1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pshichka [43]
3 years ago
10

A forensic investigator at a crime lab is performing a forensic analysis of a hard drive that was brought in by state troopers.

They make a mistake by using the wrong forensic tool during their forensics examination. What should the investigator do?
a. Document the mistake and workaround the problem.
b. Document the mistake and press on with remaining tasks.
c. Disclose the mistake and assess another area of the hard drive.
d. Disclose the mistake and preserve the chain of custody.
Computers and Technology
1 answer:
Marina CMI [18]3 years ago
4 0

Answer:

a. Document the mistake and workaround the problem.

Explanation:

The forensic investigation is mainly used to collect and analyze the evidence of a crime, which helps in search of a suspect.

The forensic investigator's main purpose is to find the most important evidence by thorough workout on fingerprints, blood, computer, etc of a crime to help to find a suspect.

It is a detail inspection of the crime scenes which come into some result so that the correct decision should be made

So, according to the given options, the most appropriate one is option a.

You might be interested in
How might a company gain followers on Twitter?
Tresset [83]
By sending persuasive / informable and interesting posts to gain followers.
3 0
3 years ago
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user
bixtya [17]

Answer:

B

Explanation:

An authentication server server tracks who is logging on to the network as well as which services on the network are available to each user. It also does the job of providing a network service that applications can use to authenticate the credentials, that are oftentimes account names and passwords, of their users. Authentication server is also used as the basis for authorization.

4 0
2 years ago
Which view shows how the document will look when printed?
DIA [1.3K]
Please provide photos for your question.
7 0
3 years ago
__________ states that network connection speeds for high-end users will increase by 50 percent per year, enabling new companies
Liula [17]

Answer:

Nielsens law

Explanation:

4 0
1 year ago
Which statement is true about laptops? Laptops use fewer components than desktops use. Most of the internal components that are
elena-14-01-66 [18.8K]

Answer:

Option 2 is correct.

Explanation:

Option 2 is correct because most of the components used in laptop is far different from Desktops. They are not able to fix in desktops. They are designed specially for laptops.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Tell me about how to build robots
    11·1 answer
  • Use induction on n to prove that fir all n>=2, 2^n+3^n<5^n
    11·1 answer
  • Which of the following instruments are used when performing a high-rate discharge test on a storage battery
    7·1 answer
  • Is spread spectrum transmission done for security reasons in commercial WLANs?
    13·1 answer
  • A service technician removed the inspection/fill plug from the differential of a rear-wheel- drive vehicle and gear lube started
    8·1 answer
  • What is an effective way to record change management? (5 points)
    9·1 answer
  • 14. In cell B14, create a formula without using a function that adds 1 to the value in cell B12 and then multiplies the result b
    9·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    11·2 answers
  • I need help with this chart !
    5·1 answer
  • __________ is a Microsoft software development tool that developers can use to write multimedia applications
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!