1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RSB [31]
3 years ago
8

If the computer has an encrypted drive, a ____ acquisition is done if the password or passphrase is available. a. passive b. sta

tic c. live d. local
Computers and Technology
1 answer:
Aleonysh [2.5K]3 years ago
7 0

Answer: C. Live

Explanation:

A live acquisition is where data is retrieved from a digital device directly via its normal interface such as activating a computer and initiating executables. Doing so has a certain level of risk because data is highly likely to be modified by the operating system. The process becomes significantly more common likely with less available disk space to the point of completely impractical to image.

You might be interested in
Which function can NOT be performed using the Conditional Formatting option?
Liono4ka [1.6K]

Answer:D is the answer to this one

5 0
3 years ago
Read 2 more answers
How to turn off do not disturb on iphone for a contact.
Tresset [83]

Answer:

Okay so you turn your phone on scroll up and it well show everything click the moon and on the side of your phone there is alittle swice turn it right

Explanation:

3 0
2 years ago
Read 2 more answers
Write a SELECT statement that displays each product purchased, the category of the product, the number of each product purchased
Blababa [14]

Answer:

y6ou dont have mind

Explanation:

6 0
3 years ago
In what type of cluster does every server perform useful work so that if one fails, the remaining servers take on the additional
77julia77 [94]
<span>The term computer cluster denotes a combination (clustering) of two or more servers that are interconnected to appear as one. </span>In the symmetric server cluster every server perform useful work so that if one fails, the remaining servers take on the additional load.
<span>In this type of cluster system all N hosts are running the application.</span>
7 0
3 years ago
Give differensess between Container element and empty element in computer please give answer Help​
k0ka [10]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

There are containers and empty elements or tags in computer discipline such as in HTML language.  

Empty element:

These are the elements are the tags that have no content inside them and these elements or tags do not have end tags. for example the break tag in HTML such as <br> etc.

Container elements or tags:

These elements or tags have content inside them, they have opening and closing tags, unlike empty tags. for example paragraph tag, bold tag, and italic tag. These tags have opening and as well as closing tags. and between them, there is some content inside them.

the example of container tags is given below:

  • <html> html code / html contents</html>
  • <p>this is a<b>pargraph</b>container</p>

7 0
3 years ago
Other questions:
  • Tina reported a safety hazard at her workplace to OSHA. Representatives from OSHA
    5·1 answer
  • Which one of these is the most commonly used hardware interface for attaching peripherals to a microcomputer?
    8·1 answer
  • Any thoughts to the answer
    7·2 answers
  • To what would you compare the transport layer?
    14·1 answer
  • Implement a function getContent() that takes as input a URL (as a string) and prints only the text data content of the associate
    6·1 answer
  • Which best describes how a supporting database will be structured?
    10·1 answer
  • Pls help will give brainlest!!! The image shows a line graph. Which scientist is most likely to use this visual aid in a present
    15·1 answer
  • In 1868 the qwerty keyboard was patented by this man
    5·1 answer
  • How could the following line of code be shortened?
    11·1 answer
  • A____consists of many users and their information.​
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!