Evidence in the form of the:
A)Office File B)E-mail Messages C)Either A or B D)Both A and B

1 Answer

Answer :

D)Both A and B

Related questions

Description : 1 Digital Evidence in the form of the: A)Office File B)E-mail Messages C)Either A or B D)Both A and B

Last Answer : D)Both A and B

Description : What are the Form of Electronic Evidence: A)Hard Drive B)E-mail C)Either A or B D)Both A and B

Last Answer : D)Both A and B

Description : What are the Form of Electronic Evidence: A)Hard Drive B)E-mail C)Either A or B D)Both A and B

Last Answer : D)Both A and B

Description : Which of the following is not the form of digital evidence: a. Text messages b. Emails c. Pictures d. Paper

Last Answer : d. Paper

Description : Storage Area for E-mail messages are called: a) Directory b) Mailbox c) A folder d) None of These

Last Answer : b) Mailbox

Description : What is an E - mail: a) An electronic mail that established person to person connectivity b) It enables us to communicate at any time of the day or night from any location c) Both (a) and (b) d) Either (a) or (b) e) Only (b) f) Neither (a) nor (b) g) Only (a)

Last Answer : c) Both (a) and (b)

Description : The evidence and proof that can be obtained from the electronic source is called the……. A)Digital Evidence B)Explainable evidence C)Either A or B D)Both A and B

Last Answer : A)Digital Evidence

Description : The Digital evidence are used to established a credible link between………. A)Attacker and victim and the crime scene B)Attacker And information C)Either A or B D)Both A and B

Last Answer : A)Attacker and victim and the crime scene

Description : The evidence and proof that can be obtained from the electronic source is called the……. A)Digital Evidence B)Explainable evidence C)Either A or B D)Both A and B

Last Answer : A)Digital Evidence

Description : The Digital evidence are used to established a credible link between………. A)Attacker and victim and the crime scene B)Attacker And information C)Either A or B D)Both A and B

Last Answer : A)Attacker and victim and the crime scene

Description : I put my cell phone number on my hotmail account sometwhere, now im receiving sms text messages everytime i got an e-mail!!!! where i can remove that?

Last Answer : answer:Options, more options, mobile alerts for new messages. There should be an option there to un-associate your cell phone number from your e-mail account. Alternately, you can get your cell phone provider to block the number.

Description : Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? A. FTP B. SNMP C. SMTP D. RPC E. None of the above

Last Answer : SMTP

Description : E‐mail messages may be stored on which of the following computers? a. Sender's computer b. Sender's server c. Recipient's server d. All of the above

Last Answer : d. All of the above

Description : EDI over internet uses a. MIME to attach EDI forms to e-mail messages b. FTP to send business forms c. HTTP to send business forms d. SGML to send business forms

Last Answer : a. MIME to attach EDI forms to e-mail messages 

Description : . ________ is the recording system which enables sender to leave messages for receiver by telephone. (a) E-Mail ; (b) Voice Mail ; (c) Videoconferencing ; (d) Teleconferencing

Last Answer : (b) Voice Mail ;

Description : Text messages valid evidence in court?

Last Answer : I think that that would be not the case. It can possibly be proven that the cellphone is his/hers, that the textmessage has been sent from that phone, but not that he/she is the one that wrote and/or send the message to you.

Description : The digital evidence is used to establish the credible link between … a. System, evidence and victim b. Attacker, victim, and crime scene c. Attacker, victim and case file d. Attacker, system and victim

Last Answer : b. Attacker, victim, and crime scene

Description : Funky messages in my inbox when checking mail through iPhone?

Last Answer : In your gmail you can set up that only forward the messages from now on and not all of them. Because then it will try to send all the thousand and thousand messages to your phone and it will almost never end. So set up in the POP3 settings what I said, and delete everything from the iPhone.

Description : How do you import your email messages from Outlook Express on XP to Windows Mail on Vista?

Last Answer : found a link here with easy instructions off the MS site http://windowshelp.microsoft.com/Windows/en-US/help/53e5df86-5ffb-43cf-a0c8-164e3fe7994f1033.mspx remember if you ever load Office 2007 onto ... and Gmail and I can say its probably your easiest bet also backs up everything just encase!

Description : Is there a way to show only unread messages in Yahoo mail?

Last Answer : answer:If you're using the old Yahoo Mail, click on your inbox. Right below Inbox, there's a little "view" button. Click "view unread messages." Voila. For the new Yahoo Mail, click "view" at the top of the toolbar, and click "sort by unread."

Description : Why won't mail.app get my most recent messages?

Last Answer : Are the messages available for download server side?

Description : what do I dial to retrieve voice mail messages?

Last Answer : If you're trying to access voicemail for your cellphone its typically your own number. If you start to hear your voicemail greeting hit either * or # (depends on the carrier) and follow the ... for a land line contact your phone company. These numbers can vary based on location and phone company.

Description : Which of the following protocol is used for transferring electronic mail messages from one machine to another? a. TELNET b. FTP c. SNMP d. SMTP

Last Answer : d. SMTP

Description : In electronic mail, which of the following protocols allows the transfer of multimedia messages? (A) IMAP (B) SMTP (C) POP 3 (D) MIME

Last Answer : (D) MIME

Description : Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?  (a) FTP (b) SNMP (c) SMTP (d) RPC

Last Answer : SMTP is used for transferring electronic mail messages from one machine to another.

Description : Can someone explain the psychology behind the behavior of someone who sends conflicting messages, either verbally or physically, then get upset with other people because the other people act confused?

