The chain of custody is

a. The chain used to beat you into submission
b. Another name of hand cuffs
c. Several smaller custodies linked together
d. A documented history of who has been in possession of a system


Answer: d. A documented history of who has been in possession of a system

Computer Science & Information Technology

You might also like to view...

Today’s most popular database systems are ________.

a) management databases b) structural databases c) formatted databases d) relational databases

Computer Science & Information Technology

Where are data variables stored when a program is running?

What will be an ideal response?

Computer Science & Information Technology

C# keywords are .

a) identifiers b) reserved words c) case insensitive d) properties

Computer Science & Information Technology

With no arguments, thetoLocaleString()method displays the numeric value using the local standards on the user's computer.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology