Preserving e-evidence and good ________ of steps taken during the investigation are
essential for success in computer crime cases.
Fill in the blank(s) with correct word
Question 2
Matching
Column 1 Column 2
1. Apparent authority a. Brief detentions that do not require probablecause or a warrant
2. Checkpoints b. A procedure of testing fordrug or alcohol use, usually via urinalysis. Employees andschool students can be subjected to warrantless, suspicionlessdrug and alcohol testing, but hospital patients cannotif theevidence is turned over to law enforcement authorities.
3. Closely regulated business c. Also referred to as an arrest inventory that includes logging an arrestee's personal items
4. Common authority d. A search based on voluntary consent. Avalid consent search permits a police officer to dispense withthe Fourth Amendment's warrant and probable cause requirements.
5.Consent search e. Mutual use of the property by personsgenerally having joint access or control for most purposes
6. Drug and alcohol testing f. A practice of teamingprobation officers with police officers to do crime control orprevention
7. Knock and talk g. A type of business subject towarrantless, suspicionless inspections
8. Person inventory h. A police tactic used to obtain consent tosearch, in which police officers approach a home, knock on thedoor, and request consent to search the premises
9. Policeprobation partnerships i. A person has apparent authority ifthe police reasonably believe he or she has authority to grantconsent.
10. Vehicle inventory j. Inventory after a vehicle has been lawfully impounded