There are a few advanced search models that some of the more sophisticated tools use that allow the investigator to dig up very specific types of evidence. Which of the following are examples of an advanced email search?

a. Stationary User Profile
b. Domain Replication
c. Communications Frequency
d. Similar Users


a. d.

Computer Science & Information Technology

You might also like to view...

Write a function that reads delimited strings from a file with names and phone numbers and uses a database to store the names as the keys and the phone numbers as the values. Take as input the filename and the name of the person who’s phone number you are looking for. How would you look up the phone number to find the name it belongs to?

Note: This question does not specify the type of delimited strings to use, but the most common assumption would be a comma-delimited string. By relational database it could mean a relational database with hash tables, like in Program 165, or a MySQL database. The former would lead to an answer like findPhoneNumber, and the latter would lead to an answer like findPhoneNumber2. To answer the question, you would look up the phone number to find the name it belongs to by checking each of the keys to see if its value matches the phone number, then returning that name.

Computer Science & Information Technology

The _______ object is most commonly used to access the information passed by a GET or POST request.

(a) Request (b) Response (c) Server (d) Form

Computer Science & Information Technology

The primary purpose of the ____ is to optimize the performance of an Access database.

A. Table Analyzer B. SQL Server C. Relationships Analyzer D. Performance Analyzer

Computer Science & Information Technology

To change a column that currently rejects null values so that it accepts null values, use the ____ clause of the ALTER TABLE command

A. ACCEPT NULLS B. MODIFY C. ADD NULLS D. CREATE

Computer Science & Information Technology