1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kryger [21]
3 years ago
10

Jim is a forensic specialist. He seized a suspect computer from a crime scene, removed the hard drive and bagged it, documented

and labeled the equipment, took photographs, completed a chain of custody form, and locked the computer in his car. On the way to the lab, he stopped to purchase supplies to use at the next crime scene. What did Jim do wrong
Computers and Technology
1 answer:
Andreyy893 years ago
7 0

Answer: Jim left the computer unattended while shopping for supplies to be used at the next crime scene.

Explanation: While transporting the evidence to a secure location (lab), he left the computer unattended in his car and goes shopping for supplies that will be used in his next crime scenes. This act will give the criminals or their accomplice the opportunity to break into his car and tamper with what ever evidence he might have left behind in his car.

You might be interested in
Vpns create a _____________ to transport information through public communications media.
Oxana [17]

They create a secure tunnel.

3 0
3 years ago
_____ is the practice of using the internet to provide healthcare without going to a doctor’s office or hospital.
Molodets [167]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is Telehospital.

Because Telehospital provides services where patients treated online by a physician. It is like providing medicine services remotely to patients.  

A live secure connection is established between patient and physician where physicians diagnose patient disease and recommend transcription.

It is the same as a typical visit to the hospital, except the doctor and patient are not on the same physical location. They are connected with each other remotely.

While other options are not correct because: telenursing is related to providing nursing services online, where telehealth is providing all health care services, it also includes education, training, and administrative services also. While teledoctor and telehospital used interchangeably.

But telehospital is the most and widely used term to diagnose patients remotely by physicians.

7 0
3 years ago
Read 2 more answers
When activated, an Excel object has all the features of an Excel ______?
erik [133]

<span>Workbook is the answer. An excel object (collectively referred to as </span>the Excel Object Model) refers to the objects that comprise an Excel workbook, such as Worksheets, Rows, Columns, Cell Ranges, and the Excel Workbook itself.

 

<span>When activated, an Excel object has all the features of an Excel workbook.</span>

3 0
3 years ago
Read 2 more answers
g Design a Boolean function called isPrime, that accepts an integer as an argument and returns True if the argument is a prime n
professor190 [17]

Answer:

#include <bits/stdc++.h>

using namespace std;

bool isPrime(int n)

{

   for(int j=2;j<=n-1;j++)  //loop to check prime..

   {

       if(n%j==0)

       return false;

   }

   return true;

}

int main(){

   int n;

   cout<<"Enter the integer"<<endl;//taking input..

   cin>>n;

   if(isPrime(n))//printing the message.

   {

       cout<<"The number you have entered is prime"<<endl;

   }

   else

   {

       cout<<"The number is not prime"<<endl;

   }

return 0;

}

Output:-

Enter the integer

13

The number you have entered is prime

Explanation:

The above written program is in C++.I have created a function called isPrime with an argument n.I have used a for loop to check if the number is prime or not.In the main function I have called the function isPrime for checking the number is prime or not.

4 0
3 years ago
A network with 6 bits remaining for the host portion will have how many usable hosts?​
Readme [11.4K]
<span>A network with 6 bits remaining for the host portion will have 62 usable hosts. The netmask is </span><span>255.255.255.192/26, the shorthand is [6-bit] which is equal to the number of addresses as <span>= 62 hosts + 1 bcast + 1 net base</span></span>
6 0
3 years ago
Other questions:
  • Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards
    7·1 answer
  • What is a bug?
    11·2 answers
  • Which should you use to find a saved file?
    15·2 answers
  • The _____ function is a logical function that returns a TRUE value if any of the logical conditions are true and a FALSE value i
    10·1 answer
  • How can a user view the options for Junk E-mail?
    11·2 answers
  • Which principle of animation deals with imparting a unique identity to the animated character?
    5·1 answer
  • The getElementById DOM Method do?
    13·1 answer
  • What are the specifications for a mine shaft headgear ​
    10·1 answer
  • A server is handling thousands of simultaneous connections, and proxying requests to another service. Which concurrency model is
    9·1 answer
  • Firewalls are available as a special hardware device or as software. A firewall will block packets of information that are from
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!