Answer:
Case 1 (Fordjour v. Ahmed case on rent) and Case 3 (Giz Construction v. Ministry of Roads on Nonpayment of project ) are civil cases which entail one party by talking the other party to court over money. Ahmed was taken to court by his landlord Fordjour over rent arrears while Minirtsy of Roads was taken to court for non-payment of project by Giz Construction. Case 2 (GRA v. Melcom over Tax payment) is criminal case as it entails Melcom violating laws stipulated by the government.
A peremptory challenge is used by attorneys in the jury selection process to excuse potential jurors without providing a reason why. In this lesson you will learn about the use of peremptory strikes, as well as the laws designed to protect the integrity of the process.
While the process of selecting jurors may be too boring to be featured in popular T.V. crime dramas, any seasoned trial attorney will tell you that a trial can be lost or won in jury selection. So, what exactly makes the process so important? And how do attorneys pick the 'best' jury for each case?
The jury selection process, also know as 'voir dire', involves attorneys from each side taking turns picking the jurors they believe will favor their position over their opponent's. The term peremptory challenge refers to the practice of excusing potential jurors without providing a reason why. Jurors may also be excluded because the attorneys and the judge believe that the juror, for whatever reason, can't be fair. This is called a 'for cause' challenge.
Answer: check explanation.
Explanation:
Computer Forensics involves the techniques used in gathering evidence from a particular computing device. The evidence gathered from computer Forensics should be suitable for presentation in a law court.
Computer Forensic investigator need to consider some properties such as the corrosive elements, static electricity, temperature and the magnetic field when packaging and transporting evidence.
Computer Forensic investigators follow set of procedures for their analysis;
(1). physical isolation of the device in question so as to make sure it cannot be contaminated accidentally, and (2). digital copy of the device's storage media should be made and locked in a secure facility.