computer ________ involves identifying, extracting, preserving, and documenting computer evidence.

Answers

Answer 1
computer forensics is the answer

Related Questions

Draw a flow chart showing the conversion of temperature from farenheit to degree celsius

Answers

I hope this answers help you

what is the answer ??​

Answers

= Option b Minicomputer ..........

Answer:

Minicomputer answer The HP 2100 is a series of 16-bit minicomputers that were produced by Hewlett-Packard (HP) from the mid-1960s to early 1990s. Bro please follow me we should help each other

did someone really hang themselves on wizard of oz

Answers

Answer:

Yes they did

Explanation:

If you look closely in the back, in the part where they sing where off to see the wizard the wonderful wizard of oz. Just look behind dorothy's head and you will see a man hanging himself

The light in a room must be turned on when there is one or more person in the room and turned off the rest of the time. A sensor is used to detect if there is someone in the room. Describe the use of a microprocessor to control the light in the room.

Answers

Answer:

ZOO WEE MAMA

Explanation:

ZOO WEE MAMA 23

what information most likely presents a security risk on your personal

Answers

An information which most likely presents a security risk on your personal social networking profile is: personal e-mail address or password.

A social networking profile can be defined as a database that contains information about the social characteristics and some personal details of an individual on social media websites.

Some of the social characteristics and details of an individual that are shared on social media websites include the following:

Date of birth.Occupation.Religion.Gender (sex).Location.Friends.

However, you should not share your personal e-mail address or password on any social media websites because with such information your social media account can be accessed by an attacker or a hacker.

In conclusion, personal e-mail address or password is a sensitive information that must never be shared on a social media website in order to avoid compromising the safety or security of your personal social networking profile.

Read more: https://brainly.com/question/21765376

What is the maximum number of guesses it will take to find a number between 1 and 1000? Explain your answer.

Answers

Answer:

The maximum number of guesses without binary search is 999 since we would be going sequentially and guessing the numbers. When we reach number 999 and find that is not the answer, we know it has to be 1000, and don't have to guess, so the number of max guesses is 999.

The maximum number of guesses to find a number between 1 and 1000 is 10, using a binary search algorithm. Each guess divides the search range in half until the number is found.

Given that,

The number we are trying to find is between 1 and 1000.

We are trying to determine the maximum number of guesses it would take to find this number.

To find the maximum number of guesses it would take to find a number between 1 and 1000, we can use a binary search algorithm.

In a binary search, we start by guessing the middle number, which in this case would be 500.

If the number we are looking for is higher than 500, we then guess the middle number between 501 and 1000, and so on.

If it's lower, we guess the middle number is between 1 and 499, and so on.

Using this approach,

As dividing the problem in half with each guess. Since we have 1000 possible numbers and we divide by 2 with each guess,

It would take a maximum of log base 2 of 1000 (or approximately 9.97) guesses to find the number.

Therefore, we can conclude that the maximum number of guesses it would take to find a number between 1 and 1000 using this binary search algorithm is 10.

To learn more about number system visit:

https://brainly.com/question/33311228

#SPJ3

Order the steps to describe how to import a contact list in Outlook 2016.

Answers

Answer:  above is correct

In Backstage view...

Click Import/Export

Choose Import from...

Select CSV format...

Choose a destination....

Explanation:

The steps followed to import a contact list in the Microsoft Outlook 2016 are:

In background view, click open and export.Click import/ export.Choose import from another program.Select CSV format, and browse for a file list.Choose a destination folder, and click Finish.

What is Outlook 2016?

The Microsoft Outlook 2016 is a software system that helps the users to manage  their personal information. There are various functions of outlook such as manage emails, contact managing, journal logging and many more.

The Microsoft outlook allows the user to import the contact list into their personal computer by following the steps as mentioned above.

Learn more about Microsoft Outlook , here:

https://brainly.com/question/26695071

#SPJ2

A_______VPN connection is a private network that uses a public
network to operate.

A)Point-to-Point
B)Point-to-Tunnel
C)Point-to-Site
D)Site-to-Site

Answers

Answer:

letter c. point to site po sagot diyan

if you could travel back in time where would you go? what would you do? explain

Answers

Answer:

I would challenge the temporal paradox.

