<u><em>Answer:</em></u>
<u><em>The speed is </em></u>
<u><em>=
</em></u>
<u><em>30
</em></u>
<u><em>m
</em></u>
<u><em>s
</em></u>
<u><em>−
</em></u>
<u><em>1
</em></u>
<u><em>
</em></u>
<u><em>Explanation:
</em></u>
<u><em>The speed of a wave is given by
</em></u>
<u><em>
</em></u>
<u><em>speed
</em></u>
<u><em>(
</em></u>
<u><em>m
</em></u>
<u><em>s
</em></u>
<u><em>−
</em></u>
<u><em>1
</em></u>
<u><em>)
</em></u>
<u><em>=
</em></u>
<u><em>frequency(Hz)
</em></u>
<u><em>×
</em></u>
<u><em>wavelength (m)
</em></u>
<u><em>
</em></u>
<u><em>The frequency is </em></u>
<u><em>f
</em></u>
<u><em>=
</em></u>
<u><em>100
</em></u>
<u><em>H
</em></u>
<u><em>z
</em></u>
<u><em>
</em></u>
<u><em>The wavelength is </em></u>
<u><em>λ
</em></u>
<u><em>=
</em></u>
<u><em>0.3
</em></u>
<u><em>m
</em></u>
<u><em>
</em></u>
<u><em>The speed is
</em></u>
<u><em>
</em></u>
<u><em>v
</em></u>
<u><em>=
</em></u>
<u><em>λ
</em></u>
<u><em>f
</em></u>
<u><em>=
</em></u>
<u><em>0.3
</em></u>
<u><em>⋅
</em></u>
<u><em>100
</em></u>
<u><em>=
</em></u>
<u><em>30
</em></u>
<u><em>m
</em></u>
<u><em>s
</em></u>
<u><em>−
</em></u>
<u><em>1
</em></u>
<u><em>
</em></u>
<u><em></em></u>
<u><em></em></u>
<u><em></em></u>
Answer:
an algorithm (pronounced AL-go-rith-um) is a procedure or formula for solving a problem, based on conducting a sequence of specified actions. A computer program can be viewed as an elaborate algorithm. In mathematics and computer science, an algorithm usually means a small procedure that solves a recurrent problem.
Answer:
C. DAT-1
Explanation:
Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.
Common hashing algorithms applied, include; the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.