1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
evablogger [386]
3 years ago
10

Imagine that you are investigating a crime of fraud, where the suspect is creating false documents. Where might you look for evi

dence on the suspect's computer?
Computers and Technology
2 answers:
kolbaska11 [484]3 years ago
4 0
You would look in the documents folder on the persons computer. You could also look for photo file types if the perp was using photoshop to make changes to documents and then printing them. 
Fofino [41]3 years ago
4 0
You look at the documents and you try to ding the person and then search up that persons history on google to find out the crime.
You might be interested in
Who made the first sandwich?
RoseWind [281]
That guy made it. john m the 4th

7 0
3 years ago
Read 2 more answers
Which of the following is another name for cinematographers? (Select all that apply). lighting specialists production manager di
JulijaS [17]

Answer:

camera operators

directors of photography

Explanation:

Cinematography is simply the art of taking photos and being in charge of cameras in the process of film-making.

There are alternative names for a cinematographer and they include camera operators and directors of photography

3 0
3 years ago
A variable that can have values only in the range 0 to 65535 is a :
Thepotemich [5.8K]

Answer:

a.

Explanation:

Two bytes have 2 times 8 bits is 16 bits.

Max value that can be expressed is 2¹⁶-1 = 65535

6 0
3 years ago
Which of the following defines guidelines that specify the way computers access the medium to which they are attached, the type(
mart [117]

Answer:

network standard

Explanation:

4 0
3 years ago
5. What are some situations where you might find it useful to use the “!” symbol in a program?
svlad2 [7]

Answer:

The most common use of symbols by programmers is for performing language reflection (particularly for callbacks), and most common indirectly is their use to create object linkages. In the most trivial implementation, they have essentially named integers (e.g. the enumerated type in C).
<u>Help Me By Marking Me as Brainlist ...</u>

5 0
2 years ago
Read 2 more answers
Other questions:
  • What is the best class setup for the mp5 in Modern Warfare?
    7·1 answer
  • What economic measure is at the highest level since the Great Depression?
    12·1 answer
  • There are ways to perform computer commands quickly and multiple times. <br> a. True <br> b. False
    11·2 answers
  • Name 3 examples of operating system software that are not Windows based.
    5·1 answer
  • What is the decimal representation of the following signed binary numbers?
    6·1 answer
  • Which type of styles can be applied to a word, phrase, or sentence?
    7·1 answer
  • Enter key is also known as Return key. (True or false)
    13·2 answers
  • Vannevar Bush imagined a desktop computing machine that would allow people to access data stored in various information centers
    13·1 answer
  • Technology has had
    10·1 answer
  • Means storing,accessing information over the internet other than hard drive and your system
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!