Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
IV B.Tech. I Sem., I Mid-Term Examinations, September - 2017
COMPUTER FORENSICS
Objective Exam
Name: ______________________________ Hall Ticket No. A
Answer All Questions. All Questions Carry Equal Marks. Time: 20 Min. Marks: 10.
3. The national database for the identification of fingerprints used by the police forces in England and
Wales is known as: [ ]
a)NDNAD. B)IDENT1 c)FLINTS. d)ANPR.
4. The examination of bite mark evidence and its relation to a criminal investigation is known as: [ ]
a)Forensic Anthropology. b)Forensic Entomology. c)Forensic Odontology d)Forensic Biology.
5. Which type of explosive is classified into two groups, primary and secondary? [ ]
a)all explosives b)high explosives c)medium explosives d)low explosives
6. The raised portion between the grooves in a rifled bore are called: [ ]
a)grooves. b) rifling. c)caliber. d)lands
9. What is the basis for the determination of the primary classification of fingerprints? [ ]
a)the presence or absence of loop patterns b)the presence or absence of arch patterns
c)the presence or absence of minutiae d)the presence or absence of whorl patterns
12. A defendant can prove his innocence with the use of ________________ Evidence .
13. After receiving the computer storage media, your computer forensics experts should be able to give your
case the highest priority in their laboratories called ______________________ Services.
14. A _____________ is the space between the end of a file and the end of the disk cluster it is stored in.
15. _________________ is the most basic rule. The evidence must be able to be used in court or otherwise.
16. The computer should not be operated, and computer evidence should not be processed until
____________backups have been made of all hard disk drives and floppy disks.
17. An ______________ is the process used to acquire information without the individual or suspect
knowing the true identity of the investigator.
18. The real time _______________ is a data warehouse, developed and used by the New York police
Departments more than 35000 police officers to track and apprehend known and suspected criminals.
19. An ATM _______________ is used to capture data from the magnetic stripe on credit cards or ATM
cards.
20. The analysis on the Kennedy assassination bullets were performed by the technique of ___________
analysis.
-oOo-
Code No: 117BW Set No. 2
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
IV B .Tech. I Sem., I Mid-Term Examinations, September - 2017
COMPUTER FORENSICS
Objective Exam
Name: ______________________________ Hall Ticket No. A
Answer All Questions. All Questions Carry Equal Marks. Time: 20 Min. Marks: 10.
2. Which type of explosive is classified into two groups, primary and secondary? [ ]
a)all explosives b)high explosives c)medium explosives d)low explosives
3. The raised portion between the grooves in a rifled bore are called: [ ]
a)grooves. b) rifling. c)caliber. d)lands
6. What is the basis for the determination of the primary classification of fingerprints? [ ]
a)the presence or absence of loop patterns b)the presence or absence of arch patterns
c)the presence or absence of minutiae d)the presence or absence of whorl patterns
10. The national database for the identification of fingerprints used by the police forces in England and
Wales is known as: [ ]
a)NDNAD. B)IDENT1 c)FLINTS. d)ANPR.
Cont..2
Code No:117BW :2: Set No. 2
11. A _____________ is the space between the end of a file and the end of the disk cluster it is stored in.
12. _________________ is the most basic rule. The evidence must be able to be used in court or otherwise.
13. The computer should not be operated, and computer evidence should not be processed until
____________backups have been made of all hard disk drives and floppy disks.
14. An ______________ is the process used to acquire information without the individual or suspect
knowing the true identity of the investigator.
15. The real time _______________ is a data warehouse, developed and used by the New York police
Departments more than 35000 police officers to track and apprehend known and suspected criminals.
16. An ATM _______________ is used to capture data from the magnetic stripe on credit cards or ATM
cards.
17. The analysis on the Kennedy assassination bullets were performed by the technique of ___________
analysis.
19. A defendant can prove his innocence with the use of ________________ Evidence .
20. After receiving the computer storage media, your computer forensics experts should be able to give your
case the highest priority in their laboratories called ______________________ Services.
