Use ____ to secure and catalog the evidence contained in large computer components.

a. Hefty bags
b.regular bags
c. paper bags
d.evidence bags


ANSWER: d

Computer Science & Information Technology

You might also like to view...

When using a blog in a business setting, employees can collaborate and participate in decision making and exchange their ideas

Indicate whether the statement is true or false

Computer Science & Information Technology

Once a column adjacent to a table becomes a calculated column, it also becomes part of the table

Indicate whether the statement is true or false.

Computer Science & Information Technology

Which of the following can a host use as its address when its own IPv6 address is not yet known?

A) :: B) ::1 C) 1:: D) FD::

Computer Science & Information Technology

The SSL record protocol provides two services for SSL connection: message integrity and _________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology