1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flauer [41]
3 years ago
10

Evidence left behind by participants or observers is an example of what kind of resource?

Computers and Technology
2 answers:
Natasha2012 [34]3 years ago
6 0
The answer should be D
Rus_ich [418]3 years ago
4 0

Answer:

Option (B)

Explanation:

Primary sources are usually defined as those initial pieces of evidence that are left behind by any observer or participant. This may be letters, diaries, documents, biological as well as audio or visual recordings. These are made in the past.

These sources are highly useful and help in carrying out an investigation and reach the conclusion or to find the criminal. These are most useful in solving crime scenes.

Thus, the correct answer is option (B).

You might be interested in
Why might a government entity choose to offer some information and services online as in e-government
harina [27]
My answer would be D, here is why: 

At the dawn of the information age, it became possible for American and other societies to be able to transfer information all over the world with just one click, this has increased laziness in our society dramatically. People these days are more likely not to go to a government office, then to just type a few characters. Going online helps government sectors to quickly spread the information they need to and make it "easier" for our citizens to file their paperwork. 

8 0
4 years ago
Read 2 more answers
Which formula should Gemima use to show the
Shalnov [3]
The answer is
Sum(above)
3 0
3 years ago
Read 2 more answers
>
Oksana_A [137]

Answer:

I think its symmetric.

Explanation:

5 0
3 years ago
The working of the computer on the input according to the program is called_______.​
dimaraw [331]

Answer:

input program

Explanation:

6 0
3 years ago
The hacker has managed to poison everyone's ARP cache so that all traffic to the Internet is being sent to the hacker's system b
Tasya [4]
This attack is knows as Man in the middle
5 0
4 years ago
Other questions:
  • The process in which access looks for records in a table based on the fields and criteria in the query design, finds those recor
    6·1 answer
  • As the Sunrise hospital implements an EHR, the coding staff requests a new system that will enhance productivity, accuracy, and
    15·1 answer
  • 1⁰=?<br> Is equal to...........
    12·2 answers
  • As text is typed in the _____ text box, a drop-down list displays options for completing the action, displaying information on t
    11·1 answer
  • Within a table, the intersection of a row and a column creates a(n) ____.
    13·1 answer
  • Write a program to input value of three sides, to check triangle is triangle is possible to form of not​
    11·1 answer
  • Jonathan wants to create an online journal. He will use it to share with his friends all the cool places he visits while in Euro
    13·2 answers
  • Which of the follow efficiencies would be considered unreasonable?
    13·1 answer
  • Using language c, find the nth Fibonacci, knowing that nth Fibonacci is calculated by the following formula: - If n = 1 Or n = 2
    9·1 answer
  • What is the term for a problem in your code
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!