1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
evablogger [386]
3 years ago
10

Imagine that you are investigating a crime of fraud, where the suspect is creating false documents. Where might you look for evi

dence on the suspect's computer?
Computers and Technology
2 answers:
kolbaska11 [484]3 years ago
4 0
You would look in the documents folder on the persons computer. You could also look for photo file types if the perp was using photoshop to make changes to documents and then printing them. 
Fofino [41]3 years ago
4 0
You look at the documents and you try to ding the person and then search up that persons history on google to find out the crime.
You might be interested in
You’ve been stuck in bumper-to-bumper traffic for nearly an hour on a hot summer day. The temperature warning light has just com
nekit [7.7K]

Answer:

In a bumper-to-bumper traffic, when the engine starts overheating the situation can be handled by tapping the accelator which will revive the engine.

Explanation:

Overheating of engine can be due to many reasons. But one should know what to do when an engine overheats in a traffic. Bumper-to-bumper traffic is when the cars are so close in traffic that they touch each other. This usually happens when there's a traffic for a long time or on very busy lane. During summer times, it is important to keep checking the engine temperature to avoid any problem.

When one is stuck in bumper-to-bumper traffic with overheating engine, then there are some meausres that one can take. They are:

  • To put the car on park or neutral mode of driving and tap the accelator which will revive the engine.
  • The heat can be disperse by rolling down the window and turn the heater up. It will disperse the heat.

6 0
3 years ago
Which type of data is most sensitive and should be protected from malware?
Dennis_Churaev [7]
The correct answer is “C. The credit card number that you use to make an online purchase”
5 0
2 years ago
This semester we looked at three languages (C++, Java and Python). One common rule in all three class checklists (for C++, Java
Marysya12 [62]

Answer:

The languages C++, Java, Python are Object Oriented Programming languages. What this means is that we create classes and then instantiate those classes. In C++ and Java, we use the new operator to instantiate the classes. So, if we want to display some data when we try to print the instance just like we print the variables of data types like int, double, string etc, we need to define what we need to display. It is because, class are just like data types like int, double etc. But as they are defined by the developer according to his/her needs, so the developer has to define what to print when they are printed.

5 0
3 years ago
Can someone help me pz?
Katarina [22]
Yes definitely. now what do you need help with?
8 0
3 years ago
c) Do hardware purchases or salaries for IT workers demand a greater share of the total cost of the ownership of the IT infrastr
atroni [7]

Answer:Yes, with increase in the need for IT, and the constant improvements in IT, there is a need to recruit Qualified IT professionals who are knowledgeable.

With new technologies developing with a fast pace,there will be a constant need to invest in IT hardwares in order to meet with the increasing challenges.

Explanation:IT(Information technology) is a term used to describe the processes through Information is sent from one point to another through one or more media.

The field of Information technology is constantly evolving with several improvements taking place around the globe, Medium sized companies will need to constantly make expenditures on both the IT infrastructures and the IT professionals both as permanent employees or as contracted experts.

6 0
3 years ago
Read 2 more answers
Other questions:
  • A company decides to create static design diagrams for an upcoming project. Which statement correctly describes the attribute of
    6·1 answer
  • Regarding an intrusion detection system (IDS), stateful matching looks for specific sequences appearing across several packets i
    9·1 answer
  • Keyboard question: <br> How do I make the 'congruent to' symbol on this keyboard?
    8·1 answer
  • Bluetooth © and Wifi are two examples of transmission protocols. Which of the following statements about them is true?
    9·1 answer
  • Which These operating systems use a graphical user interface?
    6·1 answer
  • Jabria are you smart
    14·2 answers
  • What is used to connect computers to the internet*Audio Ports
    15·2 answers
  • You are interested in buying a laptop computer. Your list of considerations include the computer's speed in processing data, its
    11·1 answer
  • The sun can be an excellent source of natural light.<br> True.<br> False.
    8·2 answers
  • You need to pay an Internet Service Provider (ISP) for services rendered. Which payment technology would you use?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!