1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetoff [14.1K]
3 years ago
11

What are digital forensic techniques? A. Identifying, extracting, and evaluating evidence obtained from digital media such as co

mputer hard drives, CDs, DVDs, and other digital storage devices B. A series of tools and techniques used to prevent forensic examination from identifying an attack or attacker C. A set of concepts and practices that provide detailed descriptions and comprehensive checklists, tasks, and procedures for common IT practices D. A distributed data protection technology that leverages deep analysis, context evaluation, and rules configured from a central console to ensure confidential information remains secure while in use, in transit, and at rest
Computers and Technology
1 answer:
Naya [18.7K]3 years ago
6 0

Answer:

It's A.

Explanation:

the steps in digital forensics.

For those working in the field, there are five critical steps in computer forensics, all of which contribute to a thorough and revealing investigation.

Policy and Procedure Development.

Evidence Assessment.

Evidence Acquisition.

Evidence Examination.

Documenting and Reporting.

You might be interested in
How do graphic designers showcase their work?
Luda [366]

They showcase it digitally since their work is done on computers.

6 0
4 years ago
Read 2 more answers
I'm not sure how to do these. By the way, it has to be python.
frutty [35]

Task 1:

float75 = float(75)

string75 = "75"

# you cannot add together a number and a string because a string has no inherent numerical value like a number does.

Task 2:

num = float(input("Enter a number"))

print(num**2)

Task 3:

num = int(input("Enter an integer: "))

print("When you divide "+str(num)+" by 7, the quotient is "+str(num//7)+" and the remainder is "+str(num%7)+".")

Task 4:

gigs = int(input("How many gigabytes does your flashdrive hold? "))

print("A flashdrive with "+str(gigs)+ " gigabyte(s) holds "+str(gigs*8589934592)+" bit(s).")

For task 4, you might have to change the number 8589934592 to something else. I'm not entirely sure how many bits are in a gigabyte. I hope this helps though.

6 0
3 years ago
A wireless network does not benefit like a wired network does, when it comes to collision reduction. Which device reduces collis
Leviafan [203]

Answer:

Switch

Explanation:

The network switch is an networking hardware also known as a network bridging device used to connect devices on the network together and receives and forward data from source to destination through packet switching.

In order to eliminate or reduce collision within the network, present day wired networks make use of network switches that connects each device to its own port on the switch, making the switch the domain of collision for half duplex links or whereby the link is a full duplex links the collision possibility is completely eliminated.

3 0
3 years ago
Indenting the start and finish of segments
Georgia [21]

THAT IS THE ANSWER 1)requires the new programmers to insert comments o their own  


5 0
3 years ago
Read 2 more answers
Can someone tell me how to get rid of the the orange with blue and orange on the status bar
igor_vitrenko [27]

Answer:

Explanation:

i'm not sure how tho

5 0
3 years ago
Read 2 more answers
Other questions:
  • It is a good idea to use more than one typeface in a document when _____.
    8·2 answers
  • Question 1 of 20 :
    15·2 answers
  • There are n tasks to complete. Each task first needs to be preprocessed on a supercomputer and then finished on one of n process
    12·1 answer
  • What is the difference between chrome and chromium browser?
    9·1 answer
  • What does “int” means in php code
    13·1 answer
  • ______________ is only one of the marketing mix tools that acompany uses to achieve its marketing objectives.
    7·1 answer
  • In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of s
    6·2 answers
  • Which of the following laptop features allows users to overcome keyboard size restrictions?
    11·1 answer
  • Which of the following barriers to oral communication is not the fault of the sender or receiver? being unprepared noise not pay
    12·2 answers
  • For a business that is properly using a social media information system, the system can
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!