Answer:
C. DAT-1
Explanation:
Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.
Common hashing algorithms applied, include; the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.
Answer: an antivirus is a type of program designed to protect computers from viruses, spyware, botnets, rootkits, keyloggers and such. There are many versions and types of anti-virus programs which can be very helpful.
Such as:
Norton.
Kaspersky.
Ad Aware.
AVG
Mc Afee
Hope this helps u...
Explanation:
Answer:
Focus on facts.
Suggest improvements even in positive reviews.
Respond to the business if it offers to address your concern.
Explanation:
In order to establish credibility when posting complaints or reviews, focus must be on fact and must be well supported.
Readers will have more trust in a review that is balanced, therefore one must try to request suggestion for improvement even if the post is positive. Update can be done on original post to effect changes or bring in ideas gotten through communication with the business.
Since the website is permanent, one will be able to edit a post, but not to remove it. Also posts from unknown sources can be tracked, so transparency is needed
To move one slice of a pie chart away from the pie creates a(n) ____. exploded pie chart