Testing forensic software at the extremes and becoming familiar with its capabilities is ________

a. unnecessary if manufacturers provide documentation
b. a way to validate the forensic software
c. not recommended due to the danger of acquiring viruses
d. more common among computer criminals than investigators


Answer: b

Computer Science & Information Technology

You might also like to view...

Match the following terms to their meanings:

I. Chart A. A value that originates in a worksheet cell II. Data point B. A pie slice III. Data marker C. Commonly used in place of a legend IV. Data labels D. Graphic representation of numerical data V. Explode E. Used to emphasize a pie slice

Computer Science & Information Technology

The ________ tab is used to insert a table of authorities

A) Reference B) Insert C) Page Layout D) Design

Computer Science & Information Technology

Which of the following methods does not belong to the String class?

A. capitalize B. chop C. reverse D. None of the above

Computer Science & Information Technology

Describe changes you may make to a template downloaded from the template gallery.

What will be an ideal response?

Computer Science & Information Technology