1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dominik [7]
3 years ago
5

A digital forensic analyst examines the original digital source (e.g. computer, flash drive, backup tape) suspected of being inv

olved in a cyber crime just as the traditional forensic analyst examines the original gun or knife suspected of being used in a murder investigation. True False
Computers and Technology
1 answer:
mel-nik [20]3 years ago
6 0

Answer: True

Explanation:

Digital forensic analysts are the people who examine digital devices such as cameras, mobile phones and computers in order to get evidence of crime.

The evidence gotten by them can then be used to provide support to criminal investigations and can also be given to the intelligence agencies. Their function is to get back and safeguard the digital data which are related to cybercrime investigations as well as criminal investigations.

You might be interested in
: Chronic state of ____________________, unrealistic & excessive worry about two or more life ____________________
suter [353]

The Chronic state of  generalized anxiety disorder is an unrealistic and excessive worry about two or more life that  last for at least six months.

<h3>What disorder is chronic worry?</h3>

Generalized Anxiety Disorder, GAD, is known to be a form of an anxiety disorder that is known by:

  • chronic anxiety
  • exaggerated worry
  • tension and others.

Note that it is also called an excessive or unrealistic worry in regards to life circumstances that is said to occur for about at least six months.

Hence, The Chronic state of  generalized anxiety disorder is an unrealistic and excessive worry about two or more life that  last for at least six months.

Learn more about Generalized Anxiety Disorder from

brainly.com/question/22676443

#SPJ1

6 0
2 years ago
HELLLLLLLLLLLLLLLLLLLLP PLSSSSSSSSSSS HELLLLLLLLLP
motikmotik

Answer:

i think it is c. whatever that is.

Explanation:

because its not any of those. D. is exceptional tho

hope this helps!  :)

3 0
3 years ago
Which of the following is NOT part of the Ethernet standards? O 1.802.3 O 2.802.2 O 3 LLC O4 pPp
mote1985 [20]

Answer: 2) 802.2

Explanation: Ethernet standard are the standard for the networking technology for the transmission of the data.The ethernet is requires for the node connection and then forming the framework for the transmission of information.There are several standards for Ethernet.

802.3 is Ethernet standard that works on 10 Mbps rate, PPP(point to point protocol) is the standard that connects the internet service provider using modem and LLC(logical link control) is a standard for 802 .There is no 802.2 standard present in the ethernet standard.Thus,the correct option is option(2).

7 0
3 years ago
In the previous activity the learner developed an idea for a game, this included the game plot, storyline, characters, interacti
Neko [114]

Answer:

I hope this helps, this is my first time doing an answer in Brainly.

Explanation:

The game concept will be this, your character, being a green lizard, will jump from platform to platform. Constantly scrolling up with the character, but if you fall behind, it's game over.

If I know anything about smartphones is the the screens are usually tiny, and are very hard to play on. So I will impliment motion controls. If you tilt the screen in the direction you want the lizard to go, it will follow that tilt.

The pros is that it's a lot more easy when developing the game, the cons is that the games are usually super small.

3 0
2 years ago
true or false? spreadsheets provide more options for graphical representation of the data than databases​
myrzilka [38]

Answer: True. Its true and it will be true.

8 0
3 years ago
Other questions:
  • What are the two different frequencies WiFi operates on?
    9·2 answers
  • Which of the following terms describes a type of useful and legitimate software that is distributed by a developer where they do
    10·1 answer
  • A _____ defines what must take place, not how it will be accomplished.​
    12·1 answer
  • Mail merge allows for the sending of an email to multiple recipients. True False
    14·2 answers
  • What is one pass of a coding sequence called?​
    13·2 answers
  • You started writing a paper yesterday. You worked on it again today. After a few hours, you realized that you have introduced so
    15·2 answers
  • What is the IP address and TCP port number used by the client computer (source) that is transferring the file to gaia.cs.umass.e
    9·1 answer
  • According to the video, what are some concerns of Webmasters? Check all that apply.
    7·2 answers
  • over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. you need a way to track w
    11·1 answer
  • Which of the following was the first computer-animated film to win animated film to win an academy award?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!