1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weqwewe [10]
3 years ago
9

John Sgromolo works for the 20th-largest accounting firm in the United States, but he's not an accountant. He works with hard dr

ives and various other types of computer equipment strewn across several desks. Sgromolo, spends his days culling together bits and pieces of data people think they have erased from existence months, even years, before. His findings have been used in cyber-crime cases and murder investigations. Sgromolo engages in: a. data mirroring b. data mining c. digital forensics d. data combing e. data sleuthing
Computers and Technology
2 answers:
blsea [12.9K]3 years ago
5 0

Answer:c. digital forensics

Explanation:Digital forensic refers to the computer evidence that is identified and extracted in order to be used in court. Basically it is a science of finding digital evidence from a computer,mobile phone,server or netowrk.

According to John Sgromolo there are multiple layers of history that are found on every computer and disk.

The operating system may not indicate their presence but they are still there.

He said that a person can open a file, type on it and not save it , even if they typed only a single letter but there is a historic mark of that action already recorded on the hard drive.

It will only require an expert to get rid of such evidence however even when that is done it can still be retrieved.

he said all of this on the Business news written August 14 2004 by David Reich Hale

pishuonlain [190]3 years ago
3 0

Answer:

Sgromolo engages in data mirroring

Explanation:

The end goal of data mirroring is to increase data protection by providing shields to a computer system thereby preventing it from data loss and other possible losses due to data failures.

The technique used in data mirroring is that, it uses realtime protection of data by taking a data and replicating the exact copy without adding to or removing from it, to another storage location.

In this technique, Sgromolo picks up these data people think are n longer usable, and duplicated by being written to two or more identical hard drives, all of which are connected to one disk controller card.

You might be interested in
William found out that someone used his report on American culture without his permission. What is William a victim of?
Mnenie [13.5K]

He is a victim of plagiarism.

Plagiarism is when someone steals someone else's work, to help benefit themselves. Taking credit for the other person work.

Hope this helps!

3 0
3 years ago
Read 2 more answers
Write a program to test the various operations of the class clockType
Umnica [9.8K]
The class clock type was designed to implement the time of day in a program. Certain applications, and additions to hours, minutes, and seconds, might require you to start at the time zone.
5 0
3 years ago
Web analytical packages can obtain the following information when someone visits a website, except Group of answer choices name
il63 [147K]

Answer:

name and address of web visitors.

Explanation:

A website refers to the collective name used to describe series of web pages linked together with the same domain name.

Web analytical packages are software features that are typically used for tracking the identity of a computer system by placing or adding cookies to the computer when it's used to visit a particular website. Thus, it's only used for tracking the identity of a computer but not the computer users.

This ultimately implies that, web analytical packages can obtain the geographic location, Internet connection type, and navigation source information when someone visits a website, but it cannot obtain the name and address of web visitors or users.

3 0
3 years ago
Which principle of design does a designer apply when they create rhythmic movement in a garment by using recurring pleats or det
WITCHER [35]

Answer:

Repetition, and regular rhythm

Explanation:

Its certainly repetition method, and repetition method is of three types which are repetition, pattern and rhythm.

Remember repetition can be boring at times as we need to read same thing again and again. However, repetition sometimes can be good like the one we are referring to, and the other one can be like placing the logo or menu at same place in all web page. And its since it creates a habit in us for reading the web pages, And hence we can understand faster, and it looks please to our eyes hence as well.  

4 0
3 years ago
A DFA is equivalent in power to an NFA. True False
sattari [20]

Answer: True

Explanation:

  Yes, the given statement is true that a DFA is equivalent to NFA in terms of power. For any type of NFA we can easily build an equal DFA so, the NFA are not much powerful as compared to DFA. Both NFA and DFA are characterized by a similar type of class.

DFA is a special case of NFA and They both defined in the same class of language. Each condition in the DFA get summarized by all the condition that the NFA has itself.

4 0
3 years ago
Other questions:
  • Why did LISD had to block the game “among us”?
    8·2 answers
  • The ____ contains the computer's "brain," the central processing unit (CPU).
    5·2 answers
  • Write a program that generates a random number between 5 and 15 and asks the user to guess what the number is. If the user’s gue
    5·1 answer
  • Which PowerPoint options can users customize?
    9·1 answer
  • Use fuel with the _____________ rating recommended by your vehicle manufacturer. A ) Converter B) Emission C) Exhaust D) Octane
    9·2 answers
  • Consider a system consisting of m resources of the same type, being shared by n processes. Resources can be requested and releas
    13·1 answer
  • . Explain and demonstrate the functionality of timer devices in an embedded system[
    9·1 answer
  • Favorite color should it be stored why?or why not?<br>​
    6·1 answer
  • Describe how to find and replace a text in a document​
    13·1 answer
  • When working with track changes, what is the difference between simple markup and all markup?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!