Explanation:

A temporal paradox, time paradox, or time travel paradox is a paradox, an apparent contradiction, or logical contradiction associated with the idea of time and time travel.

Which device do you think is the most important in the development of human civilization

Answers

Answer: The most important characteristic for the development of a civilization is the presence of advanced cities because they were centers of trade, which established economies and allowed for further development of the civilizations.

Explanation:

Your welcome :)

Consider the following declarations:

class bagType
{
public:
void set( string, double, double, double, double);
void print() const;
string getStyle() const;
double getPrice() const;
void get( double, double, double, double);
bagType();
bagType(string, double, double, double, double);
private:
string style;
double l;
double w;
double h;
double price;
};
bagType newBag; // variable declaration

Requried:
a. How many members does class bagType have?
b. How many private members does class bagType have?
c. How many constructors does class bagType have?
d. How many constant functions does class bagType have?
e. Which constructor is used to initialize the object newBag?

Answers

Answer:

12, 5, 2, 3

bagType

Explanation:

I just did it

Which TWO are examples of the internet reducing the use of paper?

Answers

Answer:

Using word documents instead of paper can save lots of paper especially, when lots of people are doing that already. Using emails can reduce the amounts of letters being sent to people.

a falsh movies consist of how many frame? ​

Answers

TV displays at almost 30 frames per second (fps), while motion pictures display at 24fps (the default frame rate in Flash is 24fps). Animation is controlled with the Timeline, which appears above the stage (WINDOW > Timeline): Flash movies begin as a single frame. To add movement, you must create additional frames.
TV displays at almost 30 frames per second (fps), while motion pictures display at 24fps (the default frame rate in Flash is 24fps). Animation is controlled with the Timeline, which appears above the stage (WINDOW > Timeline): Flash movies begin as a single frame. To add movement, you must create additional frames.

Research This: Which apps are available for your smartphone to erase data remotely? Which location-
tracking apps allow you to take a photo of the thief and then send an email message that contains the image
to you automatically? If your device is lost and you file a police report, you will need the device's serial
number. Locate that number now and write it on a piece of paper. Also, locate the phone's 15-digit
International Mobile Equipment Identity (IMEI) number and record that number. Store the document with
these two numbers in a secure location. In addition, research the efforts by the U.S. Federal
Communications Commission (FCC) and the Cellular Telecommunications Industry Association (CTIA) to
create a centralized database of lost and stolen mobile phones. What is the status of this database? What
legislation has been proposed or passed that requires wireless carriers and phone manufacturers to develop
technological solutions that can curb the growing problem of violent smartphone theft?

Answers

Answer:

OOP TY!

Explanation:

TY

how much did netflix pay dave chappelle for the closer

Answers

$24.1 million dollars

what is the most common type of storage device for transferring files from one computer to another?

Answers

Answer:

USB flash drives is the most common type of storage device for transferring files from one computer to another

what feature is required to track customer search terms on a website?

Answers

Answer:

Site Search feature is required to track customer search terms on a website..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

rocks created from compaction and cementation of sediments are called:

Answers

Answer:

Sedimentary Rocks

Explanation:

Sedimentary rocks are essentially the Frankenstein monsters of the rock world. They're made up of pieces of igneous and metamorphic rocks, sand, clay, and other sedimentary rocks.

Answer:

A  sedimentary

Explanation:

hope this helps please mark as brainliest

A mouse that emits and sense light to detect its movement is called an _______________ mouse.​

Answers

The answer is: “optical” mouse

Explanation:

optical mouse:

uses devices that emit and sense light to detect the mouse's movement

you type out a few sentences in an ms word file, and save it on your desktop. how is this data stored in the computer?

Answers

When one is  typing on MS word and one save the file, this data would be stored as combination of 1s and 0s in the computer.

Computer data storage can be regarded complex system, immediately a data is saved then;

The first be converted to simple numbers of 1s and 0s , this number are very easy for a computer to store and these number are regarded as Binary Numbers and all letters as well as photographs are converted to numbers,

The hardware will record this saved numbers inside the computer.

