English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

One might expect a forensic anthropologist to:
a. Analyze human bones
b. Look for kidnapped children
c. Dig for historical artifacts
d. Estimate a victim’s age and where he/she lived
e. Both a and d


2: Firearms Identification includes:
a. ID of fired bullets
b. ID cartridge cases before and after firing
c. Ballistics
d. Impressed Action marks
e. All of the above


3: What statement is true?
a. No two firearms produce the same unique marks on fired bullets and cartridge cases.
b. Study of bullets and cartridges can on tell you the type of gun it came from not the specific gun.
c. Firearms normally change over time so the firearm test needs to be completed with in a year or so of the crime.
d. All firearms leave consistent reproducible marks.
e. Fingerprinting is more dependable and powerful in the identification of firearms.


4: What country has the greatest firearms death rate, especially among the youth?
a. Finland
b. Great Britain
c. United States
d. Mexico
e. Columbia


5: In the FBI’s investigation of a missing person’s case, one major piece of evidence was a handwritten note on a piece of notebook paper with a brown-ish smudge. What unit(s) of the lab would have processed that evidence?
a. photography
b. biology and serology
c. document examiners
d. fingerprinting
e. B,C and D


6: The basic work of all forensic scientists is to
a. collect, preserve and present evidence
b. provide lots of clues to help solve crimes
c. reconstruct and invent evidence relating to crimes
d. be star witnesses in court cases for criminals
e. take notes and pictures at the crime scene


7: Criminals can use the internet to steal
a. Games
b. Information
c. Spyware
d. None of the above
--


8: An expensive internet crime which sought attention more than money involved
a. credit card theft
b. plagiarism
c. viruses and worms
d. stealing private and secret files
e. all of the above


9: A network of computer used to launch spam or spyware is known as
a. a bot
b. phishing
c. a worm
d. spam
e. all of the above


10: When you receive an email asking for your personal data such as social security number, bank account numbers and passwords you might be the victim of a computer crime known as
a. identity theft
b. worms
c. spam
d. phishing
e. two of the above


11: A Trojan horse is a hidden computer program sent through email used to read your emails.
True
False
--
--
--


12: The study of unusual deaths and sicknesses with no apparent cause would include what specific area of forensic medicine?
a. cybrocrime investigation
b. toxicology
c. poisonology
d. autopsy
e. virology


13: Pathology and toxicology would both be involved in the investigation of
a. a suspected death from AIDS
b. a death where an overdose of drugs is suspected
c. a death due to severe burns
d. an unidentifiable disease
e. suffocation


14: Toxicological analysis with gas chromatography would be important in a case
a. relating to drugs
b. relating to poisons
c. unexplained death with no obvious wounds or disease
d. suspected food or drug contaminations
e. all of the above


15: The toxicology (studies effects of drugs or poisons on the body) investigations would be take place in which case?
a. the alteration of usual body temperatures after death due to drugs
b. effects of smoking on the body
c. automobile accident with a suspicion of drunken driving
d. athletes who have unusual muscle mass
e. all of the above


16: The factors that create and maintain a fire are:
a. oxygen and a fuel source
b. heat
c. power
d. both a and b
---


17: An arson investigator may ask about the color of the smoke:
a. because the color of the smoke tells how dangerous the fire is
b. to determine who set the fire
c. to determine if something unusual was present to start the fire.
d. because different color smoke can tell if someone was hurt in the fire
--


18: When searching for blood evidence, it is important to use
a. A partner
b. A police dog
c. a high intensity light source
d. fingerprint powder
--


19: Scaled photographs are:
a. Photographs of evidence placed on a scale
b. photographs with a ruler next to the evidence
c. taken when size of evidence is important
d. b and c
e. all of the above


20: Fingerprints are classified into which of the following groups:
a. Loops, elipses and paralles
b. Whorls, Loops and Arches
c. Arches, Loops and Cycles
d. Whorls, Circles and Arches
e. None of the above

2007-05-24 03:05:31 · 3 answers · asked by heather N 1 in Politics & Government Law & Ethics

3 answers

Think are cheating not only yourself, but your potential employers and the public by not studying the material and knowing it by heart and be able to answer these questions without posting them on a public forum.

The above are basis questions that you need to know; if you don't learn them now, you will not be truly qualified as a forensic investigator.

2007-05-24 03:22:16 · answer #1 · answered by bottleblondemama 7 · 2 2

Study!

2016-05-21 11:18:23 · answer #2 · answered by ? 2 · 0 0

...i/d answer these questions just out of simple interest in learning.

2007-05-24 04:23:31 · answer #3 · answered by theoutcast09 1 · 0 0

fedest.com, questions and answers