Answer:
processing
Explanation:
The flow chart is a diagram that shows the activity of the program, peoples or things.
Flowchart symbol and meaning in the options:
1. Processing: it is a rectangular shape block which is used for variable declaration or assignment.
2. I/0: it is a parallelogram in shape which is used for input or output.
3. Parallelogram: it is used for input or output.
4. diamond: it is used for decisions or conditions.
Therefore, the correct option is a. Processing is the one that is used for the assignment statement.
Answer:
Machine Learning algorithms can predict patterns based on previous experiences. These algorithms find predictable, repeatable patterns that can be applied to eCommerce, Data Management, and new technologies such as driverless cars..
Answer:
ISO 31000:2009 publishes principles and generic guidelines on risk management.
Explanation:
ISO 31000:2009 can be applied to any public, private or community company, organization, society or individual. Hence, ISO 31000:2009 is not particular to either business or area.
ISO 31000:2009 can be implemented during the period of an industry and to a broad variety of actions, including policies and judgments, guidance, methods, functions, plans, goods, services, and assets.
ISO 31000:2009 can be implemented to any type of danger, whatever its kind, whether possessing positive or negative outgrowths.
Answer:
C. DAT-1
Explanation:
Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.
Common hashing algorithms applied, include; the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.