1.) One might expect a forensic anthropologist to: a. Analyze human bones b. Look for kidnapped children c. Dig for historical artifacts d. Estimate a victim’s age and where he/she lived e. Both a and d 2.) Firearms Identification includes: a. ID of fired bullets b. ID cartridge cases before and after firing c. Ballistics d. Impressed Action marks e. All of the above 3.) What statement is true? a. No two firearms produce the same unique marks on fired bullets and cartridge cases. b. Study of bullets and cartridges can on tell you the type of gun it came from not the specific gun. c. Firearms normally change over time so the firearm test needs to be completed with in a year or so of the crime. d. All firearms leave consistent reproducible marks. e. Fingerprinting is more dependable and powerful in the identification of firearms. 4.) What country has the greatest firearms death rate, especially among the youth? a. Finland b. Great Britain c. United States d. Mexico e. Columbia 5.) In the FBI’s investigation of a missing person’s case, one major piece of evidence was a handwritten note on a piece of notebook paper with a brown-ish smudge. What unit(s) of the lab would have processed that evidence? a. photography b. biology and serology c. document examiners d. fingerprinting e. B,C and D 6.) The basic work of all forensic scientists is to a. collect, preserve and present evidence b. provide lots of clues to help solve crimes c. reconstruct and invent evidence relating to crimes d. be star witnesses in court cases for criminals e. take notes and pictures at the crime scene 7.) Criminals can use the internet to steal a. Games b. Information c. Spyware d. None of the above -- 8.) An expensive internet crime which sought attention more than money involved a. credit card theft b. plagiarism c. viruses and worms d. stealing private and secret files e. all of the above 9.) A network of computer used to launch spam or spyware is known as a. a bot b. phishing c. a worm d. spam e. all of the above 10.) When you receive an email asking for your personal data such as social security number, bank account numbers and passwords you might be the victim of a computer crime known as a. identity theft b. worms c. spam d. phishing e. two of the above 11.) A Trojan horse is a hidden computer program sent through email used to read your emails. True False -- -- -- 12.) The study of unusual deaths and sicknesses with no apparent cause would include what specific area of forensic medicine? a. cybrocrime investigation b. toxicology c. poisonology d. autopsy e. virology 13.) Pathology and toxicology would both be involved in the investigation of a. a suspected death from AIDS b. a death where an overdose of drugs is suspected c. a death due to severe burns d. an unidentifiable disease e. suffocation 14.) Toxicological analysis with gas chromatography would be important in a case a. relating to drugs b. relating to poisons c. unexplained death with no obvious wounds or disease d. suspected food or drug contaminations e. all of the above 15.) The toxicology (studies effects of drugs or poisons on the body) investigations would be take place in which case? a. the alteration of usual body temperatures after death due to drugs b. effects of smoking on the body c. automobile accident with a suspicion of drunken driving d. athletes who have unusual muscle mass e. all of the above 16.) The factors that create and maintain a fire are: a. oxygen and a fuel source b. heat c. power d. both a and b --- 17.) An arson investigator may ask about the color of the smoke: a. because the color of the smoke tells how dangerous the fire is b. to determine who set the fire c. to determine if something unusual was present to start the fire. d. because different color smoke can tell if someone was hurt in the fire -- 18.) When searching for blood evidence, it is important to use a. A partner b. A police dog c. a high intensity light source d. fingerprint powder -- 19.) Scaled photographs are: a. Photographs of evidence placed on a scale b. photographs with a ruler next to the evidence c. taken when size of evidence is important d. b and c e. all of the above 20.) Fingerprints are classified into which of the following groups: a. Loops, elipses and paralles b. Whorls, Loops and Arches c. Arches, Loops and Cycles d. Whorls, Circles and Arches e. None of the above 21.) Superimposition is a technique that is sometimes included among t
Programming & Design - 3 Answers
Random Answers, Critics, Comments, Opinions :
1 :
1. a 2. e too many questions to do edit: lol 1 is e, i didn't bother to finish reading the res of the answers
2 :
how dare you have the fucking nerve to ask this group to answer your fucking homework questions then have the added nerve to tell us we better not tell you to do your homework....DO YOUR HOMEWORK!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
3 :
1.) E 2.) E 3.) either A or E 4.) ....o.o...WHO'S SUPPOSED TO KNW THAT ONE!?!?! U.S.!?!? IDK?! 5.) E 6.) C 7.) B 8.) E 9.) i have a strong feeling its A 10.) E 11.) False 12.) D 13.) B 14.) E 15.) E 16.) D 17.) C 18.) D 19.) D 20.) E ....hmmm...these were some good questions....All I watch are forensic shows...so...you get a VERY VERY good idea of wat the people do and you get good ideas about all evidents.