Answer the following statements true (T) or false (F)

1. Prior to becoming a qualified digital forensic investigator, a person must prove their ability as a computer scientist.
2. You are working on a criminal case in which a spreadsheet found on the computer system indicates that the victime transferred money to the suspect just days before the crime was committed. You provide a hard copy of the spreadsheet, printed in landscape format, along with the digital file. The judge is most likely going to reject one or the other as evidence because they represent duplicate items.
3. You arrive on the scene of an investigation. The computer sitting on the suspect's desk is turned off, but the monitor is on. The proper procedure in this situation is to turn the computer on to make sure it is functional before seizing it as evidence.
4. After the conclusion of any criminal trial, if it becomes evident that an appeal is not possible, all contraband must be destroyed.


1. False
2. False
3. False
4. True

Computer Science & Information Technology

You might also like to view...

Memory locations declared in the form's Declarations section have ____, which means they can be used by any of the procedures in the form's Code Editor window.

A. local scope B. class scope C. priority D. procedure scope

Computer Science & Information Technology

Reports are often based on ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

You can select a paragraph by using the ____ key(s).

A. CTRL+END B. SHIFT+HOME C. CTRL+SHIFT+DOWN ARROW D. CTRL+SHIFT+END

Computer Science & Information Technology

When an individual attempts to discover as much information legally possible about their competition, what information gathering technique are they performing?

A. competitive study B. packet study C. basic information D. competitive intelligence

Computer Science & Information Technology