Which activity involves sorting and searching through investigation findings to separate good data and suspicious data?

a. Validation
b. Filtering
c. Acquisition
d. Reconstruction


ANSWER: b

Computer Science & Information Technology

You might also like to view...

Big O highlights ________ factors and ignores terms that become unimportant with ________ n values.

a. insignificant, low b. insignificant, high c. dominant, low d. dominant, high

Computer Science & Information Technology

When using scroll bars, the text is viewed through a ______________ that shows only part of the text at a time.

a. view port b. text area c. all of the above d. none of the above

Computer Science & Information Technology

The far page-replacement strategy utilizes an ________ that characterizes a process’s reference patterns.

a) access list b) access table c) access graph d) access vector

Computer Science & Information Technology

Meeting notes created using Office Presentation Service can be shared using ________

Fill in the blank(s) with correct word

Computer Science & Information Technology