Firearms Analysis Pre-Lab, Lab, and Post-Lab
.docx
keyboard_arrow_up
School
Florida International University *
*We aren’t endorsed by this school
Course
3501
Subject
Computer Science
Date
Feb 20, 2024
Type
docx
Pages
3
Uploaded by MasterTree7006 on coursehero.com
CHS 3501L FIREARMS
Pre-Lab
Name:
Section: 1.
What are the two major types of ammunition? What do they have in common? (2 pts)
2.
What is firearms identification? Is it the same as ballistics? (2 pts)
3.
What are some class characteristics that can be found on a bullet? What makes some markings
individual characteristics? (2 pts)
4.
What are the 2 marks that can be impressed onto a cartridge case? How do they occur? (2 pts)
5.
What is the AFTE Theory of Identification in relation to firearms identification? What are the
four possible conclusions that can arise out of a comparison? (2 pts)
CHS 3501L FIREARMS
Laboratory
Name:
Section: Objective: To investigate a crime scene and understand the various collection techniques and reasons for collecting evidence.
Materials: http://forensics.rice.edu/
Procedure:
1.
Read the PowerPoint presentation before answering the pre-lab questions.
2.
Type the following web address into your internet browser: http://forensics.rice.edu/
3.
Select “Case One: Rookie Training”
4.
This assignment requires playing a computer game that was initially developed using Adobe
Flash. Adobe Flash was discontinued, but there is a way to still play the game as described on
the website. Please follow the instructions on the website (clicking on “Flash Game Archive”). If
your operating system is not listed, choose the most recent that has been published and that is
bolded. Additionally, it may work better to download the full game (CSI: The Experience / Cases
1-5). You will only need the Rookie Training, but the rest of the game may be of interest to you.
5.
I recommend looking at the post-lab questions as you play the game. The post-lab questions are
answered as you play.
6.
Play through the section marked “Firearms and Toolmarks”. Start by clicking through the
training demos on the bottom right of the screen when Willows asks you what you want to do.
7.
While playing through the three training demos, be sure to record any definitions, since they
may be of use to you throughout the semester.
8.
When you finish the demos, go to the firing range and take the quiz. Please include a screenshot
of your final score and include it in the post-lab.
9.
After the firing range quiz, analyze the firearms evidence provided in the case.
10. Answer all of the questions given in the post-lab assignment below, including screenshots of
results when required.
11.
(Optional) Please feel free to continue to use the website as a learning experience by completing
other sections.
12.
Please delete this page before uploading your combined pre-lab, post-lab, and crime scene
report
to Canvas.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Computer Science
After you have concluded the readings and lectures this week, think about what the laws do not cover in terms of cybercrime. Where are the gaps? Assume you are the lead staffer for a congressman, what would you recommend for future legislation (realistically – given current available technologies and limitations)? How would you approach a non-technically savvy person and convince them to support your legislation?
arrow_forward
Question 1: Simple COVID-19 Diagnostics Expert System
With regard to the ravaging impact of the COVID-19 pandemic which is caused by the SARS-CoV-2;the World Health Organization (WHO) has long made public some symptoms, which the generalpopulace can employ as a basic first-aid reference/guide, to diagnose the severity of a patient’ssymptom(s). Thus, the table below illustrates the severity of these symptoms in patients, based onclinical records, since February 2020 till date.
Therefore, write a Java program correctly such that your source code will accomplish the following:
1. Display all the Symptom Codes (from 10 – 23 only) and the corresponding SymptomDescriptions to the user using the following format: Symptom Code => Symptom Description. Do not include the Symptom Category in your screen display to the user.
2. Display a prompt message for the user to enter a Symptom Code.
3. The Symptom Codes: 10 – 13, 14 – 20, and 21 – 23 indicate the Most CommonSymptoms, the Less Common…
arrow_forward
1. Do you think genetic profiles will become a standard part of Electronic Health Records in the future? Justify your answer and be specific---supply references that will support your answer.
2. WITHOUT REVEALING ANY IDENTIFIABLE INFORMATION, SUCH AS NAMES OR BIRTH DATES, can you identify reasons that you would (ease of use, prevention of error, more information available to professionals) or would not (ethical, financial, personal) want the health history of your family to be part of an EHR?
arrow_forward
Computer Science
What is identification, and which methods and guidelines are used by users to request access to a system or data? Give examples to support your answer.
Discussion - post a 300 word minimum narrative response to the question above.
For this narrative, you are required to provide supportive arguments and descriptions. False or unsubstantiated content is NOT allowed. Given that you probably didn't come up with the idea, provide both support and references for your points.
arrow_forward
Computer Information Systems 133
Address the topic and contribute ideas to the following:
> Building & Formatting PivotTables and PivotCharts
> Using Math & Trig Functions
> Working with Financial, Logical, and Lookup Functions
Three (3) topics and tell us the following:
1. Difficult to learn and use?
2. Easy to learn and use? (Or somewhere in between difficult and easy?)
3. Useful personally?
4. Useful professionally?
5. Career boosting? (Do you think these skills will help you get a better job?)
Then, tell us how do you rate your overall Excel knowledge and skills?
Explain how a Microsoft Excel course changes one Excel skills.
arrow_forward
Multiple facts: What are they, and how do they work in real life?
arrow_forward
Take two different types of Class II devices - Assuming you will manufacture one of both or both of these devices and pursue FDA approval.
Describe both devices --> use, design, claim, commercial name.
Compare their FDA history database -->
Define User needs, design input, design output --> provide technical rationale and justification for each.
Plan out the design verification and validation --> including strategies for testing, purchase, manufacturing, acceptance criteria, etc.
510 k process
propose a Quality System for your manufacturing facility
arrow_forward
Computer Science
There are laws meant to punish hackers for crimes against companies and people. Are these laws effective, and does the punishment fit the crime? Outlining one law that is effective and working. Use current statistics as justification for effectiveness. Find another law that is not working effectively. Again, use statistics or other research to show a lack of effectiveness. Make a recommendation on a law that could bridge a gap in covering a new hacking method or ID theft. Include relevant information such as punishments for crime types. Address whether punishments are harsh enough to deter hacking.
arrow_forward
Do you ever witness internet harassment? How did you feel when you learned about the scenario? How did you determine that the individual had been bullied before you intervened?
arrow_forward
Please help me with this make a list of the following
Create a unique / new student club for a university in the Department of Computer Science | Faculty of Science.
For all the questions, conduct research for providing evidence. You can use outside opinions
Question 1
What will be the purpose of the student club and why is it unique? What ‘problem’ are you solving for uni students?
Question 2
Who is your audience? In other words which students is your club going to target? Year, faculty, interests, etc. Be as specific as possible.
Question 3
What evidence have you gathered that the student club will attract students in your audience and create a positive impact in your faculty?
Question 4
What are the minimum requirements for opening a student club in your faculty? Provide references.
Hint: Not all information will be available online. You can use existing clubs as an example and talk to club members. This club should be officially affiliated with your faculty and department. This…
arrow_forward
This discussion is associated with the Navigate 2 Scenario - Episode 1: The New System
Overview: The Board of Directors of a national Health Care System is considering which electronic health record (EHR) system to use and how to implement the EHR in all of its facilities. As a Health Care IT consultant, you will work with various team members at the corporate level to gather information and analyze the efficacy, safety/security/legal factors, cost effectiveness, and cost-benefit factors of two possible new systems to help them decide whether or not to implement one of them. You will also recommend a high-level implementation plan that considers system cutover and change management.
Define health information technology, health information systems, and health/medical informatics and each’s respective impact on healthcare. Next, examine the importance of the Office of the National Coordinator for Health Information Technology. Afterward, define the meaning and importance of meaningful…
arrow_forward
Answers only please no need for explanation. Thanks
1. Behavior Modification is the applied science and professional practice concerned with analyzing and modifying human behavior True /False
2. Which are the following characteristics of behavior (choose all that apply) 1.Involves an individual's actions not labels 2.Involves measurable dimensions (frequency , duration , intensity latency ) 3.Can be observed , described , and recorded 4.Has an impact on the environment ( physical or social )
3. Concerning the historical roots of Behavior Modification, which historical event is associated with 1930' * s - 40' * s ?
A.Skinner Science and Human Behavior
B.Association for Behavior Analysis
C.Skinner - Basic research on behavioral principles
D.Pavlov Conditioned Reflexes
4. Which of the following is NOT an area of application for behavior modification according to your chapter 1 content ?
A.Social media posts B.Community psychology C.Child behavior management D.Business , industry ,…
arrow_forward
Many people believe that the world of digital technology may be roughly divided into two groups: those who have access to a computer and the Internet, and others who do not. Some people believe that this has substantial ethical implications and that there is a moral obligation to remedy the imbalance. Those who "have nots" may feel discriminated against or socially ostracized, and they miss out on a wide variety of life opportunities as a result. Do you believe that everyone, regardless of where they live, their needs, their level of ability, or their financial means, ought should have access to computers and the Internet? Who is responsible for providing services and education, as well as footing the bill? Why isn't having access to the internet a must for everyone?
arrow_forward
Part 1: Technology is a part of our lives. Try to look around you and take note of the technologies you observed. Give at least 3 examples for each classification of technology according to process (energy, equipment, information, life, material).
