1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weqwewe [10]
3 years ago
9

John Sgromolo works for the 20th-largest accounting firm in the United States, but he's not an accountant. He works with hard dr

ives and various other types of computer equipment strewn across several desks. Sgromolo, spends his days culling together bits and pieces of data people think they have erased from existence months, even years, before. His findings have been used in cyber-crime cases and murder investigations. Sgromolo engages in: a. data mirroring b. data mining c. digital forensics d. data combing e. data sleuthing
Computers and Technology
2 answers:
blsea [12.9K]3 years ago
5 0

Answer:c. digital forensics

Explanation:Digital forensic refers to the computer evidence that is identified and extracted in order to be used in court. Basically it is a science of finding digital evidence from a computer,mobile phone,server or netowrk.

According to John Sgromolo there are multiple layers of history that are found on every computer and disk.

The operating system may not indicate their presence but they are still there.

He said that a person can open a file, type on it and not save it , even if they typed only a single letter but there is a historic mark of that action already recorded on the hard drive.

It will only require an expert to get rid of such evidence however even when that is done it can still be retrieved.

he said all of this on the Business news written August 14 2004 by David Reich Hale

pishuonlain [190]3 years ago
3 0

Answer:

Sgromolo engages in data mirroring

Explanation:

The end goal of data mirroring is to increase data protection by providing shields to a computer system thereby preventing it from data loss and other possible losses due to data failures.

The technique used in data mirroring is that, it uses realtime protection of data by taking a data and replicating the exact copy without adding to or removing from it, to another storage location.

In this technique, Sgromolo picks up these data people think are n longer usable, and duplicated by being written to two or more identical hard drives, all of which are connected to one disk controller card.

You might be interested in
A ______________ is a document created when planning resource management to help promote teamwork and clarify team communication
Ivahew [28]

Answer: team contract

Explanation:

A team contract is a document created when planning resource management to help promote teamwork and clarify team communications. This document helps to sort out which are the most important matters and needs more importance to be given.

It help to guide and give proper management of resources for a project or an organization. It also ensures that the members of the team abide by its set of rules defined within the team contract.

5 0
3 years ago
In which type of attack do you get malicious code in links from seemingly reliable websites?
natali 33 [55]

I think it is C. cross-site scripting

6 0
3 years ago
Explain how power surges can affect computers and how this problem can be minimised or removed<br>​
Crank

Answer:

It places electrical pressure on the wires in your computer, causing them to heat up and burn. Some wires may melt and even if your computer survives the surge, the strain alone can cause damage in the long run. A way to minimize a power surge is to use a surge protector.

6 0
3 years ago
The ___________ method returns the length of an array.
MaRussiya [10]

Answer:

A. Append

Explanation:

4 0
3 years ago
Read 2 more answers
Jean has created a database to track all of this month’s family meals. To find an entry for lasagna, what would should Jean do?
Nutka1998 [239]
A or d


A edit data

And
.
,
D sort of data
6 0
3 years ago
Other questions:
  • What is the f(n) runtime of the following pseudocode: sum-0 for A = N/2 downto 1 for B-1 t increment sum by B Explain: exactly w
    13·1 answer
  • The space force enhancement function concerned with providing data on meteorological, oceanographic, and space environmental fac
    12·1 answer
  • 1. What is Java SE?
    11·2 answers
  • To see all of the records at once, you should use _______ view. 
    12·2 answers
  • What specific authentication method has no encryption for user credentials or data, and is not recommended for most applications
    14·1 answer
  • Design and implement a class dayType that implements the day of the week in a program. The class dayType should store the day, s
    11·1 answer
  • A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations.
    12·1 answer
  • Derek has to create a technical design of a complex floor plan using CAD. What will be most helpful for Derek to use to create t
    8·1 answer
  • Monster Collector
    7·1 answer
  • Question 2
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!