1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vika [28.1K]
3 years ago
12

Forensic scientists generally photograph and sketch a computer and its components during their analysis? True or false

Computers and Technology
2 answers:
jenyasd209 [6]3 years ago
6 0
This is considered true sir 
kolbaska11 [484]3 years ago
5 0
Im going with true as well as he said
You might be interested in
Write a program name Dollars that calculates and displays the conversion of an entered number of dollars into currency denominat
Cloud [144]

Answer:

I will code in Javascript.

Preconditions:

  • The variable dollar is passed by parameter to the function.

function Dollars(dollar) {

 

//declare and initialize the variables.

 var twenties = 0;

 var tens = 0;

 var fives = 0;

 var ones = 0;

 

<em>//If dollar is greater or equals 20, divide dollar by 20 and save it into the variable twenties. Then, save the remainder into the variable dollar.  </em>

 if(dollar >= 20){

   twenties = Math.floor(dollar/20);

   dollar = dollar % 20;

 }

<em>//If dollar is greater or equal 10, divide dollar by 10 and save it into the variable twenties. Then, save the remainder into the variable dollar.  </em>

 if(dollar>=10){

   tens = Math.floor(dollar/10);

   dollar = dollar % 10;

 }

<em>//If dollar is greater or equal 5, divide dollar by 5 and save it into the variable twenties. Then, save the remainder into the variable dollar.  </em>

 if(dollar>=5){

   fives = Math.floor(dollar/5);

   dollar = dollar % 5;

 }

<em> //If dollar is greater or equal 1, divide dollar by 1 and save it into the variable twenties. Then, save the remainder into the variable dollar.   </em>

 if(dollar>=1){

   ones = Math.floor(dollar/1);

   dollar = dollar % 1;

 }

//At this point, dollar is equal 0.It's time to display the conversion.

Console.log('20s :' + twenties);

Console.log('10s :' + tens);

Console.log('5s :' + fives);

Console.log('1s :' + ones);

}

Explanation:

The variable Math.floor(num) is used to round a number downward to its nearest integer.

For example, if dollar=57:

twenties = dollar/20 will be 57/20 = 2

dollar = dollar % 20 will be 57 % 20 = 17

tens = dollar/10 will be 17/10 = 1

dollar = dollar % 10 will be 17 % 10 = 7

fives = dollar/5 will be 7/5 = 1

dollar = dollar % 5 will be 7 % 5 = 2

ones = dollar/1 will be 2/1 = 2

dollar = dollar % 1 will be 0 % 5 = 0

7 0
3 years ago
Secops focuses on integrating the need for the development team to provide iterative and rapid improvement to system functionali
ratelena [41]

Answer:

A. True.

Explanation:

Secops or security- operation is a mechanism that focus on merging and collaborating the security team and the development operation team. It is made to prevent, sacrificing one for the other like the security of an application for the functionality and development of the application.

It tries to create communication between both teams, for every decision made to equally and positively affect both teams operation and result.

6 0
3 years ago
Elizabeth types in the following search terms: "Adoption AND cats AND NOT Persians." what results will her search provide?
bazaltina [42]

Answer

pages that reference adoption and cats but not Persians

Explanation

Search terms are the words or phrases that a user enters into a search engine. Also known as the search query. They are also referred to as keywords or  words, terms, and phrases that visitors use to find your site or when one wants to search something on the search engines. You just need to type into search box order to pull up list of results. there are different types of search like search queries where a user enters into a web search engine to satisfy his or her information needs, they are often plain text or hypertext with optional search directives. and the Navigational search queries  is a search query entered with the intent of finding a particular website, web-page or a certain phrase.

3 0
2 years ago
Read 2 more answers
The _____ establishes that the destination device is present on the network, verifies active service, and informs the destinatio
masya89 [10]

Answer: Three way handshake

Explanation:

The three way handshake is the process in which it established a connection at the destination device in the network. It also verifies the currently active services in the network.

The three way shake process basically uses in the transmission control  protocol(TCP) and it also inform to the destination device about the communication session.

Three way handshake process are properly understand in the TCP segment header by the various values in the two host exchange.

4 0
2 years ago
Your network employs basic authentication that centers on usernames and passwords. However, you have two ongoing problems. The f
Agata [3.3K]

Answer:

Using a one time password OTP and using a three factor authentication.

Explanation:

Social engineering is a form system and network attack, drafted by an attacker, to steal user credentials needed for accessing their accounts, to steal information.

Social engineering attacks like phishing, spear phishing, baiting and quid quo pro are used to fool users to giving out their user details.

One time password is an implied use of a password just once and a new password his generated to boost security. In a three factor authentication, OTP can be used as well as biometrics of a user which can not be giving away by a user to an attacker.

8 0
3 years ago
Other questions:
  • When was unicode invented?
    13·1 answer
  • A senior center would like to add a new computer to their library so that members can check their email and read book reviews
    11·2 answers
  • Programming assignment (100 pts): In the C++ programming language write a program capable of playing Tic-Tac-Toe against the use
    14·1 answer
  • Among the eight unique features of​ e-commerce, which is related to the ability to interact with web technology​ everywhere?
    14·1 answer
  • What is a CPU made of
    13·2 answers
  • Which of the following could be a constructor for the public class MyClass? a. public MyClass() b. public void MyClass() c. publ
    7·1 answer
  • An administrator is helping a user connect a smartphone to a tablet via Bluetooth. What should the administrator do first?
    6·1 answer
  • You want a cable that could be used as a bus segment for your office network. The cable should also be able to support up to 100
    5·1 answer
  • How do we ensure that future technologies are fair to society?
    11·1 answer
  • Budgeting for a Computer
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!