Part 2: In not more than 5 sentences, answer the following questions:
1. Why do we need to replace old technologies with new ones?
2. How is National Development achieved through Science and Technology?
arrow_forward
1. Over the past few years, the Caribbean and rest of the world have been affected by various devastating natural disasters including hurricanes and earthquakes. Many environmentalists have attributed this increase in natural disasters to climate change. Identify and briefly discuss any two (2) emerging technologies which can be used in the fight against climate change.
2. COVID-19 has brought about many changes to the way businesses and organizations work and operate. Recent news emanating from the Caribbean Examinations Council (CXC) have indicated plans for having the exams completed online as opposed to the traditional method, all of this, because computers of today have become more powerful (speed, processing power, storage capacity when compared to 20 years ago. It is expected that computers of tomorrow will be even more powerful than those of today. Referencing the proposal set forward by CXC discuss why it was and continues to be necessary for such rapid improvements, in…
arrow_forward
AI, Death, and Mourning
An Ethics Case Study {Should we develop "griefbots"?}
As technology impacts most aspects of our lives, it also affects the way we respond to death, and mourn. Not too many years ago, for example people grieving after a death didn’t have to worry about memorializing loved ones’ social media accounts, about including “digital assets” in a will, about being painfully reminded of their loss by a company’s well-intended but ill-considered “engagement” efforts, or about potentially losing treasure troves (store of delightful things) of memories if a photo hosting platform shut down.
The sadness is as old as the world, but people, through technology, respond to it in new ways. One such recent development is the creation of “griefbots.” An article titled “The Griefbot that Could Change How We Mourn” details in particular the work of a data scientist, Muhammad Ahmad, who hopes that artificial intelligence will “eventually allow us to craft the data left behind by an…
arrow_forward
TRUE or FALSE: Determine whether each statement is TRUE or FALSE
Module 1 – Unit 1: Information Technology and Emerging Trends31. Information technology refers to any technology that can be used to handle information.32. I.T. technology may not be an electronic device.33. Communications technology is considered as an I.T. technology.34. I.T. technology is limited to computer-based devices.
Module 1 – Unit 2: Sustainability of Productivity35. Additive manufacturing is an example of a general purpose technology.36. Servitization is the concept of selling services as consumer products.
Module 2 – Unit 3: Systems Analysis and Design37. Systems analysis and design involves the analysis and design of computerized systems.38. High structured information contains more details than low structured information.39. Systems analysis and design can be applied to systems that do not yet exist.40. Systems analysis and design is part of the SDLC.
Module 2 – Unit 4: Systems Development Life Cycle –…
arrow_forward
Suppose you own a travel agency in a large city. You have many corporate clients, but growth has slowed somewhat. Some long-term employees are getting discouraged, but you feel that there might be a way to make technology work in your favor. Use your imagination and suggest at least one strength, weakness, opportunity, and threat that your business faces.
arrow_forward
1.When you are in mountain climbing and emergency occurs. What action you must do?And why?
2. Give 5 equipment use in mountain climbing and explain its functions.
arrow_forward
talk 3 (three) examples of pc incidents or pc crime that took place inside the healthcare industry within the beyond 12 months. in brief describe what occurred in every incident, and how it may doubtlessly be averted the use of what you currently recognize.
arrow_forward
Can you think of an example of online bullying or harassment that you witnessed? How did you react when you first heard about the situation? After all, you didn't know the person had been bullied until after you intervened.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Related Questions
- Computer Science After you have concluded the readings and lectures this week, think about what the laws do not cover in terms of cybercrime. Where are the gaps? Assume you are the lead staffer for a congressman, what would you recommend for future legislation (realistically – given current available technologies and limitations)? How would you approach a non-technically savvy person and convince them to support your legislation?arrow_forwardQuestion 1: Simple COVID-19 Diagnostics Expert System With regard to the ravaging impact of the COVID-19 pandemic which is caused by the SARS-CoV-2;the World Health Organization (WHO) has long made public some symptoms, which the generalpopulace can employ as a basic first-aid reference/guide, to diagnose the severity of a patient’ssymptom(s). Thus, the table below illustrates the severity of these symptoms in patients, based onclinical records, since February 2020 till date. Therefore, write a Java program correctly such that your source code will accomplish the following: 1. Display all the Symptom Codes (from 10 – 23 only) and the corresponding SymptomDescriptions to the user using the following format: Symptom Code => Symptom Description. Do not include the Symptom Category in your screen display to the user. 2. Display a prompt message for the user to enter a Symptom Code. 3. The Symptom Codes: 10 – 13, 14 – 20, and 21 – 23 indicate the Most CommonSymptoms, the Less Common…arrow_forward1. Do you think genetic profiles will become a standard part of Electronic Health Records in the future? Justify your answer and be specific---supply references that will support your answer. 2. WITHOUT REVEALING ANY IDENTIFIABLE INFORMATION, SUCH AS NAMES OR BIRTH DATES, can you identify reasons that you would (ease of use, prevention of error, more information available to professionals) or would not (ethical, financial, personal) want the health history of your family to be part of an EHR?arrow_forward
- Computer Science What is identification, and which methods and guidelines are used by users to request access to a system or data? Give examples to support your answer. Discussion - post a 300 word minimum narrative response to the question above. For this narrative, you are required to provide supportive arguments and descriptions. False or unsubstantiated content is NOT allowed. Given that you probably didn't come up with the idea, provide both support and references for your points.arrow_forwardComputer Information Systems 133 Address the topic and contribute ideas to the following: > Building & Formatting PivotTables and PivotCharts > Using Math & Trig Functions > Working with Financial, Logical, and Lookup Functions Three (3) topics and tell us the following: 1. Difficult to learn and use? 2. Easy to learn and use? (Or somewhere in between difficult and easy?) 3. Useful personally? 4. Useful professionally? 5. Career boosting? (Do you think these skills will help you get a better job?) Then, tell us how do you rate your overall Excel knowledge and skills? Explain how a Microsoft Excel course changes one Excel skills.arrow_forwardMultiple facts: What are they, and how do they work in real life?arrow_forward
- Take two different types of Class II devices - Assuming you will manufacture one of both or both of these devices and pursue FDA approval. Describe both devices --> use, design, claim, commercial name. Compare their FDA history database --> Define User needs, design input, design output --> provide technical rationale and justification for each. Plan out the design verification and validation --> including strategies for testing, purchase, manufacturing, acceptance criteria, etc. 510 k process propose a Quality System for your manufacturing facilityarrow_forwardComputer Science There are laws meant to punish hackers for crimes against companies and people. Are these laws effective, and does the punishment fit the crime? Outlining one law that is effective and working. Use current statistics as justification for effectiveness. Find another law that is not working effectively. Again, use statistics or other research to show a lack of effectiveness. Make a recommendation on a law that could bridge a gap in covering a new hacking method or ID theft. Include relevant information such as punishments for crime types. Address whether punishments are harsh enough to deter hacking.arrow_forwardDo you ever witness internet harassment? How did you feel when you learned about the scenario? How did you determine that the individual had been bullied before you intervened?arrow_forward
- Please help me with this make a list of the following Create a unique / new student club for a university in the Department of Computer Science | Faculty of Science. For all the questions, conduct research for providing evidence. You can use outside opinions Question 1 What will be the purpose of the student club and why is it unique? What ‘problem’ are you solving for uni students? Question 2 Who is your audience? In other words which students is your club going to target? Year, faculty, interests, etc. Be as specific as possible. Question 3 What evidence have you gathered that the student club will attract students in your audience and create a positive impact in your faculty? Question 4 What are the minimum requirements for opening a student club in your faculty? Provide references. Hint: Not all information will be available online. You can use existing clubs as an example and talk to club members. This club should be officially affiliated with your faculty and department. This…arrow_forwardThis discussion is associated with the Navigate 2 Scenario - Episode 1: The New System Overview: The Board of Directors of a national Health Care System is considering which electronic health record (EHR) system to use and how to implement the EHR in all of its facilities. As a Health Care IT consultant, you will work with various team members at the corporate level to gather information and analyze the efficacy, safety/security/legal factors, cost effectiveness, and cost-benefit factors of two possible new systems to help them decide whether or not to implement one of them. You will also recommend a high-level implementation plan that considers system cutover and change management. Define health information technology, health information systems, and health/medical informatics and each’s respective impact on healthcare. Next, examine the importance of the Office of the National Coordinator for Health Information Technology. Afterward, define the meaning and importance of meaningful…arrow_forwardAnswers only please no need for explanation. Thanks 1. Behavior Modification is the applied science and professional practice concerned with analyzing and modifying human behavior True /False 2. Which are the following characteristics of behavior (choose all that apply) 1.Involves an individual's actions not labels 2.Involves measurable dimensions (frequency , duration , intensity latency ) 3.Can be observed , described , and recorded 4.Has an impact on the environment ( physical or social ) 3. Concerning the historical roots of Behavior Modification, which historical event is associated with 1930' * s - 40' * s ? A.Skinner Science and Human Behavior B.Association for Behavior Analysis C.Skinner - Basic research on behavioral principles D.Pavlov Conditioned Reflexes 4. Which of the following is NOT an area of application for behavior modification according to your chapter 1 content ? A.Social media posts B.Community psychology C.Child behavior management D.Business , industry ,…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningSystems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning