Content Frame
Note for screen reader users: There is text between the form elements on this page. To be sure that you do not miss any text, use item by item navigation methods, rather than tabbing from form element to form element.

Multiple Choice



This activity contains 15 questions.

Question 1.
Who is responsible for the discovery that every person has unique fingerprints?


Open Hint for Question 1 in a new window.
 
End of Question 1


Question 2.
What scientific technique uses biological residue found at the scene of a crime for genetic comparisons in aiding the identification of criminal suspects?


Open Hint for Question 2 in a new window.
 
End of Question 2


Question 3.
What is the current test used to determine the admissibility of scientific evidence in court?


Open Hint for Question 3 in a new window.
 
End of Question 3


Question 4.
What act provided substantial funding to improve the quality and availability of DNA analysis?


Open Hint for Question 4 in a new window.
 
End of Question 4


Question 5.
What percent of rape suspects are typically excluded by forensic DNA testing?


Open Hint for Question 5 in a new window.
 
End of Question 5


Question 6.
Which of the following online databases is being developed for military use overseas?


Open Hint for Question 6 in a new window.
 
End of Question 6


Question 7.
What was the first, nearly foolproof method of identification available to investigators?


Open Hint for Question 7 in a new window.
 
End of Question 7


Question 8.
In what year was the Communications Decency Act signed into law?


Open Hint for Question 8 in a new window.
 
End of Question 8


Question 9.
A police crime scene analyst or laboratory worker is also called:


Open Hint for Question 9 in a new window.
 
End of Question 9


Question 10.
According to research by the Software Information Industry Association, what percentage of software has been copied illegally?


Open Hint for Question 10 in a new window.
 
End of Question 10


Question 11.
Any crime perpetrated through the use of computer technology could be called a:


Open Hint for Question 11 in a new window.
 
End of Question 11


Question 12.
Which of the following is a type of biocrime?


Open Hint for Question 12 in a new window.
 
End of Question 12


Question 13.
How many cases were examined in the report titled Convicted by Juries, Exonerated by Science?


Open Hint for Question 13 in a new window.
 
End of Question 13


Question 14.
Kevin Mitnick was:


Open Hint for Question 14 in a new window.
 
End of Question 14


Question 15.
Malicious computer programs like viruses are called:


Open Hint for Question 15 in a new window.
 
End of Question 15





Pearson Copyright © 1995 - 2010 Pearson Education . All rights reserved. Pearson Prentice Hall is an imprint of Pearson .
Legal Notice | Privacy Policy | Permissions

Return to the Top of this Page