What is required for real-time surveillance of a suspects computer activity?/p Group of answer choices a. Blocking data transmis
sions between a suspect’s computer and a network server. b. Poisoning data transmissions between a suspect’s computer and a network server. c. Preventing data transmissions between a suspect’s computer and a network server. d. Sniffing data transmissions between a suspect’s computer and a network server.
Digital formats allow for lossless data storage, fast editing (without the loss of original source material, ie having to manually clip pieces of film), and made collaboration easier.