The process of ____ typically involves the generation of a forensically sound copy of the evidence for the purpose of analysis.
A. data access
B. data collection
C. data retention
D. data classification
Answer: B
Computer Science & Information Technology
You might also like to view...
A user can use ________ to view how a table will print before committing
A) Print Preview B) Zoom C) Page Layout D) Design
Computer Science & Information Technology
Why should you format data in Excel?
What will be an ideal response?
Computer Science & Information Technology
__________ enables software written for a different platform to run, but does not virtualize hardware.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which of the following are digital audio-only formats? (Select TWO).
A. AAC B. WMV C. WMA D. AVI E. DES
Computer Science & Information Technology