These numbers are then  organized and transferred to temporary storage which be manipulated by programs, or software.

Therefore, data are been stored as 1s and 0s in the computer.

Learn more at:https://brainly.com/question/21571591?referrer=searchResults

A) the Operating system is said to provide security. Explain what this means and give an example of a security feature.

Answers

It means that thw operating system is up to date with all the lastest protection systems like an anti virus. An example is that the operating system has a built in ransomware protection system ib place.

Hope this help please give the brainliest award

which type of broadband internet offers connections nearing the speed of light?

Answers

Answer:

FiberOptic connections

Explanation

One of the fastest data transfer methods for computers.

The type of broadband internet that offers connections near the speed of light is fiber-optic. The correct option is c.

What is fiber-optic?

Information can be sent from one location to another via optical fiber. Communications over the internet, cable television broadcasts, and telephone calls all use it.

Data transmission through the internet is one typical application. Most likely, a fiber optic cable connecting my computer and Brainly's servers to your browser allowed it to obtain this webpage.

Fiber optics is used in communications, medicine, optical inspection, lighting, and in the making of sensors. The Internet is a connection of computers from different places without wires. It is transferring information.

Therefore, the correct option is c. fiber-optic.

To learn more about fiber-optic, refer to the link:

https://brainly.com/question/10062531

#SPJ2

The question is incomplete. Your most probably complete question is given below:

Cable.

DSL.

fiber-optic.

satellite.

what must you ensure if your work involves the use of different types of smart card security tokens

Answers

Answer:

Avoid a potential security violation by using the appropriate token for each system.

What must you ensure if you work involves the use of different types of smart card security tokens? Avoid a potential security violation by using the appropriate token for each system.

You have a 7 GHz dual core processor. How many decisions can the processor

make in one second? *


PLEASE HELP 10 points

Answers

The unit that you're asking about (GHz) refers to the frequency.
Frequency is the reciprocal of time.
This means that it gives the measure of work done per unit time.
For example, suppose you can throw two apples in one second then the frequency of your throw is 2Hz or 2Hertz.

cookies that remain on your device indefinitely are called

Answers

Answer:

Persistent Cookies: Persistent cookies stay on the user's browsing device until the user clears them or until they reach their expiration. Persistent cookies are those that retain information on the user's specific preferences so that we can provide a “personalized” user experience.

Explanation:

I hope that this helps, if you have anymore questions, please, feel free to ask. I hope that you have an amazing rest of your day. ;D

Cookies that remain on your device indefinitely are called persistent cookies.

What are persistence cookies?

Cookies that remain on your device indefinitely are called persistent cookies.

These cookies are stored on the user's device even after the browser is closed, and can be used to track the user's activity over time.

We have,

Persistent cookies:

It can be useful for storing information such as login credentials or user preferences, as they allow the user to remain logged in or have their preferences saved between browsing sessions.

However, they can also be used for tracking and advertising purposes, which has raised concerns about online privacy and security.

Many web browsers offer options for managing cookies, including the ability to delete or block persistent cookies.

Users can also use browser extensions or privacy tools to control how cookies are used on their devices.

Thus,

Cookies that remain on your device indefinitely are called persistent cookies.

Learn more about persistent cookies here:

https://brainly.com/question/29608733

#SPJ5

how can a robot differentiate between positive or negative product reviews?

Answers

Answer:

Some of the sites have the rating system for example 3 stars, or the bot has a feature that can capture keywords that include a list of possible indicator that it is a negative review. For example if a user review includes a word "bad" or "horrible" the bot will flag that as a negative review.

Please give brainliest.

Why do we collect feedback on the code we write?

Answers

Answer:

to improve our code

Explanation:

"To improve our code" we collect feedback on the code we write.

Collecting feedback helps the users to learn whatever your consumers think approximately company reputation, performance, as well as merchandise or their items.Going beneath their basic likes as well as their dislikes and assisting you in understanding and evaluating wherever you may grow and where the business position in comparison to your competition.

