Which activity involves sorting and searching through investigation findings to separate good data and suspicious data?
a. Validation
b. Filtering
c. Acquisition
d. Reconstruction
ANSWER: b
Computer Science & Information Technology
You might also like to view...
Big O highlights ________ factors and ignores terms that become unimportant with ________ n values.
a. insignificant, low b. insignificant, high c. dominant, low d. dominant, high
Computer Science & Information Technology
When using scroll bars, the text is viewed through a ______________ that shows only part of the text at a time.
a. view port b. text area c. all of the above d. none of the above
Computer Science & Information Technology
The far page-replacement strategy utilizes an ________ that characterizes a process’s reference patterns.
a) access list b) access table c) access graph d) access vector
Computer Science & Information Technology
Meeting notes created using Office Presentation Service can be shared using ________
Fill in the blank(s) with correct word
Computer Science & Information Technology