Answer:
The answer is below
Explanation:
The major procedures that investigators must use to collect network trace evidence of computer-related crimes include the following:
1. Establish appropriate guidelines to follow: before starting the actual investigation, all the legal procedures and instructions to follow must be clearly stated and shown to everybody involved in the investigation process.
2. Assess the Evidence: the investigators must assess all the available evidence by checking the computer through a specific means. The assessment includes checking of hard drives, email accounts, social networking sites, or similar digital prints that can be used as proof of the criminal activities
3. Acquire the Evidence: here the investigators must find an appropriate means of gathering the evidence formally and legally. This may involve the removal of any form of hardware such as hard drives, and software-related items that can be extracted.
4. Examine the Evidence: this involved examination of the acquired evidence, to determine if it can be used as proof or not. This involved analyzing the evidence to check if they correlate with the criminal activities under investigation. Some of the things to check include, date of formation of the evidence, the names attached to it, the routes those data were sent or received from, etc.
5. Prepare a report and document them appropriately: this involved the proper detailing and recording of the information derived from the evidence. It includes the time of evidence examination and methods used in examining them. Also, the means at which they acquired the evidence among others.
Answer:
d. Local Security Policy
Explanation:
Local security policy refers to different security settings that are present on a local computer. Local security policy can include administrative rights assignments and password.
This can also mean policies that enables an administrators to set users privileges by so doing guiding what users are permitted to do on the computer.
The correct answer is letter B. The FEC. The one who regulates and monitors the activities of all Political Action Committees (PACs) is the Federal Election Commission. They are the ones who take in charge of whatever activities of the PACs, and it has to be regulated and be monitored.
Explanation:
<em>As</em><em> </em><em>with</em><em> </em><em>most</em><em> </em><em>windows</em><em> </em><em>programs</em><em> </em><em>Access</em><em> </em><em>can</em><em> </em><em>be</em><em> </em><em>executed</em><em> </em><em>by</em><em> </em><em>navigation</em><em> </em><em>the</em><em> </em><em>start</em><em> </em><em>menu</em><em> </em><em>in</em><em> </em><em>the</em><em> </em><em>lower</em><em> </em><em>left</em><em> </em><em>hand</em><em> </em><em>corner</em><em> </em><em>of</em><em> </em><em>the</em><em> </em><em>windows</em><em> </em><em>desktop</em><em>. </em><em>To</em><em> </em><em> </em><em>Acess</em><em>,</em><em> </em><em>click</em><em> </em><em>on</em><em> </em><em>the</em><em> </em><em>start</em><em> </em><em>button</em><em>,</em><em> </em><em>then</em><em> </em><em>the</em><em> </em><em>programs</em><em> </em><em>menu</em><em> </em><em>then</em><em> </em><em>move</em><em> </em><em>to</em><em> </em><em>the</em><em> </em><em>Microsoft</em><em> </em><em>Office</em><em> </em><em>m</em><em>enu</em><em> </em><em>a.d</em><em> </em><em>finally</em><em> </em><em>click</em><em> </em><em>on</em><em> </em><em>the</em><em> </em><em>Microsoft</em><em> </em><em>Access</em><em> </em><em>menu</em><em> </em><em>item</em><em>. </em>
Answer:
settings>Accessibility>Touch>AssistiveTouch>Turn off
Explanation: