1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ss7ja [257]
3 years ago
10

g Define several forms of metadata that can be useful to an investigation. How are valuable to an investigator

Computers and Technology
1 answer:
Grace [21]3 years ago
6 0

Answer:

Metadata is defined as “data about data”. It is used to provide information about a specific file or document. Computer forensics experts uses metadata to understand what activities were transpiring on a digital device such as a computer and mobile phone. For example, electronic medical records metadata is crucial when investigating whether a medical professional  has altered a patient’s medical record to reflect information that isn’t accurate. Examples of file name , file extension , file size , hash value , date last accessed , date created  and date last modified.

Explanation:

Form of metadata include:

Images : The location (latitude and longitude coordinates) where the photo was taken if a GPS-enabled device, such as a smartphone, is used.

Camera settings, such as ISO speed, shutter speed, focal length, aperture, white balance, lens type and many more. In fact some cameras do include the location coordinates.

PDF files : Author’s name, usually the name assigned when the program used to create the file was first installed.  Examples metadata obtainable  from a PDF file include version and name of the program used to create the file , Title of the document , keywords , date and time of file creation / last modification .

Text files : Depending on the program used to create the document, the data may include:  the names of all the different authors , lines of text and comments that have been deleted in previous versions of the document

and creation and modification dates.

Videos : Metadata in video files can be divided in two sections . The automatically generated and the manually added metadata. Automatically generated includes includes creation date, size, format, CODECS, duration, location.  Manually added metadata includes information about the footage, text transcriptions, tags, further information and notes to editors..etc.

Audio : Audio metadata is similar to video but more widely used especially to register property of the file. In addition to that it can includes creation date, size, format, CODECS, duration and a set of manually added data like tags, artist information, art work, comments, track number on albums, genre etc.

Communication : Metadata in communication depends on the type of communication used (i.e. email, mobile phone, smartphone..etc). But in general it can reveal the following: ids of the sender and the receiver , date and time of communication , location , mode of communication etc.

You might be interested in
What effect do you think this will have on the program when you run it?
Mandarinka [93]
It depends on what program you are running.
8 0
3 years ago
It is necessary for us to verify and checked information before we shared online? Explain​
lesya [120]

Answer:

The answer is yes.

Explanation:

If you don’t check where the source is from and if it is verified, you may share an incorrect and false answer. Also, you may type in your personal information. This is <u>VERY</u> risky. Do <u>NOT</u> share your private information to strangers!

You can check your information by searching it up online or asking a teacher! There! I hope this helps! ;)

4 0
2 years ago
WILL MARK BRAINLIEST
ElenaW [278]
Adaptive I believe, or intuitive
5 0
3 years ago
Optimally, the __________ guides investment decisions and decisions on how ISs will be developed, acquired, and/or implemented.
BartSMP [9]

Answer: IT strategy

Explanation: IT(Information technology) strategy is the planning that is used in any particular organization for the  management of the resources, functions, operation etc to make sure that stakeholders, employees etc have the same aim of working. This method helps in sustainability and achieving the goals.

Other options are incorrect because network infrastructure is the structure made by the network nodes, SWOT(strength, weakness, opportunities and threats) analysis for the analyzation of organization or person, IT expertise level defines the stages persisting particular skills.Thus the correct option is IT strategy.

5 0
4 years ago
I'm performing a counterattack at Monster Legends! Join the game now too!
SIZIF [17.4K]

Answer:

maby later

Explanation:

8 0
4 years ago
Other questions:
  • What is the rarest/coolest/most valuable car you have ever seen in person?
    6·2 answers
  • You are given a network of 10.50.24.0/21, which contains 2,048 addresses. what subnet mask should you use to divide this into fo
    7·1 answer
  • Samantha was calculating a mathematical formula on an electronic spreadsheet. She used multiple values to recalculate the formul
    8·2 answers
  • When cleaning a computer, you need only worry about what you can see.
    8·1 answer
  • Complete the method, longestWord(), below that takes in an array of Strings and returns the longest String in the array. Note: y
    8·1 answer
  • Number of megabytes of RAM in a computer. qualitative or quantitative? because
    14·1 answer
  • A pointer can be used as a function argument, giving the function access to the original argument.
    8·1 answer
  • Complete the program below named CountVowels so that it reads in a string, counts all the vowels in that string, and prints out
    13·1 answer
  • ¿por que hay peligros en internet?
    11·1 answer
  • 9.2.8 last names codehs
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!