Deck 5: Laboratory and Technical Services

Full screen (f)
exit full mode
Question
Each nucleated cell contains the full complement of an individuals DNA, called the genome that is unvarying from cell to cell.
Use Space or
up arrow
down arrow
to flip the card.
Question
The process of deciphering codes and ciphers used by criminals to protect the security of their messages is known as: _____.

A) spectrography
B) chromatography
C) cryptography
D) logic of set theory analysis
Question
Chromatography is a method used in the identification of crystalline solids.
Question
Most states are now building DNA databases by collecting and testing DNA samples from individuals convicted of sexual assaults and often homicide. The FBI is supporting these databases by linking them together into a national database known as:

A) NCIC (National Crime Information Center).
B) CODIS (Combined DNA Index System.)
C) NDDB (National DNA Data Base).
D) DAWN (DNA Awareness Network).
Question
A technique of personal identification that in the future may challenge fingerprints as the most positive means of physical identification is: _____.

A) voiceprint identification
B) DNA analysis
C) spectrography
D) chromatography
Question
Identification in criminalistics is aligned with the logic of _____.

A) set theory
B) legal science
C) criminology
D) evolutionary theory
Question
The crime lab cannot determine with any degree of certainty if a weapon was used in other crimes.
Question
Ultrasonic cavitation involves the graphic identification of human voices.
Question
A spectrograph is used in the identification of firearms.
Question
The distinctive signature of handguns and other metallic weapons is developed through the use of the neutron activation analysis technique.
Question
The person-to-person differences within a particular segment of DNA sequence are known as: _____.

A) genomes
B) alleles
C) loci
D) nucleated cells
Question
Argon-ion lasers are widely used in the detection of latent fingerprints.
Question
The laboratory process which a criminalist might use to restore obliterated serial numbers on firearms and other metal objects is called what?

A) lasers
B) ultrasonic cavitation
C) trace metal detection
D) X-ray crystallography
Question
The informational output of a crime laboratory depends upon what?

A) expertise of the laboratory staff
B) physical evidence collected at the crime scene
C) location of the laboratory in relation to major universities
D) number and kinds of tests conducted
Question
Degraded, contaminated, and small quantities of DNA can be successfully analyzed in the crime laboratory due to which laboratory process?

A) loci development
B) alleles reagent
C) genome splicing
D) polymerase chain reaction
Question
To make the determination of whether or not a person has recently fired a handgun the criminalist would subject hand swabs from the subject to which laboratory examination?

A) comparison microscope
B) spectrographic analysis
C) X-ray crystallography
D) neutron activation analysis
Question
Neutron activation analysis is a technique used to analyzed gunshot residue.
Question
In making the determination that bullets, shells, or cartridge cases were fired from a specific weapon, the criminalist would use which piece of laboratory equipment?

A) comparison microscope
B) spectrographic analysis
C) X-ray crystallography
D) neutron activation analysis
Question
The cipher in which one symbol or letter stands for another symbol or letter is known as a transposition cipher.
Question
The FBI has selected 13 loci to serve as a standard battery of core loci for DNA analysis.
Question
The problem of DNA material being contaminated, degraded, or of insufficient quantity can be surmounted by _____ chain reaction.
Question
_____ is a method of separating compounds to identify the components.
Question
A _____ microscope is used in ballistic examinations.
Question
The deciphering of ciphers and codes that are used to protect the security of messages is known as _____.
Question
The most common cipher used by criminals is the _____ cipher.
Question
The FBI is supporting the linking of state DNA databases together to form a national database known as _____.
Question
Person-to-person differences within a segment of DNA are referred to as _____.
Question
_____ is the profession and scientific discipline of applying the natural sciences in matters of law.
Question
Neutron activation analysis is used in the study of _____ residues.
Question
_____ is used to restore obliterated serial numbers on firearms.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/30
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Laboratory and Technical Services
1
Each nucleated cell contains the full complement of an individuals DNA, called the genome that is unvarying from cell to cell.
True
2
The process of deciphering codes and ciphers used by criminals to protect the security of their messages is known as: _____.

A) spectrography
B) chromatography
C) cryptography
D) logic of set theory analysis
C
3
Chromatography is a method used in the identification of crystalline solids.
False
4
Most states are now building DNA databases by collecting and testing DNA samples from individuals convicted of sexual assaults and often homicide. The FBI is supporting these databases by linking them together into a national database known as:

A) NCIC (National Crime Information Center).
B) CODIS (Combined DNA Index System.)
C) NDDB (National DNA Data Base).
D) DAWN (DNA Awareness Network).
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
5
A technique of personal identification that in the future may challenge fingerprints as the most positive means of physical identification is: _____.

A) voiceprint identification
B) DNA analysis
C) spectrography
D) chromatography
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
6
Identification in criminalistics is aligned with the logic of _____.

A) set theory
B) legal science
C) criminology
D) evolutionary theory
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
7
The crime lab cannot determine with any degree of certainty if a weapon was used in other crimes.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
8
Ultrasonic cavitation involves the graphic identification of human voices.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
9
A spectrograph is used in the identification of firearms.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
10
The distinctive signature of handguns and other metallic weapons is developed through the use of the neutron activation analysis technique.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
11
The person-to-person differences within a particular segment of DNA sequence are known as: _____.

A) genomes
B) alleles
C) loci
D) nucleated cells
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
12
Argon-ion lasers are widely used in the detection of latent fingerprints.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
13
The laboratory process which a criminalist might use to restore obliterated serial numbers on firearms and other metal objects is called what?

A) lasers
B) ultrasonic cavitation
C) trace metal detection
D) X-ray crystallography
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
14
The informational output of a crime laboratory depends upon what?

A) expertise of the laboratory staff
B) physical evidence collected at the crime scene
C) location of the laboratory in relation to major universities
D) number and kinds of tests conducted
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
15
Degraded, contaminated, and small quantities of DNA can be successfully analyzed in the crime laboratory due to which laboratory process?

A) loci development
B) alleles reagent
C) genome splicing
D) polymerase chain reaction
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
16
To make the determination of whether or not a person has recently fired a handgun the criminalist would subject hand swabs from the subject to which laboratory examination?

A) comparison microscope
B) spectrographic analysis
C) X-ray crystallography
D) neutron activation analysis
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
17
Neutron activation analysis is a technique used to analyzed gunshot residue.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
18
In making the determination that bullets, shells, or cartridge cases were fired from a specific weapon, the criminalist would use which piece of laboratory equipment?

A) comparison microscope
B) spectrographic analysis
C) X-ray crystallography
D) neutron activation analysis
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
19
The cipher in which one symbol or letter stands for another symbol or letter is known as a transposition cipher.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
20
The FBI has selected 13 loci to serve as a standard battery of core loci for DNA analysis.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
21
The problem of DNA material being contaminated, degraded, or of insufficient quantity can be surmounted by _____ chain reaction.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
22
_____ is a method of separating compounds to identify the components.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
23
A _____ microscope is used in ballistic examinations.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
24
The deciphering of ciphers and codes that are used to protect the security of messages is known as _____.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
25
The most common cipher used by criminals is the _____ cipher.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
26
The FBI is supporting the linking of state DNA databases together to form a national database known as _____.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
27
Person-to-person differences within a segment of DNA are referred to as _____.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
28
_____ is the profession and scientific discipline of applying the natural sciences in matters of law.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
29
Neutron activation analysis is used in the study of _____ residues.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
30
_____ is used to restore obliterated serial numbers on firearms.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 30 flashcards in this deck.