1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irakobra [83]
3 years ago
7

Digital forensics involves the _____, identification, extraction, documentation, and interpretation of digital media.

Computers and Technology
1 answer:
NikAS [45]3 years ago
5 0

The correct answer to the missing blank portion of the question about digital forensics is; Preservation

<h3>What is digital forensic?</h3>

Digital Forensics is defined as the process of preservation, identification, extraction, and documentation of computer evidence that can be used by the court of law.

Now, digital forensics is also the  science of finding evidence from digital media like a computer, mobile phone, server, or network. Thus, It is used to provide a forensic team with the best techniques and tools required to solve complicated digital-related issues.

Read more about Forensics at; brainly.com/question/19238665

You might be interested in
A voice engineer is setting up a Cisco 2951 Integrated Services Router with Cisco Unified Communications Manager Express. To ena
o-na [289]

Answer:

voice service voip

Explanation:

Voice over Internet Protocol feature allows users to make voice calls by making use of a broadband internet connection. The Voice engineer is setting up a Cisco 2951 Integrated Services Router with Cisco Unified Communications Manager Express, which happens to fall under broadband internet connection and hence the command the engineer will enter must be a voice service voip.

8 0
3 years ago
As we think of computer crime, there are ways in which thieves can steal your banking information through ATM machines. If you w
Travka [436]

Answer:NO, I WILL NOT GIVE THE TELEPHONE NUMBER

WHY?

IT IS A BREACH OF TRUST

IT IS A BREACH OF DATA PRIVACY

IT ALSO VIOLATES THE PRIVACY OF INFORMATION RIGHT OF THE GIRL.

Explanation:BREACH OF TRUST is act or actions taken against the signed agreement between a person and another party which may be any Organisation like a Financial Institution where the Financial Institution agrees not to release the personal Information about their customer without the person's consent.

IT IS A BREACH OF DATA PRIVACY many persons wants their data which are made available to Organisation to be kept private,divulging such information without the person's consent is a reach of data privacy.

It violates the privacy of Information right of the Girl, except for Security or other specified reasons no Organisations or person is given the right to divulge another person's right to a third party, ALL THESE VIOLATIONS ARE PUNISHABLE UNDER THE LAWS OF THE LAND.

4 0
3 years ago
Which type of operating system is usually used in personal computers?
jeyben [28]

Answer:

A GUI based operating system is usually used in personal computers

Explanation:

The three most common operating systems for personal computers are Microsoft Windows, macOS, and Linux. Modern operating systems use a graphical user interface, or GUI (pronounced gooey).

4 0
3 years ago
Dave and Kirk are learning about electromagnetic waves in class. Dave says that gamma rays are the most dangerous because they c
katen-ka-za [31]

I’d say A: Dave is partly right in his answer that gamma rays are the most dangerous, but it is because of their frequency and wavelength, not where they come from.

Gamma rays are the most intense and thus, most harmful electromagnetic waves. Gamma rays radiation poisoning is difficult to shield against. These rays have the most energy and can go through six feet of concrete and damage your DNA as well. The higher the energy waves (gamma, x-ray), the shorter the wavelengths

7 0
3 years ago
What is the difference between congestion control and flow control? Where are each managed in TCP?
solniwko [45]

Answer: The differences between the flow control and congestion control are as follows:-

  • Flow control's traffic is controlled in the direction from sender to receiver whereas traffic control in congestion control be handles from the entrance of the network.
  • Sender is reason for the traffic in flow control while transport layer creates the traffic in congestion control.
  • Transport layer and data link layer are used for managing the traffic whereas congestion control has transport and network layer for handling the traffic.

The TCP for the congestion control works as elimination of the congestion in the sender's field in network layer and transport layer.Flow control is used in TCP to make surety about the non-overwhelming nature of sender towards receiver in the transport layer and data link layer.

4 0
3 years ago
Other questions:
  • A spreadsheet has some values entered: Cell A1 contains 10, cell A2 contains 14, cell A3 contains 7. You enter in cell A4 the fo
    6·1 answer
  • All java classes must contain a main method which is the first method executed when the java class is called upon.
    10·1 answer
  • To use an imported image, simply drag it from the desktop onto the stage. true or false?
    14·1 answer
  • Which is the fastest method of sharing public folders?
    8·1 answer
  • The practice of texting is most popular and what age group
    12·2 answers
  • Which payment method typically charge is the highest interest rates?
    12·1 answer
  • Which CSS attribute would change an element's font color to blue
    15·2 answers
  • Explain vividly any operating system of your choice stating at least 3 distinguishing features of each version.
    6·2 answers
  • What are the major benefits of preproduction?
    11·1 answer
  • In addition to developing sketches, computer-aided design programs are used by fashion designers to perform which task?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!