1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weqwewe [10]
3 years ago
9

John Sgromolo works for the 20th-largest accounting firm in the United States, but he's not an accountant. He works with hard dr

ives and various other types of computer equipment strewn across several desks. Sgromolo, spends his days culling together bits and pieces of data people think they have erased from existence months, even years, before. His findings have been used in cyber-crime cases and murder investigations. Sgromolo engages in: a. data mirroring b. data mining c. digital forensics d. data combing e. data sleuthing
Computers and Technology
2 answers:
blsea [12.9K]3 years ago
5 0

Answer:c. digital forensics

Explanation:Digital forensic refers to the computer evidence that is identified and extracted in order to be used in court. Basically it is a science of finding digital evidence from a computer,mobile phone,server or netowrk.

According to John Sgromolo there are multiple layers of history that are found on every computer and disk.

The operating system may not indicate their presence but they are still there.

He said that a person can open a file, type on it and not save it , even if they typed only a single letter but there is a historic mark of that action already recorded on the hard drive.

It will only require an expert to get rid of such evidence however even when that is done it can still be retrieved.

he said all of this on the Business news written August 14 2004 by David Reich Hale

pishuonlain [190]3 years ago
3 0

Answer:

Sgromolo engages in data mirroring

Explanation:

The end goal of data mirroring is to increase data protection by providing shields to a computer system thereby preventing it from data loss and other possible losses due to data failures.

The technique used in data mirroring is that, it uses realtime protection of data by taking a data and replicating the exact copy without adding to or removing from it, to another storage location.

In this technique, Sgromolo picks up these data people think are n longer usable, and duplicated by being written to two or more identical hard drives, all of which are connected to one disk controller card.

You might be interested in
A data center needs to ensure that data is not lost at the system level in the event of a blackout. Servers must stay operable f
poizon [28]

Answer: UPS

Explanation:

The redundancy effort that should be put in place to ensure the data remains available is the Uninterruptible Power Supply(UPS).

Uninterruptible Power Supply (UPS) is necessary in the provision of battery backup power when there's drop or stoppage in the flow of electricity. With regards to the question, it'll ensure that data is not lost at the system level in the event of a blackout.

3 0
3 years ago
What is the name of the option in most presentation applications with which you can modify slide elements?
olga55 [171]

Answer:

Answer to both the question is View Master.

Explanation:

Slide Master View is an element in PowerPoint that enables one to bring modification in slides and slide layouts in the presentation applications. From this option, one is able to edit the slide master. By modifying the slide master, every slide in the presentation is affected. Using this feature, one can also modify single slide layouts.

To select Slide Master command, go to View then select the Slide Master Command, and the Slide Master view will appear on the screen.

Therefore, View Master is the correct answer.

3 0
3 years ago
Read 2 more answers
How many questions do you have to answer before you can use direct messages on Brainly?
steposvetlana [31]

Answer:

im pretty sure it 5

Explanation:

4 0
3 years ago
Read 2 more answers
Explain the steps users can take to maintain an operating system
Mars2501 [29]

First is it to always clean out all the junk that is left behind by the operating system and the browsers. You can easily do this using the Disk Cleanup utility included on the windows systems. You can clean up the registry. However, you should be very careful with the registry. Any wrong move might mess up everything


Search and destroy viruses and malware on your PC by installing an anti-virus security program and setting up an automated maintenance schedule.


Defragment main and partitioned drives to keep your computer running smoothly.


Uninstall software programs and personal files like pictures, movies and music that are no longer in use to free up more space. The more the space, the faster the PC will go. You can also run the msconfig command in the RUN command prompt to uncheck start up programs that you do not use

4 0
3 years ago
Complete the sentence to identify advantages of top-down programming design. Choose all that apply.
yanalaym [24]

Answer:The original choice to write apply_fg so that it accepts function arguments is a good one, because it increases interoperability. When the callable arguments to apply_fg use a single protocol, we can easily exchange them: #include <functional> float log2(float); int a = apply_fg(5.Of, int b = apply_fg(3.14f,

Explanation:

3 0
4 years ago
Read 2 more answers
Other questions:
  • Can a computer evaluate an expression to something between true and false? Can you write an expression to deal with a "maybe" an
    13·2 answers
  • )What is proceduralabstraction, and why is it important inComputer Science
    14·1 answer
  • Answer the following questions: • What is the source of the user’s request? Can a technical solution solve his problem? Perhaps
    10·1 answer
  • Suppose that a computer can read or write a memory word in 5 nsec. Also suppose that when an interrupt occurs, all 32 CPU regist
    10·2 answers
  • To protect a computer, it is a good idea to install and frequently run
    6·2 answers
  • Lucy has to move data from column A to column N in a worksheet. Which keys should she select to move data in the same worksheet?
    9·2 answers
  • Multiple Choice
    9·1 answer
  • How Can I add a image in an HTML program?​ please tell
    6·1 answer
  • 1.
    7·1 answer
  • If each integer occupies one 64-bit memory cell and is stored using sign/magnitude notation, what are the largest (in terms of a
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!