1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flauer [41]
3 years ago
10

Evidence left behind by participants or observers is an example of what kind of resource?

Computers and Technology
2 answers:
Natasha2012 [34]3 years ago
6 0
The answer should be D
Rus_ich [418]3 years ago
4 0

Answer:

Option (B)

Explanation:

Primary sources are usually defined as those initial pieces of evidence that are left behind by any observer or participant. This may be letters, diaries, documents, biological as well as audio or visual recordings. These are made in the past.

These sources are highly useful and help in carrying out an investigation and reach the conclusion or to find the criminal. These are most useful in solving crime scenes.

Thus, the correct answer is option (B).

You might be interested in
Explain the concept of an engineering trade-offs and give an example
makvit [3.9K]

ytfjkhm,MNbkvjhmb,kn.l">

k

8 0
3 years ago
Read 2 more answers
Only one person can receive the same email at the same time true or false
nasty-shy [4]

Answer:

false

Explanation:

5 0
3 years ago
A(n) _______________ supplies one of the most critical aspects of docking stations, but in a smaller, more portable format: supp
baherus [9]

Answer:

A Port Replicators.

Explanation:

Port replicators are devices or extension. They are plugged into the laptop's usb port to provide extra ports to connect other external devices needed by the laptop.

Docking stations does the same thing, but the laptop is plugged into the docking station holding the needed devices, and meant for that laptop brand.

7 0
3 years ago
John has had a message pop-up on his computer asking him to pay $800 to have his files
faltersainse [42]

• Installed a program containing ransomware/malware. (Do not accept downloaded without inferring it was installed)

• Opened an email attachment containing malware.

• Opened a file containing a malicious macro.

• Left his computer unsecure allowing someone else to install malware on it. (Should include an example, e.g. not logging off)

3 0
3 years ago
Read 2 more answers
Identify the data link trailer blocker
IRINA_888 [86]
What are ur possible answers
7 0
3 years ago
Other questions:
  • Recall that book ciphers do not necessarily require a full book to decode, but instead any written text, such as the Declaration
    6·1 answer
  • As the team leader, John ensures that all his teammates are clear in the team goals they need to achieve. He demonstrates the qu
    12·2 answers
  • Your organization wants to implement a 5-year rotation plan for all of its computing devices. What percentage of the computer fl
    10·2 answers
  • How to copy single slide to powerpoint
    15·1 answer
  • The picture that graphically represents the items you use in windows is called a/an
    5·1 answer
  • Does anyone know this page for drivers ed?
    9·1 answer
  • Among the following, which is the best protection against ransomware?
    8·1 answer
  • When you insert a photo into a document, its placed at the ​
    13·2 answers
  • In java please
    13·1 answer
  • Which statement correctly differentiates how to use list and table styles?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!