1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ss7ja [257]
3 years ago
10

g Define several forms of metadata that can be useful to an investigation. How are valuable to an investigator

Computers and Technology
1 answer:
Grace [21]3 years ago
6 0

Answer:

Metadata is defined as “data about data”. It is used to provide information about a specific file or document. Computer forensics experts uses metadata to understand what activities were transpiring on a digital device such as a computer and mobile phone. For example, electronic medical records metadata is crucial when investigating whether a medical professional  has altered a patient’s medical record to reflect information that isn’t accurate. Examples of file name , file extension , file size , hash value , date last accessed , date created  and date last modified.

Explanation:

Form of metadata include:

Images : The location (latitude and longitude coordinates) where the photo was taken if a GPS-enabled device, such as a smartphone, is used.

Camera settings, such as ISO speed, shutter speed, focal length, aperture, white balance, lens type and many more. In fact some cameras do include the location coordinates.

PDF files : Author’s name, usually the name assigned when the program used to create the file was first installed.  Examples metadata obtainable  from a PDF file include version and name of the program used to create the file , Title of the document , keywords , date and time of file creation / last modification .

Text files : Depending on the program used to create the document, the data may include:  the names of all the different authors , lines of text and comments that have been deleted in previous versions of the document

and creation and modification dates.

Videos : Metadata in video files can be divided in two sections . The automatically generated and the manually added metadata. Automatically generated includes includes creation date, size, format, CODECS, duration, location.  Manually added metadata includes information about the footage, text transcriptions, tags, further information and notes to editors..etc.

Audio : Audio metadata is similar to video but more widely used especially to register property of the file. In addition to that it can includes creation date, size, format, CODECS, duration and a set of manually added data like tags, artist information, art work, comments, track number on albums, genre etc.

Communication : Metadata in communication depends on the type of communication used (i.e. email, mobile phone, smartphone..etc). But in general it can reveal the following: ids of the sender and the receiver , date and time of communication , location , mode of communication etc.

You might be interested in
You have to communicate a signal in a language that has 3 symbols A, B and C. The probability of observing A is 50% while that o
Vlada [557]

Answer:

Huffman code is use for encoding the language. The entropy when calculated is 1.5.

Explanation:

Using Huffman Coding scheme to encode:

The huffman coding scheme is described in the attachment.

To find entropy; we use the formula given below:

H = ∑p log_{2}  \frac{1}{p}

where H = Entropy and p = probability

p(A) = 50% = 1/2

p(B) = 25% = 1/4

p(C) = 25% = 1/4

H = \frac{1}{2} log_{2} 2 + \frac{1}{4}  log_{2} 4+ \frac{1}{4} log_{2}4\\H = \frac{1}{2}(1) + \frac{1}{4}(2) + \frac{1}{4}(2)\\H = \frac{1}{2} + \frac{2}{4} + \frac{2}{4}\\H = \frac{1}{2} + \frac{1}{2} + \frac{1}{2}\\H = \frac{3}{2}\\H = 1.5

Download pdf
7 0
3 years ago
An extranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the comp
DerKrebs [107]

Answer:

A) False

Explanation:

Extranet

An extranet acts as a shared network, disseminating information present on the intranet. That is, if a private intranet shares some of its content with other users (be they sellers, customers, etc.), this shared network is what we call the extranet.

Intranet

Today, companies are looking for tools and methods to align internal communication, reduce costs, and centralize information and files. The intranet is one of these tools, which works restricted to a specific audience, such as a company. This way, collaborators can access it with their specific username and password.

The intranet is, then, a closed and internal network, and still allows the use of more communication protocols besides HTTP. Intranet access is typically done on a local server and a local network, which we call LAN, which means Local Area Network installed within the company.

This internal network connects users, allowing information exchange, file and document management, centralizing communication between users. With this tool, you can quickly and securely and efficiently connect companies and departments.

4 0
3 years ago
I need Help!!<br> 4. Explain the importance of including negative space as part of a design.
vova2212 [387]
Negative space is the space between, within and surrounding an object in an image. The positive space is the focus of the image, the object itself, but the negative space is just as important. It shares edges with the positive space, defining the outline of the object and creating proportion
5 0
3 years ago
A 1024-bit message is sent that contains 992 data bits and 32 CRC bits. CRC is computed using the IEEE 802 standardized, 32-degr
Studentka2010 [4]

Answer:

a) Yes

b) Yes

c) Yes

d) No

e) Yes

f) No

Explanation:

a) All single-bit errors  are caught by Cyclic Redundancy Check (CRC) and it produces 100 % of error detection.

b) All double-bit errors for any reasonably long message  are caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit. It also produces 100 % of error detection.

c) 5 isolated bit errors  are not caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit since CRC may not be able to catch all even numbers of isolated bit errors so it is not even.

It produces nearly 100 % of error detection.

d) All even numbers of isolated bit errors may not be caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit. It also produces 100 % of error detection.

e) All burst errors with burst lengths less than or equal to 32 are caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit. It also produces 100 % of error detection.

f) A burst error with burst length greater than 32 may not be caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit.

Cyclic Redundancy Check (CRC) does not detect the length of error burst which is greater than or equal to r bits.

4 0
3 years ago
Robert and Anne, a married couple filing jointly, have an adjusted gross income of $68,676. They claim two exemptions, and can d
artcher [175]

Answer:

the answer is B

Explanation:

Just took the test

8 0
3 years ago
Read 2 more answers
Other questions:
  • All languages from the second generation on must be translated into machine language for the computer to be able process the inp
    8·1 answer
  • What is the duty of business to contribute to the well-being of society
    12·1 answer
  • 2.2-2 Consider sorting numbers stored in array by first finding the smallest element n A of and exchanging it with the element i
    11·1 answer
  • To make IPv4 addresses a little easier for human beings to understand, the 32-bit binary addresses are represented by dotted dec
    9·1 answer
  • Which feature of spreadsheet software will make it easier for you to find the average number of calls made per hour for each emp
    15·1 answer
  • Write a program in c++ that plays a number guessing game with a Human user. The Human user will think of a number between 1 and
    7·2 answers
  • Question 1:
    5·1 answer
  • In 3-5 sentences describe whether or not files should be deleted from your computer explain your answer
    12·1 answer
  • g How safe is to have a LinkedIn account where you have published all the important information about yourself
    13·2 answers
  • 1) What is Database? List its Uses.<br>​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!