1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weqwewe [10]
3 years ago
9

John Sgromolo works for the 20th-largest accounting firm in the United States, but he's not an accountant. He works with hard dr

ives and various other types of computer equipment strewn across several desks. Sgromolo, spends his days culling together bits and pieces of data people think they have erased from existence months, even years, before. His findings have been used in cyber-crime cases and murder investigations. Sgromolo engages in: a. data mirroring b. data mining c. digital forensics d. data combing e. data sleuthing
Computers and Technology
2 answers:
blsea [12.9K]3 years ago
5 0

Answer:c. digital forensics

Explanation:Digital forensic refers to the computer evidence that is identified and extracted in order to be used in court. Basically it is a science of finding digital evidence from a computer,mobile phone,server or netowrk.

According to John Sgromolo there are multiple layers of history that are found on every computer and disk.

The operating system may not indicate their presence but they are still there.

He said that a person can open a file, type on it and not save it , even if they typed only a single letter but there is a historic mark of that action already recorded on the hard drive.

It will only require an expert to get rid of such evidence however even when that is done it can still be retrieved.

he said all of this on the Business news written August 14 2004 by David Reich Hale

pishuonlain [190]3 years ago
3 0

Answer:

Sgromolo engages in data mirroring

Explanation:

The end goal of data mirroring is to increase data protection by providing shields to a computer system thereby preventing it from data loss and other possible losses due to data failures.

The technique used in data mirroring is that, it uses realtime protection of data by taking a data and replicating the exact copy without adding to or removing from it, to another storage location.

In this technique, Sgromolo picks up these data people think are n longer usable, and duplicated by being written to two or more identical hard drives, all of which are connected to one disk controller card.

You might be interested in
How could the provisions in the new health reform bill improve access to care?
VashaNatasha [74]
The Affordable Care Act will significantly change health coverage and care, bringing us closer to the goal of high-quality, affordable health insurance for all Americans. The law:

expands Medicaid to more low-income Americans
creates health insurance marketplaces (also known as "exchanges") where consumers can buy high-quality, affordable private plans
protects consumers by eliminating coverage denials for people with pre-existing conditions, requiring health insurance companies to spend the majority of premium dollars on health care, offering free preventive services, and more
4 0
4 years ago
A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or
Korolek [52]

Answer:

- agitator hacktivist

Explanation:

There are various terms which are described below:

activist cyber: when a person uses online campaigning by non-violation means like social media or other online platforms to create their activism is known as activist cyber.

agitator hacktivist: when a person uses illegal ways to bring change in political point by hacking or theft the information from the internet or bring the system down is known as agitator hacktivist.

ethical hacker: when a person uses legal ways to make a system safe from any type of malicious attack by removing the weakness of the system is known as the ethical hacker.

cybersquatter: when a person buys a domain name with the vision of selling it to the company needed it at very high prices, it is known as a cyber squatter.

so, according to the scenario the most appropriate answer is agitator hacktivist.

4 0
3 years ago
When should you save your document?
Verdich [7]

Answer:

b. when you have completed a document

4 0
3 years ago
Read 2 more answers
The process of arranging the item of a column in some sequence or order is known as?
MatroZZZ [7]

answer: sorting??  

(hope it helps)

6 0
2 years ago
Using Microsoft Word, write a 250-word essay on the fading of home telephone use with the advent of recent technology, and share
pochemuha
This is something you should pay for bro. shame on you. I’m telling your mom.
3 0
3 years ago
Other questions:
  • Help plz
    5·1 answer
  • An expression that has correctly paired delimiters is called a(n)
    6·1 answer
  • An installed theme can be applied by clicking on a theme in the themes group on the ____ tab.
    7·2 answers
  • Consider the following classes: public class Vehicle {...} public class Car extends Vehicle {...} public class SUV extends Car {
    8·1 answer
  • Wich technology can a website use to allow you to listen to a concert live over the internet?
    10·1 answer
  • In C++ write a program that prints out PI as a type double and a type float EXACTLY as shown below. Your program should have ONE
    13·1 answer
  • How do i make spaces in python<br> To draw hello world
    15·1 answer
  • Which of the following is an easy steps to take to avoid ESSD well working on your computer?
    5·1 answer
  • The following statements regarding centralized administration concepts are presented to you in an interview in which only one of
    5·1 answer
  • What is a possible weakness of an expert-novice pair?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!