1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pshichka [43]
3 years ago
10

A forensic investigator at a crime lab is performing a forensic analysis of a hard drive that was brought in by state troopers.

They make a mistake by using the wrong forensic tool during their forensics examination. What should the investigator do?
a. Document the mistake and workaround the problem.
b. Document the mistake and press on with remaining tasks.
c. Disclose the mistake and assess another area of the hard drive.
d. Disclose the mistake and preserve the chain of custody.
Computers and Technology
1 answer:
Marina CMI [18]3 years ago
4 0

Answer:

a. Document the mistake and workaround the problem.

Explanation:

The forensic investigation is mainly used to collect and analyze the evidence of a crime, which helps in search of a suspect.

The forensic investigator's main purpose is to find the most important evidence by thorough workout on fingerprints, blood, computer, etc of a crime to help to find a suspect.

It is a detail inspection of the crime scenes which come into some result so that the correct decision should be made

So, according to the given options, the most appropriate one is option a.

You might be interested in
Rachel wants to post content from digital cameras on the web. Which online tool will help Rachel to post and edit content on a w
GrogVix [38]

Answer: blogs

Explanation: because you can send and edit your video on your webpage

4 0
3 years ago
Can someone please help me with this question??
Brrunno [24]
Your answer should be A.
4 0
3 years ago
3. What of the following is the main components of computer system?
Likurg_2 [28]

Answer:

CPU, input unit, Output unit, memory unit

3 0
2 years ago
Read 2 more answers
7. Suppose that a RISC machine uses 5 register windows. a. How deep can the procedure calls go before registers must be saved in
Semenov [28]

Answer:

bbbbbbbbbbbbnbbnnnnnnnnnnnnnnnnn

6 0
2 years ago
A good first step to understanding any kind of text is to :
Vitek1552 [10]

Answer:

find the main idea

Explanation:

6 0
3 years ago
Other questions:
  • For an IP or device that is in the local network, it's a very straight forward cache table lookup for its MAC address. How does
    5·1 answer
  • When paying bills online, a payee is:
    9·1 answer
  • 1. Consider a direct-mapped cache that can accommodate 8Mbytes from a main memory, that uses a 32-bit address and 32-byte blocks
    5·1 answer
  • Which four of the following hardware components are specifically used to enable networking and are not part of a stand-alone com
    13·2 answers
  • When planning a backup strategy, ideally one needs to prioritize important data and only back up what is absolutely necessary fo
    15·1 answer
  • Write a Java application that uses the Math class to determine the answers for each of the following: a. The square root of 37 b
    10·1 answer
  • In dynamic programming, the technique of storing the previously calculated values is called A. Saving value property B. Storing
    7·1 answer
  • Use the drop-down menus to match each description with the part of a report where it is located.
    10·1 answer
  • Which role will grant a delegate read-only access to a particular workspace within a user’s Outlook mailbox?
    15·2 answers
  • What is a closed system?​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!