cj386-unit 7 review a questioned document is any material that contains marks, symbols or signs...
TRANSCRIPT
![Page 1: CJ386-Unit 7 Review A questioned document is any material that contains marks, symbols or signs conveying a meaning or message and whose source or authenticity](https://reader036.vdocument.in/reader036/viewer/2022082820/56649f465503460f94c6837d/html5/thumbnails/1.jpg)
CJ386-Unit 7 Review• A questioned document is any material that contains marks,
symbols or signs conveying a meaning or message and whose source or authenticity is in question.
• Questioned documents are not restricted to pieces of paper bearing handwritten text, but also include computer printing, typewritten material, and markings such as graffiti on walls, and other surfaces.
• The single most common activity of the forensic document examiner is the identification of handwriting.
• High quality known samples of handwriting (exemplars) are required for handwriting comparisons
• .• Document examiners also compare typewritings, photocopier
copies, and computer printed documents.
• Document examiners are also called upon to compare samples of ink and paper.
![Page 2: CJ386-Unit 7 Review A questioned document is any material that contains marks, symbols or signs conveying a meaning or message and whose source or authenticity](https://reader036.vdocument.in/reader036/viewer/2022082820/56649f465503460f94c6837d/html5/thumbnails/2.jpg)
Unit 8 Seminar-Chapter 19 Questions
• What is computer forensics?
• Name some crimes that involve the use of a computer.
• What is the difference between computer hardware and computer software?
• What is the main circuit board of a computer called?
![Page 3: CJ386-Unit 7 Review A questioned document is any material that contains marks, symbols or signs conveying a meaning or message and whose source or authenticity](https://reader036.vdocument.in/reader036/viewer/2022082820/56649f465503460f94c6837d/html5/thumbnails/3.jpg)
Unit 8 Seminar- Chapter 19 Questions
• What part of a computer, found on the ‘Mother Board’ contains a complex of wires, which serves to carry data from one hardware device to another?
• What part of a computer is referred to as the ‘brain’ of the computer?
• Is the operating system in a computer considered to be hardware or software?
![Page 4: CJ386-Unit 7 Review A questioned document is any material that contains marks, symbols or signs conveying a meaning or message and whose source or authenticity](https://reader036.vdocument.in/reader036/viewer/2022082820/56649f465503460f94c6837d/html5/thumbnails/4.jpg)
Unit 8 Seminar-chapter 19 Questions
• What does the term ‘bit’ stand for?
• What is the first thing a crime scene investigator should do when encountering computer forensic evidence?
• What are the two ways that a computer crime scene must be documented?
![Page 5: CJ386-Unit 7 Review A questioned document is any material that contains marks, symbols or signs conveying a meaning or message and whose source or authenticity](https://reader036.vdocument.in/reader036/viewer/2022082820/56649f465503460f94c6837d/html5/thumbnails/5.jpg)
Unit 6 chapter 15 Questions
• What is the difference between visible data and latent data?
• What is an IP address and what potential value does it have in computer forensics investigations?
• What is the unauthorized intrusion into a computer called?
![Page 6: CJ386-Unit 7 Review A questioned document is any material that contains marks, symbols or signs conveying a meaning or message and whose source or authenticity](https://reader036.vdocument.in/reader036/viewer/2022082820/56649f465503460f94c6837d/html5/thumbnails/6.jpg)
Unit 8-Computer Forensics Review
• The first thing a computer investigator must do is obtain a search warrant
• Images of a hard disk drive must be captured without altering the drive in any way
• Latent data is hidden from view• The word processing or text-based document files are a
common place to look for evidential data• A ‘fingerprint’ must be made of the hard disk drive both
before and after imaging its contents• Cookies, internet history and cache are all potential
sources of evidence on a computer