Which of the following is the BEST example of the use of chain of custody?
A. Technician uses a third party to hand over the PC to the proper authority.
B. Technician remembers when and who they gave the PC to.
C. Technician calls supervisor after PC has been transferred.
D. Technician notes the date, time and who was given the PC.
Answer: D. Technician notes the date, time and who was given the PC.
You might also like to view...
Answer the following statements true (T) or false (F)
1) Method Replace can be used to change all occurrences of a desired character to another character. 2) When passed a white space, method Trim can be used to eliminate all characters from a string. 3) When the Trim method is passed a character array, it returns a string without any of the characters found within that array. 4) When using the Replace method, the first character passed in is the letter to be replaced and the second is what it will be replaced by. 5) strings cannot be changed.
Formatting text in a shape follows the same techniques as formatting text in a(n) ____________________.
Fill in the blank(s) with the appropriate word(s).
The ____________________ setting uses a complex method for improving an image; it increases the saturation of pixels that need it without affecting pixels that are already saturated.
Fill in the blank(s) with the appropriate word(s).
If you need to make changes to a template, it is not necessary to remove protection
Indicate whether the statement is true or false