Which of the following is a software algorithm used to create a "fingerprint" of a file or an entire hard disk drive (HDD)?
a. MD5
b. ROM
c. RAM
d. MAC OS
Answer: a
You might also like to view...
Answer the following statements true (T) or false (F)
The principles of normative ethics help us decide which government policies are best.
President Clinton's executive order on July 15, 1996 set the stage for:
a. recognizing the economic security of the U.S.. b. physical treats. c. National Infrastructure Protection Plan. d. establishment of protection task force.
Which of the following is a test for suggestiveness that takes into account all surrounding circumstances to determine whether the exclusionary rule applies?
A. The totality of the circumstances B. The fiduciary rule C. The exigence of the circumstances D. The per se rule
To what agency shall a facility report the release of an inmate who is receiving treatment for Tuberculosis?
a. local county health department b. Texas Department of Health c. U. S. Department of Health d. Texas Department of Health, only after receiving written authorization from the inmate to release confidential medical information