Answer:
in word, you go to the File tab on a document, then click print, or enter the keyboard shortcut: ctrl+p
to edit a downloaded document, open the document, and on the top of the document, click "enable editing"
Explanation:
hope this helps!
Answer:
C. DAT-1
Explanation:
Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.
Common hashing algorithms applied, include; the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.
Explanation:
Data bases; interpretation and presentation of data in useful formats by transforming raw data into information, data storage management.
Hardware: helps to get to the physical and tangible part of computer.
Software; helps to access the word processor, spreadsheet's and social media platforms and general operations in a computer.
Answer:
It is used to insert a specific function by selecting it from the Insert Function list.
Explanation:
The insert function list various functions, and we can insert a specific function through a selection of one of the options from the insert function list. And it is certainly not used to display the information according to arguments used in the function, and which is quite clear. Also, it is used to put each type of excel functions in a certain order. And it is also not used to search for any specific functions through any keyword and description. Hence, the correct option is the second option.