1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRISSAK [1]
3 years ago
5

Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT

a hashing algorithm?
A. SHA-256
B. MD5
C. DAT-1
D. SHA-1
Computers and Technology
1 answer:
raketka [301]3 years ago
4 0

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

You might be interested in
How can an individual find career data?
kolezko [41]
How can an individual find career data?a. using a libraryb. searching the webc. conducting an interview with someone in a particular fieldd. all answer choices are sources for finding career data?The answer is d. An individual can do all the option a, b, and c to find a better career data.
6 0
3 years ago
I need help with the rest also
dalvyx [7]

Answer:

??? blackkkkkkkkkkkkkkkkk

6 0
2 years ago
What is the impact of ict on school policy<br>​
Montano1993 [528]

Answer:

It improves the effectiveness of education. It aids literacy movements. It enhances scope of education by facilitating mobile learning and inclusive education. It facilitates research and scholarly communication.

Explanation:

7 0
2 years ago
Read 2 more answers
Which job role requires you to set up an internet system access
user100 [1]

indeed I think it is correct

4 0
3 years ago
Assume that two parallel arrays have been declared and initialized: healthOption an array of type char that contains letter code
eduard

/*

Since we have to check the first two options only as mentioned in last part of question the loop will work 2 times only and will compare the cost of first element and second and assign the healthoption accordingly

*/

for(int i =0;i<=1;i++){

if(annualCost[i]<annualCost[i+1]

best2 = healthOption[i]

else

best2 = healthOption[i+1]

}

6 0
3 years ago
Other questions:
  • Write a program that will take an integer and add up each of the number’s digits, count the number of digits in the number, and
    13·2 answers
  • Generally speaking, mobile sites are good for acquiring new customers and inspiring new relationships while mobile apps are good
    6·1 answer
  • What technique can improve web search results? Add articles, prepositions, and pronouns Be general rather than specific Focus on
    10·1 answer
  • Describe the functions of ALU, resisters, CU, BIU, Cache and FPU.
    7·1 answer
  • What cannot be performed using windows task manager
    10·1 answer
  • 1. In your own words, describe the purpose of a for a loop.
    11·1 answer
  • These days, a digital signature is just as legitimate and trusted as an old-fashioned John Hancock on paper.
    9·1 answer
  • What will the "background-color" of the "topButton" be when the program is finished running?
    10·1 answer
  • Software is:
    5·1 answer
  • Looking for similarities between concepts or problems is referred to as
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!