1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Klio2033 [76]
3 years ago
8

Computer ________ involves identifying, extracting, preserving, and documenting computer evidence. a. inoculation b. forensics c

. hacking d. multi-factor e. authentication
Computers and Technology
1 answer:
drek231 [11]3 years ago
7 0

Answer:

b. forensics

Explanation:

<em>Digital Forensics</em>: It is the process of preservation, identification, extraction, and documentation of computer evidence which can be used by the court of law.

You might be interested in
Which of the following websites can help you learn about general career trends?
Ber [7]
The answer is vocational information center as this area or website provides a person or a student to explore careers that could be suitable to his or her liking and to show careers or professions' role as they work. This website is a way of educating an individual of having to provide informations regarding about careers.
8 0
3 years ago
(True or False) The speed at which data travels on a bus is referred to as the word size.
geniusboy [140]

Answer:

True

Explanation:

4 0
3 years ago
Read 2 more answers
Which is currently the most common cellular network?<br> 4G<br> 4G LTE<br> 5G<br> 5G LTE
Misha Larkins [42]

Answer:

4GLte

Explanation:

8 0
3 years ago
hãy soạn thảo một bản hợp đồng chuyển giao hoặc thu thập thông tin nhằm bán/ mua/ trao đổi thông tin/ tài liệu giữa hai tổ chức.
mariarad [96]

Explanation:

wuwhwhwhshahahabahsgsgagsgshshshsjeushsjsjsiajausudid

idirieieirieeie

iep

7 0
3 years ago
Which term is used to describe a network security device or host software that filters communications, usually network traffic,
morpeh [17]

Answer:

The correct answer is option (D).

Explanation:

According to the scenario, the most appropriate answer is option (D) because the firewall can be defined as the software program which checks through the network for incoming and outgoing communication on predefined rules.

while the other options are wrong because of the following reasons :

  • A sniffer can be defined as the program which is used to check the network traffic but it didn't work on predefined rules.
  • An auditor can be defined as a program that is used to analyze the network.
  • The hacker can be a person who hacks the system to gain access or gather information.
4 0
4 years ago
Other questions:
  • What is something you can do to stay connected to the relationships in your life while we spend this time at home?
    13·1 answer
  • To access WordPad, Jill will click on Start, All Programs, Accessories, and WordPad. To access Notepad, Karl will click on Start
    11·1 answer
  • ______ includes websites that encourage interaction and connection among people, businesses, and organizations.
    9·2 answers
  • Which of the four basic functions of a computer refers to the collection of data by a computer?
    11·2 answers
  • What happens if i receive a text while my phone is off?
    15·1 answer
  • Match each type of software license with the appropriate definition.
    11·1 answer
  • )finding an unused location in the hash table is called
    5·1 answer
  • Free brainliest hehehehehehehheheh
    13·2 answers
  • Identify the following​
    9·1 answer
  • Social media first became popular due to which development?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!