions
Exam 2: Federalism, Court Systems, and the Criminal Justice Process69 Questions
Exam 3: Forms of Evidence62 Questions
Exam 4: Search and Seizure and the Doctrine of Justification58 Questions
Exam 5: The Exclusionary Rule and the Fourth Amendment62 Questions
Exam 6: Warrantless Searches60 Questions
Exam 7: Confessions56 Questions
Exam 8: Qualifications and Impeachment of Witnesses55 Questions
Exam 9: Examination of Witnesses59 Questions
Exam 10: Hearsay58 Questions
Exam 11: Privileged Communications60 Questions
Exam 12: Documentary and Scientific Evidence59 Questions
Exam 13: Cyber Evidence and Demonstrative Evidence in the Pursuit of Justice59 Questions
Select questions type
Match up the terminology to the definitions :
-Cybercrime
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
G
Match up the terminology to the definitions :
-Cyber evidence
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
C
The U.S. Patriot Act in the fall of 2001heralded significant changes to the manner in which electronic evidence was collected.
Free
(True/False)
4.9/5
(34)
Correct Answer:
True
The primary advantage to computer-generated maps is the relative ease for alteration and the potential for customization of evidence.
(True/False)
4.9/5
(43)
Under federal law, a "minor" is any individual under the age of________.
(Short Answer)
4.8/5
(34)
The introduction of the U.S. Patriot Act in the fall of ____________ heralded significant changes to the manner in which electronic evidence was collected.
(Short Answer)
4.9/5
(29)
Demonstrative evidence may not be viewed as a substitute for real evidence in matters in which illustration or visual presentation is necessary for clarification.
(True/False)
4.8/5
(27)
Networked computers are not immune from consent searches, as even system administrators may not have access to all files.
(True/False)
4.8/5
(46)
Police executives, like the general public, often perceive computer crime and the individuals associated with same as relatively harmless and not an immediate threat to their community.
(True/False)
4.8/5
(35)
Prior to passage of the Federal Computer System Protection Act, federal statues within what Title of the United States Code was used by law enforcement.
(Multiple Choice)
4.8/5
(36)
In the late 70s it was realized that there was a need for computer-specific statues. Discuss some of the Acts and statutes created to address computer related crime.
(Essay)
4.7/5
(31)
The vast majority of Fortune 500 companies have been _____________ compromised to the tune of over $10 billion a year.
(Short Answer)
4.8/5
(37)
Both private and public entities are reluctant to disclose their victimization because:
(Multiple Choice)
4.8/5
(34)
Computer _________ is simply a graphic representation of a static object, like a knife or gun.
(Short Answer)
4.7/5
(36)
Match up the terminology to the definitions :
-Problem prosecuting computer crime
(Multiple Choice)
4.9/5
(34)
Which of the following Act addresses "sneak and peak" warrants?
(Multiple Choice)
4.8/5
(48)
Photographs and recordings may only be admitted in cases in which the particular item in question satisfies the parameters articulated in the "Best Evidence rule."
(True/False)
4.9/5
(27)
The admissibility of demonstrative evidence is contingent upon a variety of factors including all but one of the following?
(Multiple Choice)
4.8/5
(31)
Showing 1 - 20 of 59
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)