Last Answer : Either they really don’t understand that they’re being confusing, maybe due to a low level of autism, or something similar, so they don’t understand basic social cues, or yes, it’s a classic passive-aggressive attention getting behavior. Run away. Run away now.

Description : OES Office Systems' use of fax machines to carry its advertising messages to customers is which component of the communication process? A)Medium of transmission. B)Decoding process. C)Coding process. D)Sharing of meaning. E)Noise minimisation.

Last Answer : A)Medium of transmission.

Description : How can I move sent messages automatically from Gmail (IMAP) to my local PST file?

Last Answer : You could most probably access your Gmail ‘Sent’ folder from within Outlook. Can’t you just drag them onto your local ‘Sent’ folder from there?

Description : What are the best 'out-of-office' messages you have seen?

Last Answer : We’re on a secret mission for the next 2 weeks. Will tell you about it on our return.

Description : Have you used Zoho mail or RackSpace hosted mail for business? What is your opinion of both or either?

Last Answer : I have supported email for years. There ae a ton of Exchange Hosting companies out there now. Why are you looking to outsource it? So many questions have to be asked when figuring this one ... email is the support concerns. Hit me up in PM for any specific questions or recommended organizations.

Description : When steel almirahs, cabinets, cupboard or locker furnished with body locks (which are furnished by their manufacturer with duplicate keys) are supplied to any office, i.e. Post, Mail, Record or Divisional Office ... clerk and Stock clerk of divisional office. c) Both the A and B d) None of these

Last Answer : b) Head clerk and Stock clerk of divisional office.

Description : Which among the following characteristics are correct about 'Cyberstalking': a) Cyberstalking is the use of the internet or electronics to stalk or harass an individual or any group. b) It includes making harassing phone ... ) It may be offline as well as online d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : The _____folder retains copies of messages that you have started but are not yet ready to send: a) Drafts b) Outbox c) Address Book d) Sent Items e) None of The Above

Last Answer : a) Drafts

Description : In the event of an error in a mail list and when a revised or corrected mail list is received a) The revised document can be kept safely in the correspondence file b) The revised document can be ... each other a note being added on the original d) The error mail list should be returned to sender

Last Answer : c) Both the list s should be retained on record attached to each other a note being added on the original

Description : The contents of documents may be proved  a) By primary evidence b) By secondary evidence c) Either A or B d) Neither A nor B

Last Answer : c) Either A or B

Description : All banks registered under the ___________ are considered co-operative banks. A. Banking Regulation Act 1949 B. The Bankers‘Books Evidence Act–1891 C. Cooperative Societies Act, 1912 D. Both (B) and (C) E. None of the Above

Last Answer : C. Cooperative Societies Act, 1912 Explanation: Co-operative banks operate in both urban and non-urban areas. All banks registered under the Cooperative Societies Act, 1912 are considered co-operative banks ... approved bylaws and amendments.co-operative banks work on a -no profit, no loss basis.

Description : Mark the correct option a) Indents prepared by first class postmasters do not require countersignature and should be forwarded direct to the Depot b) In the case of a mail line, the indent should be ... Superintendent in charge of the line for countersignature c) Both the A and B d) None of these

Last Answer : c) Both the A and B

Description : Whoever, being employed to carry or deliver any mail bag or any postal article in course of transmission by post, voluntarily withdraws from the duties of his office without permission or without having given one ... with fine which may extend to fifty rupees, or with both. d) None of the above

Last Answer : c) Punishable with imprisonment which may extend to one month, or with fine which may extend to fifty rupees, or with both.

Description : The Post Office Protocol is an ………... protocol with both client (sender/receiver) and …………...functions A. electronic mail, server (storage) B. three layer , server C. UDP, transfer D. TCP, server

Last Answer : A. electronic mail, server (storage)

Description : Which is a time-sensitive service? A. File transfer B. File download C. E-mail D. Internet telephony

Last Answer : D. Internet telephony

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm

Description : The Inspector should, whenever he meets a village postman out in his beat or at the office to which he is attached, examine a) His bag to see whether he carries postage stamps, forms, etc., b) His ... counterfoils of receipts for articles registered by him. c) Both the A and B d) Either A or B

Last Answer : c) Both the A and B

Description : can I mail my USB drive to anyone to put either ubuntu or Linux on it?

Last Answer : answer:There are places to download linux for free like here where you’ll need to choose a distribution to download. The top one on the site is pc linux You could probably go to your local library and download the file onto your usb stick if bandwidth is a problem where you are.

Description : An output device that uses words or messages recorded on a magnetic medium to produce audio response is A) Magnetic tape B) Voice response unit C) Voice recognition unit D) Voice band

Last Answer : Answer : B

Description : A worldwide financial messaging network which exchanges messages between banks and financial institutions is known as _________ A. SWIFT B. Basel C. RTGS D. NEFT

Last Answer : A. SWIFT Explanation: Society for Worldwide Inter bank Financial Telecommunication code. An internationallyrecognized identification code for banks around the world. SWIFT codes are most commonly used for international wire transfers and are comprised of 8 or 11 alphanumeric characters.

Description : ____intercepts all messages entering and leaving the network. The _____effectively hides the true network addresses: a) Circuit Level Gateway b) Proxy Server c) Packet Filter d) None of These

Last Answer : b) Proxy Server

Description : PubNub publishes and subscribes _________ in order to send and receive messages. a) Network b) Account c) Portal d) Keys

Last Answer : d) Keys

Description : For MS Office Outlook 2003 users: how do you remove an e-mail address from the "autofill" list?

Last Answer : When you start typing the name, and it gives you an alphabetical list of people you have already emailed, highlight the name you want to get rid of, then press the “delete” key.