1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
evablogger [386]
3 years ago
10

Imagine that you are investigating a crime of fraud, where the suspect is creating false documents. Where might you look for evi

dence on the suspect's computer?
Computers and Technology
2 answers:
kolbaska11 [484]3 years ago
4 0
You would look in the documents folder on the persons computer. You could also look for photo file types if the perp was using photoshop to make changes to documents and then printing them. 
Fofino [41]3 years ago
4 0
You look at the documents and you try to ding the person and then search up that persons history on google to find out the crime.
You might be interested in
What is Human Dignity
jeyben [28]

Answer:

what is human dignity

Explanation:

The English word dignity comes from the Latin word, dignitas, which means “worthiness.” Dignity implies that each person is worthy of honor and respect for who they are, not just for what they can do. ... In other words, human dignity cannot be earned and cannot be taken away.

6 0
3 years ago
Can someone pls do a toradora,Mha or princess jellyfish rp I'm open for anyother rp's
Ivenika [448]

Answer:

no

Explanation:

no

8 0
3 years ago
Read 2 more answers
What will be result of below if statement.
Ber [7]

Explanation:

pls check it ur answer hp u understand this

6 0
2 years ago
Suppose you want your firewall to block all incoming Telnet connections but to allow outbound Telnet connections. One approach w
Vera_Pavlovna [14]

Answer:

Another way to block all inbound packets is to use the firewall layer of the circuit.

Explanation:

The firewall circuit layer is a firewall containing a table with four fields, mainly such as source port, destination port, source IP address, and destination IP address.

They are containing mainly the addresses or the ports that need to be blocked.   So we want to block all inbound packets, and also set the source port to 23 while the rest is set to zero, meaning that all inbound packets are blocked.

5 0
3 years ago
Write a program that reads three numbers and print the largest one step by step answer
const2013 [10]

Answer:

CLS

INPUT"Enter any three numbers";a,b,c

IF a>b AND a>c THEN

PRINT a;"is the greatest"

ELSEIF b>a AND b>c THEN

PRINT b;"is the greatest"

ELSE

PRINT c;"is the greatest"

ENDIF

END

6 0
2 years ago
Other questions:
  • Mention 3 wast water draining system on home​
    7·1 answer
  • In addition to talking to other doctors remotely, telegraphy technology?
    5·1 answer
  • ANSWER THIS CORRECTLY FOR BRAINLIEST
    13·2 answers
  • What is an activity that can help you enhance the appearance of your computer’s desktop?
    13·1 answer
  • Which one is not the future of wireless technology?
    8·1 answer
  • write a program that asks the user to enter a positive integer, then prints a list of all positive integers that divide that num
    6·1 answer
  • User defined blocks of code can be created in
    13·1 answer
  • Which key doesn't relate to keyboard A:return key B :enrollment key C: delete key D:tab key
    9·2 answers
  • Create a list called courses containing the names of your current courses.
    9·1 answer
  • This method of file transfer has been used for decades and is frequently used for uploading changes to a website hosted by an in
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!