Deck 5: Laboratory and Technical Services

ملء الشاشة (f)
exit full mode
سؤال
Each nucleated cell contains the full complement of an individuals DNA, called the genome that is unvarying from cell to cell.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The process of deciphering codes and ciphers used by criminals to protect the security of their messages is known as: _____.

A) spectrography
B) chromatography
C) cryptography
D) logic of set theory analysis
سؤال
Chromatography is a method used in the identification of crystalline solids.
سؤال
Most states are now building DNA databases by collecting and testing DNA samples from individuals convicted of sexual assaults and often homicide. The FBI is supporting these databases by linking them together into a national database known as:

A) NCIC (National Crime Information Center).
B) CODIS (Combined DNA Index System.)
C) NDDB (National DNA Data Base).
D) DAWN (DNA Awareness Network).
سؤال
A technique of personal identification that in the future may challenge fingerprints as the most positive means of physical identification is: _____.

A) voiceprint identification
B) DNA analysis
C) spectrography
D) chromatography
سؤال
Identification in criminalistics is aligned with the logic of _____.

A) set theory
B) legal science
C) criminology
D) evolutionary theory
سؤال
The crime lab cannot determine with any degree of certainty if a weapon was used in other crimes.
سؤال
Ultrasonic cavitation involves the graphic identification of human voices.
سؤال
A spectrograph is used in the identification of firearms.
سؤال
The distinctive signature of handguns and other metallic weapons is developed through the use of the neutron activation analysis technique.
سؤال
The person-to-person differences within a particular segment of DNA sequence are known as: _____.

A) genomes
B) alleles
C) loci
D) nucleated cells
سؤال
Argon-ion lasers are widely used in the detection of latent fingerprints.
سؤال
The laboratory process which a criminalist might use to restore obliterated serial numbers on firearms and other metal objects is called what?

A) lasers
B) ultrasonic cavitation
C) trace metal detection
D) X-ray crystallography
سؤال
The informational output of a crime laboratory depends upon what?

A) expertise of the laboratory staff
B) physical evidence collected at the crime scene
C) location of the laboratory in relation to major universities
D) number and kinds of tests conducted
سؤال
Degraded, contaminated, and small quantities of DNA can be successfully analyzed in the crime laboratory due to which laboratory process?

A) loci development
B) alleles reagent
C) genome splicing
D) polymerase chain reaction
سؤال
To make the determination of whether or not a person has recently fired a handgun the criminalist would subject hand swabs from the subject to which laboratory examination?

A) comparison microscope
B) spectrographic analysis
C) X-ray crystallography
D) neutron activation analysis
سؤال
Neutron activation analysis is a technique used to analyzed gunshot residue.
سؤال
In making the determination that bullets, shells, or cartridge cases were fired from a specific weapon, the criminalist would use which piece of laboratory equipment?

A) comparison microscope
B) spectrographic analysis
C) X-ray crystallography
D) neutron activation analysis
سؤال
The cipher in which one symbol or letter stands for another symbol or letter is known as a transposition cipher.
سؤال
The FBI has selected 13 loci to serve as a standard battery of core loci for DNA analysis.
سؤال
The problem of DNA material being contaminated, degraded, or of insufficient quantity can be surmounted by _____ chain reaction.
سؤال
_____ is a method of separating compounds to identify the components.
سؤال
A _____ microscope is used in ballistic examinations.
سؤال
The deciphering of ciphers and codes that are used to protect the security of messages is known as _____.
سؤال
The most common cipher used by criminals is the _____ cipher.
سؤال
The FBI is supporting the linking of state DNA databases together to form a national database known as _____.
سؤال
Person-to-person differences within a segment of DNA are referred to as _____.
سؤال
_____ is the profession and scientific discipline of applying the natural sciences in matters of law.
سؤال
Neutron activation analysis is used in the study of _____ residues.
سؤال
_____ is used to restore obliterated serial numbers on firearms.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/30
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Laboratory and Technical Services
1
Each nucleated cell contains the full complement of an individuals DNA, called the genome that is unvarying from cell to cell.
True
2
The process of deciphering codes and ciphers used by criminals to protect the security of their messages is known as: _____.

A) spectrography
B) chromatography
C) cryptography
D) logic of set theory analysis
C
3
Chromatography is a method used in the identification of crystalline solids.
False
4
Most states are now building DNA databases by collecting and testing DNA samples from individuals convicted of sexual assaults and often homicide. The FBI is supporting these databases by linking them together into a national database known as:

A) NCIC (National Crime Information Center).
B) CODIS (Combined DNA Index System.)
C) NDDB (National DNA Data Base).
D) DAWN (DNA Awareness Network).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
5
A technique of personal identification that in the future may challenge fingerprints as the most positive means of physical identification is: _____.

A) voiceprint identification
B) DNA analysis
C) spectrography
D) chromatography
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
6
Identification in criminalistics is aligned with the logic of _____.

A) set theory
B) legal science
C) criminology
D) evolutionary theory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
7
The crime lab cannot determine with any degree of certainty if a weapon was used in other crimes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
8
Ultrasonic cavitation involves the graphic identification of human voices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
9
A spectrograph is used in the identification of firearms.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
10
The distinctive signature of handguns and other metallic weapons is developed through the use of the neutron activation analysis technique.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
11
The person-to-person differences within a particular segment of DNA sequence are known as: _____.

A) genomes
B) alleles
C) loci
D) nucleated cells
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
12
Argon-ion lasers are widely used in the detection of latent fingerprints.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
13
The laboratory process which a criminalist might use to restore obliterated serial numbers on firearms and other metal objects is called what?

A) lasers
B) ultrasonic cavitation
C) trace metal detection
D) X-ray crystallography
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
14
The informational output of a crime laboratory depends upon what?

A) expertise of the laboratory staff
B) physical evidence collected at the crime scene
C) location of the laboratory in relation to major universities
D) number and kinds of tests conducted
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
15
Degraded, contaminated, and small quantities of DNA can be successfully analyzed in the crime laboratory due to which laboratory process?

A) loci development
B) alleles reagent
C) genome splicing
D) polymerase chain reaction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
16
To make the determination of whether or not a person has recently fired a handgun the criminalist would subject hand swabs from the subject to which laboratory examination?

A) comparison microscope
B) spectrographic analysis
C) X-ray crystallography
D) neutron activation analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
17
Neutron activation analysis is a technique used to analyzed gunshot residue.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
18
In making the determination that bullets, shells, or cartridge cases were fired from a specific weapon, the criminalist would use which piece of laboratory equipment?

A) comparison microscope
B) spectrographic analysis
C) X-ray crystallography
D) neutron activation analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
19
The cipher in which one symbol or letter stands for another symbol or letter is known as a transposition cipher.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
20
The FBI has selected 13 loci to serve as a standard battery of core loci for DNA analysis.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
21
The problem of DNA material being contaminated, degraded, or of insufficient quantity can be surmounted by _____ chain reaction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
22
_____ is a method of separating compounds to identify the components.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
23
A _____ microscope is used in ballistic examinations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
24
The deciphering of ciphers and codes that are used to protect the security of messages is known as _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
25
The most common cipher used by criminals is the _____ cipher.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
26
The FBI is supporting the linking of state DNA databases together to form a national database known as _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
27
Person-to-person differences within a segment of DNA are referred to as _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
28
_____ is the profession and scientific discipline of applying the natural sciences in matters of law.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
29
Neutron activation analysis is used in the study of _____ residues.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
30
_____ is used to restore obliterated serial numbers on firearms.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.