1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetoff [14.1K]
3 years ago
11

What are digital forensic techniques? A. Identifying, extracting, and evaluating evidence obtained from digital media such as co

mputer hard drives, CDs, DVDs, and other digital storage devices B. A series of tools and techniques used to prevent forensic examination from identifying an attack or attacker C. A set of concepts and practices that provide detailed descriptions and comprehensive checklists, tasks, and procedures for common IT practices D. A distributed data protection technology that leverages deep analysis, context evaluation, and rules configured from a central console to ensure confidential information remains secure while in use, in transit, and at rest
Computers and Technology
1 answer:
Naya [18.7K]3 years ago
6 0

Answer:

It's A.

Explanation:

the steps in digital forensics.

For those working in the field, there are five critical steps in computer forensics, all of which contribute to a thorough and revealing investigation.

Policy and Procedure Development.

Evidence Assessment.

Evidence Acquisition.

Evidence Examination.

Documenting and Reporting.

You might be interested in
Consider a relation BOOKS that holds information about the inventory of books (used or new) in a bookstore with attributes (titl
galina1969 [7]

Answer:

Please see the attached file for the complete answer.

Explanation:

Please Read the flow chart very carefully and try to read it as one Picture, Because Picture size is large.

Download pdf
4 0
3 years ago
You are driving on expressway with three lanes in your direction at a speed lower then
Kaylis [27]

<em>ANSWER:</em>

<em></em>

<h2>Pass on the left<em> </em></h2>

6 0
4 years ago
Read 2 more answers
Write code that inserts userItems into the output string stream itemsOSS until the user enters "Exit". Each item should be follo
Yuki888 [10]

Answer:

The solution code is written in Python:

  1. itemsOSS = ""
  2. userItem = input("Enter an item: ")
  3. while(item != "Exit"):
  4.    itemsOSS += userItem + " "
  5.    userItem = input("Enter an item: ")
  6. print(itemsOSS)

Explanation:

Firstly, we create a variable itemsOSS (intialized it with empty string) and use it as output string stream (Line 1).

Next use input function to prompt user to enter first item (Line 2)

While the item value is not "Exit" (Line 4), append userItem to variable itemsOSS.

When the user enter "Exit", use print function to print the itemsOSS string (Line 8).

8 0
3 years ago
What is office technology?​
Aleks [24]

Answer:

Office technology refers to the use of computer systems, software and networks for processing and distribution of data and communicating information in the organization.

3 0
3 years ago
The following pseudocode describes how to extract the dollars and cents from a price given as a floating-point value. For exampl
castortr0y [4]

Answer:

import java.util.Scanner;

public class Main

{

public static void main(String[] args) {

    Scanner input = new Scanner(System.in);

 

 double price;

 int dollars, cents;

 

 System.out.print("Enter price: ");

 price = input.nextDouble();

 

 dollars = (int) price;

 cents = (int) (((price - dollars) * 100) + 0.5);

 

 System.out.println("Dollars: " + dollars + ", " + "Cents: " + cents);

}

}

Explanation:

Ask the user to enter price

Typecast the price as int and set it to the dollars

Subtract dollars from price, multiply the difference by 100, add 0.5 to the multiplication and type cast the result as int

Print the dollars and cents

4 0
3 years ago
Other questions:
  • State one advantage of organising data into columns and rows
    11·1 answer
  • What is the service provided by a third party (such as an ISP) that enables you to connect another cloud directly to your Google
    15·1 answer
  • Consider the problem of finding the distance between the two closest numbers in an array of n numbers. (The distance between two
    13·1 answer
  • What are the advantages and disadvantages of solving a problem that can be broken down into repetitive tasks with recursion as o
    13·1 answer
  • Indicate the order that the three files will be processed <br><br> Please answer
    15·1 answer
  • Type the correct answer in the box. Spell all words correctly. Joseph is a digital media developer and has years of work experie
    15·1 answer
  • State what is meant by the terms: Parallel data transmission ...................................................................
    8·1 answer
  • How do the interests of carriers differ from the interests of websites? What are the implications for websites from a value chai
    8·1 answer
  • Hello. I really need this done ASAP. Don't scroll down. JUst look please.
    14·2 answers
  • In what order will the transmission control protocol (tcp) generally send all segments
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!