Thus the above answer i.e., "option a" is correct.

Learn more about feedback here:

https://brainly.com/question/1603365

Who, in 1937 tried to build a computer with no gears, cams, belts, or
shafts?

Answers

Answer:

But we're getting ahead of our story. One of the earliest attempts to build an all-electronic (that is, no gears, cams, belts, shafts, etc.) digital computer occurred in 1937 by J. V. Atanasoff, a professor of physics and mathematics at Iowa State University.

Explanation:

hope this will help you

have a great day

please mark me as the brainliest

Answer: Atanasoff

Explanation: he was a doctor whom tried to built a computer to test the capacity of storing data

qbasic program to check whether the given number is odd or even​

Answers

Answer:

CLS

INPUT "Enter a Number: ", n

IF n MOD 2 = 0 THEN

PRINT "Input Number is Even"

END IF

IF n MOD 2 = 1 THEN

PRINT "Input Number is Odd"

END IF

END

Explanation:

CLS

INPUT "Enter a number:",N

IF N MOD 2=0 THEN

PRINT "given number is even"

ELSE

PRINT"given number is odd"

END IF

END

Tim has joined a new firm as a network engineer. Which three personal qualities will help him in his career? A. open-mindedness B. flexibility C. willingness to learn D. confidentiality E. ethnicity

Answers

Answer:

I would say A B and C

Explanation:

Other Questions
AG CLASS HELP!!!!!!Disney World employees 750 horticulturists and 30 nursery professionals to keep the parks 4,000 acres meticulously groomed.TrueFalse How does Cuba's government contrast with Costa Rica's government? bella wants to know what the students at her school think of her show? Which is the best group survey to find information Latitude, longitude, hemispheres and continents are all examples of a. how geographers use topographical maps how geographers organize the globe b. how geographers use climate maps d. how geographers use population maps What type of figurative language is the following line from Coffins The Spider? His back legs are a pair of hands.personification or metaphor find the highest common factor of 63 and 81 please no links Amino Acids are linked together to create a complete... A: Mineral B: CarbohydrateC: Protein D: Fat 15.95=3.19ni need help with this Which of the following sentences uses the word desolate correctly? a. Most people see the desert as a desolate place offering only hardship and discomfort. b. The crowds of people made the fairground feel desolate. In how many ways can 21 be expressed as the sum of 3 prime numbers? From the details in the selection from Silent Spring, what can you conclude about the town before the changes take place? Can someone please help? which type of polynomail is 4x-3 Blue Spruce Corp. reported net income of $194,740 for 2022. Blue Spruce Corp. also reported depreciation expense of $36,900 and a loss of $5,030 on the disposal of plant assets. The comparative balance sheets show an increase in accounts receivable of $15,650 for the year, a $15,880 increase in accounts payable, and a $4,250 increase in prepaid expenses. Prepare the operating activities section of the statement of cash flows for 2022. Use the indirect method. (Show amounts that decrease cash flow with either a - sign e.g. -15,000 or in parenthesis e.g. (15,000).) Blue Spruce Corp. Partial Statement of Cash Flows Choose the accounting period Select an opening section name Select an item $Enter a dollar amount Adjustments to reconcile net income to Select an opening name for subsection Select an item $Enter a dollar amount Select an item Enter a dollar amount Select an item Enter a dollar amount Select an item Enter a dollar amount Select an item Enter a dollar amount Enter a total amount for this subsection Select a closing section name $Enter a total amount for this section What two specific things were being fought over in the 3/5 compromise that would be based on population Some of answers use 3,14 as a substitute for pi.Some use the symbol for pi. which type of answersmore accurate? The more accurate value isis What is the volume of a hemisphere with a radius of 4.9 ft, rounded to the nearesttenth of a cubic foot? FizikDua perintang 5 dan 10 disambung selari dengan 9 V bekalan kuasa. Kira kuasa output bekalan kuasa. A rectangular shelf with an area equal to x^2-16x+60 square units could have which possible dimensions for length and width The parts of DNA that give instructions for making proteins are called ________. a genesb dominant traitc recessive traitd mutation