It’s true because it’s also called “flash memory”
Answer:
C. DAT-1
Explanation:
Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.
Common hashing algorithms applied, include; the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.
It is called D. destkop pulishing
With desktop publishing, people will had the options to choose a certain layout from the destkop publishing software that allow them to create high quality document in shorter period of time. This software allow individuals to publish on their own without the need of printing press.
Answer:
d. .
Explanation:
Dot (.) symbol is used to access the resource from the module. It is used to establish the connection between resource and module.
While on the other hand "=" is an assignment operator that is used to assign a value to the variable. "*" is use for the purpose of multiplication of two values in variables. Double Inverted commas ("") used to print the statement written between them.