Questions from Crime and Investigation


Q: What information in an e-mail message allows an investigator to

What information in an e-mail message allows an investigator to identify the sender? How would the examiner use this information to identify the sender?

See Answer

Q: What is the motherboard and why is it central to the functioning

What is the motherboard and why is it central to the functioning of a computer?

See Answer

Q: Why are online conversations conducted using chat and instant messaging more difficult

Why are online conversations conducted using chat and instant messaging more difficult to recover than e-mail messages? Where are files containing such conversations likely to be stored?

See Answer

Q: Why should an investigator not unplug a computer that may contain chat

Why should an investigator not unplug a computer that may contain chat or instant message conversations?

See Answer

Q: What is a log file and how is it used to identify

What is a log file and how is it used to identify hackers? Name three locations on a computer network that may contain log files.

See Answer

Q: What is volatile data and how can it provide clues to the

What is volatile data and how can it provide clues to the identity of a hacker?

See Answer

Q: How can network traffic help identify the source of an unwanted network

How can network traffic help identify the source of an unwanted network intrusion?

See Answer

Q: With incidents of global terror on the rise, it has become

With incidents of global terror on the rise, it has become increasingly harder for law enforcement to manage apprehending suspects. Terror suspects take advantage of large crowds and chaotic situation...

See Answer

Q: Define RAM and ROM and explain the difference between the two.

Define RAM and ROM and explain the difference between the two.

See Answer

Q: Define the terms input device and output device and name three examples

Define the terms input device and output device and name three examples of each.

See Answer