1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Klio2033 [76]
3 years ago
8

Computer ________ involves identifying, extracting, preserving, and documenting computer evidence. a. inoculation b. forensics c

. hacking d. multi-factor e. authentication
Computers and Technology
1 answer:
drek231 [11]3 years ago
7 0

Answer:

b. forensics

Explanation:

<em>Digital Forensics</em>: It is the process of preservation, identification, extraction, and documentation of computer evidence which can be used by the court of law.

You might be interested in
What's the best definition of financial literacy?
8090 [49]

Answer:

defines personal financial literacy as "the ability to use knowledge and skills to manage financial resources effectively for a lifetime of financial well-being.\

Explanation: thats it

5 0
3 years ago
How do you change your name on brainly after you have made an account​
zhuklara [117]

Answer:

u have to contact brianly and tell them that u accidentally made a different account name then the 1 u want

5 0
3 years ago
A “greedy algorithm” sometimes works well for optimization problems???
mrs_skeptik [129]
An optimization problem is one in which you want to find, not just a solution, but the best  solution •<span>A <span>“greedy algorithm” sometimes works </span></span><span>well for optimization problems </span>•<span>But only a few optimization problems can </span><span> be solved by the <span>greedy method</span></span>
5 0
3 years ago
​which type of cryptography provides the most security?
Doss [256]

Answer B: Asymmetric cryptography, because the receiver has its own decryption key and cannot create encrypted messages, because he doesn't have the encryption key.

About the other answers:

A: Private keys are always involved, there has to be some secret to do encryption, so this answer doesn't say very much.

C: Digital signatures can be used to verify/prove some data comes from some person (the signer) in an unaltered way. It is not about encryption, so is not about the security of your message. You use it in combination with encryption.

D: Like A, this doesn't say very much. Shared secret keys (symmetric keys) can be used for encryption, but they are less secure since the keys have to exist in more than one place (sender and receiver).



4 0
3 years ago
After you enter the details for the first selected recipient in the New Address List dialog box, click _______ to add another re
masha68 [24]
B. New Entry

I hope this helps
8 0
3 years ago
Read 2 more answers
Other questions:
  • Consider the following method:
    8·2 answers
  • All objects in an object-oriented program are instantiated (created) from a ____.
    12·1 answer
  • What is it called when you give credit in your writing to someone else's quote?
    10·1 answer
  • Robert wants to start a mobile app development company that builds apps for both iOS and Android. He is researching different cr
    14·1 answer
  • Technician A says that a cracked exhaust manifold can affect oxygen sensor operation. Technician B says that a clogged air filte
    7·1 answer
  • What function should be entered into B7 to calculate the total budget
    15·2 answers
  • Write a Python program that asks the user for a positive, odd value. Once the value is validated determine if the number is Prim
    11·1 answer
  • What technique is used when setup times at a workstation are sequence dependent?
    15·1 answer
  • What two things should you do before starting the design process
    8·1 answer
  • each data mining technique has its advantages and limitations. which data mining technique mimics the neural structure of the br
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!