1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRISSAK [1]
3 years ago
5

Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT

a hashing algorithm?
A. SHA-256
B. MD5
C. DAT-1
D. SHA-1
Computers and Technology
1 answer:
raketka [301]3 years ago
4 0

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

You might be interested in
TRUE OR FALSE!!! <br> Your location can be tracked via your digital footprint.
laiz [17]
Sadly this statement is true
3 0
3 years ago
Is number 1 correct​
Nutka1998 [239]

Answer:

Yes, number 1 is correct

Explanation:

8 0
3 years ago
Read 2 more answers
Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
OlgaM077 [116]

Answer:

i only have a little that i know sorry,Hope you make this brainly that would make my day

Explanation:

you look for TRUE facts

Things that MAKES sence

Things that are ONLY what you are research.

Thats all that i Know

3 0
3 years ago
Read 2 more answers
Rajesh wants to collaborate with his friends on a web app to complete on a project. While collaborating online has many advantag
Artist 52 [7]

Answer:

When the provider of the web app he uses goes out of business .

When he has an intermittent internet connection at his home .

Explanation:

It can fully depend on many factors. As well, we can talk to:

Internet reliance

Security

Reduced speed

Browser support

7 0
3 years ago
What did you predict will happen? Check all that apply. The lioness will attack Thisbe. Thisbe will stay hidden in the cave to a
sesenic [268]

Hi,


Everything applies. It is impossible to predict based on the current data. All scenarios are possible with equal possibility.


Hope this helps.

r3t40

5 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is where you can save, select a template, change document properties, and close or exit excel?
    8·1 answer
  • ICT excel data homework
    10·1 answer
  • As a photographer, what will be the driving force behind everything that you produce?
    13·1 answer
  • Consider the university enrollment database schema: 547 Student(snurn: integer, snarne: string, majoT: string, level: string, ag
    10·1 answer
  • Recall the problem of finding the number of inversions. As in the text, we are given a sequence of n numbers a1, . . . , an, whi
    8·1 answer
  • Which of the following is productivity strategy for collaboration?
    6·1 answer
  • PLEASE ANSWER!! If my pixel has an RGB value of (R - 150, G - 0, B - 100), what is the dominant value? Why?
    14·1 answer
  • What steps will add content to a report header section?
    5·2 answers
  • Martha is a network monitoring technician working on a firewall for her company’s network. To filter traffic going through the f
    12·2 answers
  • Fundamental of Computer Science
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!