Personal computers and networks are often a valuable source of evidence. Those involved with _______ should be comfortable with this technology.
a. Criminal investigation
b. Prosecution
c. Defense work
d. All of the above
a. Criminal investigation
b. Prosecution
c. Defense work
d. All of the above