The answer would be computer
Answer:
C. DAT-1
Explanation:
Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.
Common hashing algorithms applied, include; the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.
If you install the IPAM server feature you will be prompted to install the other features are:
- Option c. Group Policy Management
- Option d. Windows Internal Database
<h3> Which server should a person install the IPAM server feature?</h3>
IPAM Server is known to be one that need to be installed on a kind of server known as the domain member computer running Windows Server.
One can also install it its later operating system. The IPAM server is said to be made as a single purpose server and it is one that need not be installed with other form of network infrastructure roles e.g. DNS.
Hence, If you install the IPAM server feature you will be prompted to install the other features are:
- Option c. Group Policy Management
- Option d. Windows Internal Database
Learn more about server from
brainly.com/question/15243924
#SPJ1
See full question below
When you install the IPAM Server feature you will be prompted to install which other features? (Choose all that apply.)
a. Control Flow Guard
b. Scale Out File Server
c. Group Policy Management
d. Windows Internal Database
c. Group Policy Management
d. Windows Internal Database
Explanation:
A.)
we have two machines M1 and M2
cpi stands for clocks per instruction.
to get cpi for machine 1:
= we multiply frequencies with their corresponding M1 cycles and add everything up
50/100 x 1 = 0.5
20/100 x 2 = 0.4
30/100 x 3 = 0.9
CPI for M1 = 0.5 + 0.4 + 0.9 = 1.8
We find CPI for machine 2
we use the same formula we used for 1 above
50/100 x 2 = 1
20/100 x 3 = 0.6
30/100 x 4 = 1.2
CPI for m2 = 1 + 0.6 + 1.2 = 2.8
B.)
CPU execution time for m1 and m2
this is calculated by using the formula;
I * CPI/clock cycle time
execution time for A:
= I * 1.8/60X10⁶
= I x 30 nsec
execution time b:
I x 2.8/80x10⁶
= I x 35 nsec