1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka2103 [35]
3 years ago
11

In which stage of investigation does a digital forensics expert perform self-assessment?

Computers and Technology
2 answers:
VMariaS [17]3 years ago
8 0
I think the answer might be b
Dmitriy789 [7]3 years ago
4 0
Evaluation is the answer
You might be interested in
Why can't I post a math question (here on brainly)? It just keeps loading it's been almost an hour.
liubo4ka [24]

Answer:

have you tried establishing a secure network?

Explanation:

8 0
2 years ago
Read 2 more answers
How are you today? I'm fine
sweet-ann [11.9K]

Answer:

no this is partick.

Explanation:

8 0
2 years ago
Read 2 more answers
He memory unit of a computer has 2 20 words. The computer has instruction format with four fields; an operation code field, a mo
Mashutka [201]

Answer:

Opcode = 3

Mode =2

RegisterRegister =7

AR = 20

Explanation:

a) Number of addressing modes = 4 = 22 , So it needs 2 bits for 4 values

Number of registers = 65 = 1000001 in binary , So it needs 7 bits

AR = 20

Bits left for opcode = 32 -(2+7+20) = 3

3 0
3 years ago
Which key serves as both toggle and manipulative key
bogdanovich [222]

Answer:

wheres the picture?

Explanation:

I need a picture 2 answer

7 0
2 years ago
Read 2 more answers
The average, year after year conditions of temperature, precipitaion,winds and clouds in area is the best description of ?
GarryVolchara [31]

Answer:

The average, year after year, conditions of temperature, precipitation, winds and clouds in an area.

8 0
3 years ago
Other questions:
  • To save a file so that it can be opened on most computers, select the _____ option.
    9·2 answers
  • ​______________________ is a general security term that includes computer​ viruses, worms, and trojan horses.
    13·1 answer
  • Namespaces are guaranteed to be unique.<br><br> True<br><br> False
    5·1 answer
  • you have a small network in your business with just a few network devices connected along with 22 linux computers and you want t
    7·1 answer
  • Consider the recursive method whose definition appear below. Why? public static String mysteryString (String s){ if(s.length()==
    10·1 answer
  • WHO HAS TWITCH<br> PLS FOLLOW ME MY TWITCH IS giaplayzgamez I'm uploading Videos Soon.
    11·2 answers
  • I need help <br> with a question<br> what can i write for ex when he mad
    13·2 answers
  • Consider the following declaration:
    11·1 answer
  • In company a, there is a team that performs day-to-day it operations with a focus on security. they are responsible for a wide r
    14·1 answer
  • What chage command should you use to set the password for jsmith to expire after 60 days and give a warning 10 days before it ex
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!