Answer:
In Client-Server Network, Centralized server is used to store the data.
Answer:
C. DAT-1
Explanation:
Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.
Common hashing algorithms applied, include; the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.
Answer:
// This program is written in C++ programming language
// Comments are used for explanatory purpose
// Program starts here
#include<iostream>
using namespace std;
int main ()
{
// Declare and initialize variables
float connecfee = 1.99;
float first3 = 2.00;
float addmin = 0.45; float cost;
int minutes;
// Prompt user for minutes talked
cout<<"Enter Number of Minutes: ";
cin>>minutes;
// Calculate cost;
if(minutes < 1)
{
cout<<"Enter a number greater than 0";
}
else if(minutes <= 3)
{
// Calculating cost for minutes less than or equal to 3
cost = connecfee + first3 * minutes;
cout<<"Talk time of "<<minutes<<" minutes costs "<<cost;
}
else
{
cost = connecfee + first3 * 3 + addmin * (minutes - 3);
cout<<"Talk time of "<<minutes<<" minutes costs "<<cost;
}
return 0;
}
// End of Program
Answer:
they cannot share your privacy with others without your concern