1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eddi Din [679]
2 years ago
13

The chain of _____ documents that the evidence was under strict control at all times and no unauthorized person was given the op

portunity to corrupt the evidence.
Computers and Technology
1 answer:
Arturiano [62]2 years ago
4 0

Answer:

custody.

I hope I could help

You might be interested in
1. Write the name of the tab, command group, and icon that is used to sort information in a Word document.
mixer [17]

<u>Answer</u>:

<em>It is possible to sort data in word. For doing this, you must have content in the form of list. </em>

<u>Explanation:</u>

<em>1. Select the text in numbered list / bulleted list </em>

<em>2. Click on the Home tab, Paragraph group, Click on Sort. You well get a Sort Text dialog box</em>

<em>3. In the dialog box , Click Paragraph, Text, Ascending / descending. So you can change the way it sorted by using the same dialog box whenever required. </em>

<em> In addition to sorting text, you can  sort date and also sort number. </em>

7 0
4 years ago
Read 2 more answers
What does NBT stand for?​
Zanzabum

Answer:

National Benchmark Test

Explanation:

7 0
3 years ago
What are three recommendations for reducing risk and improving the privacy of your personal information while using social media
viktelen [127]

Answer:

1. Treat the “about me” fields as optional.

2. Become a master of privacy settings.

3. Know the people you friend.

Explanation:

1. Treat the “about me” fields as optional.

Because these fields are offered, however, doesn’t mean you must fill them out. Consider offering a general version of the information requested or simply leaving the field blank. For instance, listing only your state of residence, instead of both city and state, can make it harder for others to figure out exactly where you live.

2. Become a master of privacy settings.

All social media sites give you the option to limit post viewing to specific audiences. Take the time to explore these settings, try different options, and become a master of their use.

3. Know the people you friend.

Once upon a time, social media users competed with one another to have the largest number of connections. Today, however, smart social media users know that the more people you’re connected to, the harder it is to control what happens to the information you post. Make sure you know the people you add on social media, in real life if possible. Don’t hesitate to use the “block” feature when the situation seems to call for it.

6 0
3 years ago
When setting a schedule you should refer to a tool known as the __________calendar.
aev [14]
It is known as the PACING Calendar.
6 0
3 years ago
Read 2 more answers
You create a computer-aided design database that stores data including a list of components of an item being designed, the relat
Leviafan [203]

Answer:

The correct answer is Multi-dimensional.

Explanation:

This database is optimized for online analytical processing and data warehousing (OLAP) applications. Multidimensional databases are often created using existing relational database records. While a relational database can be accessed through a Structured Query Language (SQL) query, a multi-dimensional database allows the user to ask questions like: "How many additives were sold in Nebraska in a year?" and similar issues related to the synthesis of operations and business trends. An OLAP application that accesses data from a multidimensional database is called a MOLAP application (Multidimensional OLAP).

3 0
3 years ago
Other questions:
  • Use ________ resolution when recording human speech in an audio file.
    14·1 answer
  • Which term describes a protocol to manage a network, able to configure a network, monitor activity, and control devices?
    10·2 answers
  • _____ refers to unsolicited commercial emails, usually sent to a large number of people with little regard to the users interest
    14·1 answer
  • 1. Access and PowerPoint are not included in all configurations of Microsoft Office 2013.
    14·1 answer
  • Read the PIC Data sheet Chapter 2.0 and 3.0 2. List at least 3 big differences between the Flash and RAM 3. How many RAM locatio
    5·1 answer
  • Digital printing is not suitable for printing what
    11·1 answer
  • What are advantages of using document templates?
    13·2 answers
  • What's the smallest part of a computer
    8·2 answers
  • PLS HURRY <br> Look at the image below
    8·1 answer
  • allows users to enter text and control the computer with their voice.allows users to enter text and control the computer with th
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!