1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRISSAK [1]
3 years ago
5

Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT

a hashing algorithm?
A. SHA-256
B. MD5
C. DAT-1
D. SHA-1
Computers and Technology
1 answer:
raketka [301]3 years ago
4 0

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

You might be interested in
Josh recorded a podcast for his Civics class project. Which file type will allow him to save his file?
Anastaziya [24]

Answer:

C) MP3

Explanation:

hope it helps...

5 0
3 years ago
Read 2 more answers
Which is the last step in conducting a url research
tino4ka555 [31]
<span> The user's browser renders the html code as a visual web page. I think. Let me know if I git it wrong! :P</span>
6 0
4 years ago
Which operating system is used by most the supercomputer system in the world
DENIUS [597]

Answer:

Linux

Explanation:

Linux runs all of the top 500 supercomputers

3 0
2 years ago
Business Risks are ​
blondinia [14]
Business risk is the exposure a company or organization has to factor(s) that will lower its profits or lead it to fail.
8 0
3 years ago
It is considered good practice to save a presentation before printing it. true false
Ilya [14]
It is true because it is really a good practise to save a presentation before printing it

5 0
3 years ago
Other questions:
  • Complete the function ConvertToDecadesAndYears to convert totalYears to decades and years. Return decades and years using the Ti
    10·1 answer
  • An operating system is an example of _______. The hard drive, keyboard and monitor are example of_______.​
    11·1 answer
  • The picture that graphically represents the items you use in windows is called a/an
    15·2 answers
  • What is used to determine when the communications channels are clear and when a device is free to transmit data
    6·1 answer
  • How many check boxes from the following code can be selected at any given time? Home Address Federal Express UPS
    13·1 answer
  • Which code will allow Joe to print Coding is fun. on the screen? print("Coding is fun.") print(Coding is fun.) print = (Coding i
    10·2 answers
  • What are folders within folders called​
    8·2 answers
  • What are possible penalties if a designer is caught breaking copyright laws?
    13·1 answer
  • Free coins who is octane and dont say u dont know because i will do the same to u
    13·2 answers
  • How to get an object from a container in java.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!