During which phase of an investigation do you make your first entries into a chain of custody log?

a. Examination
b. Acquisition
c. Identification/Assessment
d. Analysis
e. Reporting


b. Acquisition

Computer Science & Information Technology

You might also like to view...

Which of the following parts of a BDE event should be used for code that should continue to execute as long as the event continues to occur?

a. Begin b. During c. End d. While e. None of these

Computer Science & Information Technology

An import declaration is not required if you always refer to a class with its ________ name, which includes its package name and class name.

a. compile-time b. default package c. paired d. fully qualified name

Computer Science & Information Technology

A ____ is a freestanding, self-service structure equipped with computer hardware and software and used to provide information or reference materials to the public.

A. kiosk B. station C. frame D. network

Computer Science & Information Technology

_____ protects mobile devices from liquids

Fill in the blank(s) with correct word

Computer Science & Information Technology