Investigations involving the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and root cause analysis are known as _________.

A. digital forensics 
B. criminal investigation
C. crime scene investigation
D. e-discovery


Answer: A

Computer Science & Information Technology

You might also like to view...

To create a 3-D object, you first produce a line drawing called a ____.

A. frame B. line draw C. wireframe D. blueprint

Computer Science & Information Technology

A ________ key is a field that contains a nonrepeating value, which uniquely identifies each record

A) foreign B) primary C) secondary D) common

Computer Science & Information Technology

In Project 2013's Entry table, the location where the name of each task is entered is in the ________ column

A) Task Name B) Quick Access C) Task Mode D) Indicators

Computer Science & Information Technology

Even when a(n) __________ is at the correct size for your web page, it's often possible to reduce the file size by reducing its quality in a way that humans can't perceive, a process known as optimization.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology