1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RSB [31]
3 years ago
8

If the computer has an encrypted drive, a ____ acquisition is done if the password or passphrase is available. a. passive b. sta

tic c. live d. local
Computers and Technology
1 answer:
Aleonysh [2.5K]3 years ago
7 0

Answer: C. Live

Explanation:

A live acquisition is where data is retrieved from a digital device directly via its normal interface such as activating a computer and initiating executables. Doing so has a certain level of risk because data is highly likely to be modified by the operating system. The process becomes significantly more common likely with less available disk space to the point of completely impractical to image.

You might be interested in
Annalise received financial aid offers from two universities. Financial Analysis for Option A Costs per Year Financial Aid Packa
lara31 [8.8K]

Answer:

Option S will save her $15500

Explanation:

Room and board, someone is provided a sum of money in return for labor. The government does not ask for this money to be returned. This is earned by the student. Also, work-study is being given to the student, the fund in return of certainly part-time employment job which he/she does in free time. And hence it is clear from the above study that, A will save $15500, and hence this is the right answer as others are taken by the universities. And also B is saving $13000, and this is not an option given.

7 0
3 years ago
Read 2 more answers
QUESTION 1
PilotLPTM [1.2K]

1. c

2.a

3.c

hope this helps

plz mark brainliest

6 0
3 years ago
BRAINLIESTTTT How does a project manager evaluate the scope of a project?
Leokris [45]

Answer:

The first choice

Explanation:

I took the test and that was the correct answer

Hope it helped!

5 0
3 years ago
Question 1 :George, a user, is having trouble connecting to network resources, including shared folders on the local network and
vazorg [7]

Complete Question:

George, a user, is having trouble connecting to network resources, including shared folders on the local network and Internet resources. Yesterday he was able to connect with no problems. You need to ensure that he can connect to these resources. Which tool should you use FIRST?

Group of answer choices

A. ipconfig

B. Device Manager

C. My Network Places

D. Control Panel

Answer:

A. ipconfig

Explanation:

As a network administrator, to ensure that George can connect to the network resources, shared folders, and internet resources, the tool you should use first is the "ipconfig" in the command line. This is a troubleshooting process that would help to identify the problem and to establish a theory of probable cause.

<em>Since George could connect the previous day without any problem, it is most likely that the TCP/IP settings has been altered. Therefore, to view this settings you'll have to use an ipconfig command. </em>

4 0
4 years ago
The cost of a given amount of computing power has _____.
lana [24]

Answer:

decreased drastically over the last five decades

Explanation:

I would say it is that answer because a few decades ago we needed huuuge computers that filled rooms to compute simple tasks. Now we have cellphones, which are basically computers that can fit into the palm of our hands. Our phones can do more than what those huge computers of the past did and they're easier to produce. So cost must have drastically decreased.

3 0
3 years ago
Read 2 more answers
Other questions:
  • A prime number is a number that is only evenly divisble by itself and 1.
    12·1 answer
  • 7. While an adjacency matrix is typically easier to code than an adjacency list, it is not always a better solution. Explain whe
    5·1 answer
  • True or False
    13·1 answer
  • If Nancy receives an encrypted message from Matthew, which key does she use to read it? Nancy’s private key Nancy’s public key M
    8·1 answer
  • What is wrong with each of the following?
    6·1 answer
  • Let's practice Audience analysis by going to the Google Merchandise Store demo account with a date range of Feb 1, 2016 - Feb 29
    13·1 answer
  • Consider the following statement from the CS Principles course framework: The global distribution of computing resources raises
    12·1 answer
  • In this lab, you will use all of the graphics commands you have learned to create an animated scene. Your program should have a
    10·1 answer
  • Write a complete method from the client perspective that duplicates each element in place in a ListInterface object. For example
    8·1 answer
  • True or False? Voice recognition is the process of determining the meaning of the words spoken by a human.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!