1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina1246 [14]
3 years ago
6

Two samples of dirt are collected from a suspect's tread in his shoe and a crime scene. The forensic investigator does a gross e

xamination of color, texture, shapes, and foreign objects. She notes very similar characteristics. What must she also do to further prove these samples are from the same soil?
A) place in acid to see if it dissolves
B) do the same examination under a microscope
C) combine the samples to see if they look the same
D) pour the same in the soil of where you think it came from and see if it matches
Computers and Technology
2 answers:
Naddik [55]3 years ago
8 0

Answer:

Option B) do the same examination under a microscope

Explanation:

In order to determine the exactness of the sample, the examination over a microscope has to be done.

The microscope provides detailed information about the morphology of the particles. In other words, the microscope examines the minute details of the soil particles. These include the particle size, orientation, foreign substance if any, as well as any discrepancies in the two samples :the shoe and soil.

In the same lab, an examination of the shoe is also conducted. There must be the same particles on the soil and shoes. Thus, a microscope is able  to do that.

frozen [14]3 years ago
4 0
Do the same examination under a microscope
You might be interested in
When public relations professionals make provocative statements in newsgroups to get people to visit an organization's website o
goldfiish [28.3K]

Answer:

Pitching

Explanation:

According to my research on the different marketing stunts that organizations have done, I can say that based on the information provided within the question this type of Public Relations move is called Pitching. Like mentioned in the question they basically make a controversial statement in front of platforms with huge audiences in order to rile people up so they go visit their site or are aware of their project, which in term leads to sales.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
No links it’s just a normal question about iPhones.
Zolol [24]
I’ll give a you a good guess because I’ve only deleted a whole conversation like 3 times. I honestly feel like eventually there will be a warning on deleting the full conversation or on the other hand nothing may happen; or that it will automatically stop you from deleting the conversation.
6 0
3 years ago
Choose the word that best completes this sentence. Caught-in and caught-between injuries result from a person being squeezed, ca
salantis [7]
Two adjacent
Two parallel
3 0
4 years ago
Read 2 more answers
You have placed a File Transfer Protocol (FTP) server in your DMZ behind your firewall. The FTP server is to be used to distribu
VladimirAG [237]

The steps should follow to enable the access is open ports 20 and 21 for inbound and outbound connections.

<h3>What is FTP?</h3>

File transfer protocol is a communication protocol used to transfer files from a device to a client on a computer network.

You must open the correct ports on the firewall to allow FTP traffic into your DMZ. For outbound FTP connections, the correct ports are 20 and 21.

Thus, the steps should follow to enable the access is open ports 20 and 21 for inbound and outbound connections.

Learn more about FTP

brainly.com/question/25751600

#SPJ1

8 0
2 years ago
Internal monitoring is accomplished by inventorying network devices and channels, IT infrastructure and applications, and inform
gtnhenbr [62]

Answer:

True

Explanation:

It is TRUE that Internal monitoring is accomplished by inventorying network devices and channels, IT infrastructure and applications, and information security infrastructure elements.

The above statement is true because Internal Monitoring is a term used in defining the process of creating and disseminating the current situation of the organization’s networks, information systems, and information security defenses.

The process of Internal Monitoring involved recording and informing the company's personnel from top to bottom on the issue relating to the company's security, specifically on issues about system parts that deal with the external network.

5 0
3 years ago
Other questions:
  • Of the following choices, what indicates the primary purpose of an intrusion detection system (IDS)?
    12·1 answer
  • When an isolated object becomes charged by induction, which best describes the net charge on the object?
    10·1 answer
  • Jennifer frequently uses a few programs on her laptop. Where will she find all the frequently used program icons in her computer
    13·1 answer
  • Write a code block to encode strings from original messages, using our custom encoding. To do so: Initialize a variable called c
    6·1 answer
  • Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port
    12·1 answer
  • You give an object a more meaningful name by setting the object’s _________________ property.
    7·1 answer
  • A computer program uses 3 bits to represent integers. When the program adds the decimal (base 10) numbers 5 and 3, the result is
    6·1 answer
  • Which function of NOS involves swapping programs and files
    6·1 answer
  • Define operator precedence ? explain with an example.​
    13·1 answer
  • Tim is a project manager. He is brainstorming with his team about problems that could arise during the next phase of the project
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!