-oOo-
Code No: 117BW Set No. 3
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
IV B.Tech. I Sem., I Mid-Term Examinations, September - 2017
COMPUTER FORENSICS
Objective Exam
Name: ______________________________ Hall Ticket No. A
Answer All Questions. All Questions Carry Equal Marks. Time: 20 Min. Marks: 10.
4. What is the basis for the determination of the primary classification of fingerprints? [ ]
a)the presence or absence of loop patterns b)the presence or absence of arch patterns
c)the presence or absence of minutiae d)the presence or absence of whorl patterns
8. The national database for the identification of fingerprints used by the police forces in England and
Wales is known as: [ ]
a)NDNAD. B)IDENT1 c)FLINTS. d)ANPR.
9. The examination of bite mark evidence and its relation to a criminal investigation is known as: [ ]
a)Forensic Anthropology. b)Forensic Entomology. c)Forensic Odontology d)Forensic Biology.
10. Which type of explosive is classified into two groups, primary and secondary? [ ]
a)all explosives b)high explosives c)medium explosives d)low explosives
Cont..2
Code No:117BW :2: Set No. 3
11. The computer should not be operated, and computer evidence should not be processed until
____________backups have been made of all hard disk drives and floppy disks.
12. An ______________ is the process used to acquire information without the individual or suspect
knowing the true identity of the investigator.
13. The real time _______________ is a data warehouse, developed and used by the New York police
Departments more than 35000 police officers to track and apprehend known and suspected criminals.
14. An ATM _______________ is used to capture data from the magnetic stripe on credit cards or ATM
cards.
15. The analysis on the Kennedy assassination bullets were performed by the technique of ___________
analysis.
17. A defendant can prove his innocence with the use of ________________ Evidence .
18. After receiving the computer storage media, your computer forensics experts should be able to give your
case the highest priority in their laboratories called ______________________ Services.
19. A _____________ is the space between the end of a file and the end of the disk cluster it is stored in.
20. _________________ is the most basic rule. The evidence must be able to be used in court or otherwise.
-oOo-
Code No: 117BW Set No. 4
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
IV B .Tech. I Sem., I Mid-Term Examinations, September - 2017
COMPUTER FORENSICS
Objective Exam
Name: ______________________________ Hall Ticket No. A
Answer All Questions. All Questions Carry Equal Marks. Time: 20 Min. Marks: 10.
2. What is the basis for the determination of the primary classification of fingerprints? [ ]
a)the presence or absence of loop patterns b)the presence or absence of arch patterns
c)the presence or absence of minutiae d)the presence or absence of whorl patterns
6. The national database for the identification of fingerprints used by the police forces in England and
Wales is known as: [ ]
a)NDNAD. B)IDENT1 c)FLINTS. d)ANPR.
7. The examination of bite mark evidence and its relation to a criminal investigation is known as: [ ]
a)Forensic Anthropology. b)Forensic Entomology. c)Forensic Odontology d)Forensic Biology.
8. Which type of explosive is classified into two groups, primary and secondary? [ ]
a)all explosives b)high explosives c)medium explosives d)low explosives
9. The raised portion between the grooves in a rifled bore are called: [ ]
a)grooves. b) rifling. c)caliber. d)lands
11. The real time _______________ is a data warehouse, developed and used by the New York police
Departments more than 35000 police officers to track and apprehend known and suspected criminals.
12. An ATM _______________ is used to capture data from the magnetic stripe on credit cards or ATM
cards.
13. The analysis on the Kennedy assassination bullets were performed by the technique of ___________
analysis.
15. A defendant can prove his innocence with the use of ________________ Evidence .
16. After receiving the computer storage media, your computer forensics experts should be able to give your
case the highest priority in their laboratories called ______________________ Services.
17. A _____________ is the space between the end of a file and the end of the disk cluster it is stored in.
18. _________________ is the most basic rule. The evidence must be able to be used in court or otherwise.
19. The computer should not be operated, and computer evidence should not be processed until
____________backups have been made of all hard disk drives and floppy disks.
20. An ______________ is the process used to acquire information without the individual or suspect
knowing the true identity of the investigator.
-oOo-