Which of the following is not the form of digital evidence:
a. Text messages
b. Emails
c. Pictures
d. Paper

1 Answer

Answer :

d. Paper

Related questions

Description : If a guy always answers your text messages and emails very quickly, does that mean he is into you?

Last Answer : Possibly. Maybe. Probably. What’s of far more import, though, is the content of his messages. And more important than that is the entire body of his behavior.

Description : 1 Digital Evidence in the form of the: A)Office File B)E-mail Messages C)Either A or B D)Both A and B

Last Answer : D)Both A and B

Description : Can iPhone send pictures through text messages?

Last Answer : not just yet. There are rumors that it will be an update in the near future. Theyre going to have to have it as an update if their wanting to stay ahead of the competition.

Description : Text messages valid evidence in court?

Last Answer : I think that that would be not the case. It can possibly be proven that the cellphone is his/hers, that the textmessage has been sent from that phone, but not that he/she is the one that wrote and/or send the message to you.

Description : Evidence in the form of the: A)Office File B)E-mail Messages C)Either A or B D)Both A and B

Last Answer : D)Both A and B

Description : What tablet delivers emails and Facebook messages to you?

Last Answer : I do mine from my ipad. No monthly fee.

Description : Are you obsessive with checking emails and messages on various sites you use?

Last Answer : Mostly I keep my email open all the time. There are some accounts I rarely check, mostly because I don’t expect anything new there. But that reminds me…. :-)

Description : How do I insert attachments (pictures) on my emails on my iPad?

Last Answer : answer:Unfortunately, you need to go to your photo, click the arrow in the upper right, click “email photo”. iOS is poor

Description : How to add photos/pictures to emails?

Last Answer : One more thing, I also tried using HTML to get photos/pictures into the web browser and copy pasting it into gmail or yahoomail. That way, it was there till I send it. But, in email message afterwards ... picasa, and give links in the email. However, I'm stll wondering how others succeed to do it.

Description : A ____ is an input device, which is used for converting pictures, maps and drawings into digital form for storage in computers. (1) OCR (2) OMR (3) MICR (4) digitizer

Last Answer : digitizer

Description : Name the features offered by LinkedIn for paid business accounts. a. Facilitate posting pictures b. Facilitate to connect directly and send messages to people c. Ability to post in Groups and create a Group d. Ability to block users

Last Answer : b. Facilitate to connect directly and send messages to peopl

Description : "11. What feature does LinkedIn offer for pay accounts? A. Ability to post pictures B. Increased abilities to connect directly and send messages to people C. Ability to post in Groups and create a Group D. Ability to block users

Last Answer : B. Increased abilities to connect directly and send messages to people

Description : According to the text, the most common mistake that prevents evidence seized from Being admitted is: a. Uninformed consen b. Forcible entry c. Obtained without authorization d. None of the above

Last Answer : c. Obtained without authorization

Description : Video Surveillance can be form of Digital evidence a. True b. False

Last Answer : a. True

Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital evidence. d. All of the abov

Last Answer : c. Private networks contain a higher concentration of digital evidence.

Description : Digital Evidence is only useful in court of law a. True b. False

Last Answer : b. False

Description : In term of Digital evidence, the internet is an example of a. Open computer System b. Communication System c. Embedded Computer System d. None of the above

Last Answer : b. Communication System

Description : 3. In term of Digital evidence, a mobile telephone is an example.of a. Open Computer System b. Communication System c. Embedded Computer System d. None of the Above

Last Answer : c. Embedded Computer System

Description : In term of Digital evidence, a hard drive is example.of a. Open Computer System b. Communication System c. Embedded Computer System d. None of the Above

Last Answer : a. Open Computer System

Description : . A Valid Definition of Digital Evidence is a. Data Stored or transmitted using a computer b. Information of Probative value c. Digital dada of probative Value d. Any digital evidence on compute

Last Answer : c. Digital dada of probative Value

Description : Which of following is a not unethical norm for Digital Forensics Investigation? A. Uphold any relevant evidence. B. Declare any confidential matters or knowledge. C. Distort or falsify education, training, credentials. D. To respect the privacy of others.

Last Answer : D. To respect the privacy of others.

Description : In terms of digital evidence, a hard drive is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : c. Embedded computer systems

Description : 4. What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : In terms of digital evidence, the Internet is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : c. Embedded computer systems

Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital evidence. d. All of the above.

Last Answer : c. Private networks contain a higher concentration of digital evidence.

Description : In terms of digital evidence, the Internet is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : b. Communication systems

Description : In terms of digital evidence, a Smart Card is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : c. Embedded computer systems

Description : . In terms of digital evidence, a mobile telephone is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : c. Embedded computer systems

Description : 3. In terms of digital evidence, a hard drive is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : a. Open computer systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : . A valid definition of digital evidence is: a. Data stored or transmitted using a computer b. Information of probative value c. Digital data of probative value d. Any digital evidence on a computer

Last Answer : c. Digital data of probative value

Description : What is Digital Forensic? A. Process of using scientific knowledge in analysis and presentation of evidence in court B. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : Digital Evidence must follow the requirement of the A)Ideal Evidence Rule B)Best Evidence Rule C)Exchange Rule D)All of the mentioned

Last Answer : D)All of the mentioned

Description : The evidence and proof that can be obtained from the electronic source is called the……. A)Digital Evidence B)Explainable evidence C)Either A or B D)Both A and B

Last Answer : A)Digital Evidence

Description : The Digital evidence are used to established a credible link between………. A)Attacker and victim and the crime scene B)Attacker And information C)Either A or B D)Both A and B

Last Answer : A)Attacker and victim and the crime scene

Description : Investigation means : a. Collection of information b. A procedure to find the Digital Evidence c. Searching over internet d. Hacking computer systems

Last Answer : b. A procedure to find the Digital Evidence

Description : Digital evidences are also called as : a. Digital proof b. Evidence c. Hidden Truth d. Electronic Evidence

Last Answer : d. Electronic Evidence

Description : Digital evidence must follow the requirements of the …….. a. Ideal evidence b. Best evidence c. Exchange evidence d. All of the mentioned

Last Answer : b. Best evidence

Description : The evidence or proof that can be obtained from the electronic source is called the ……… a. Digital evidence b. Demonstrative evidence c. Explainable evidence d. Substantial evidence

Last Answer : a. Digital evidence

Description : Investigation means : a. Collection of information b. A procedure to find the Digital Evidence c. Searching over internet d. Hacking computer systems

Last Answer : b. A procedure to find the Digital Evidence

Description : The digital evidence are used to establish a credible link between…… a. Attacker and victim and the crime scene b. Attacker and the crime scene c. Victim and the crime scene d. Attacker and information

Last Answer : a. Attacker and victim and the crime scene

Description : Rule of evidence is called as …………. a. Digital Evidence b. Law of Evidence c. Hidden Evidence d. Electronic Evidence

Last Answer : b. Law of Evidence

Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital Evidences d. None of the above.

Last Answer : c. Private networks contain a higher concentration of digital Evidences

Description : In terms of digital evidence, the Internet is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : c. Embedded computer systems

Description : In terms of digital evidence, a Smart Card is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : d. None of the above

Description : In terms of digital evidence, a mobile telephone is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : c. Embedded computer systems

Description : In terms of digital evidence, a hard drive is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : a. Open computer systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : . A valid definition of digital evidence is: a. Data stored or transmitted using a computer b. Information of probative value c. Digital data of probative value d. Any digital evidence on a compute

Last Answer : c. Digital data of probative value

Description : Validate your tools and verify your evidence with ____ to ensure its integrity a. hashing algorithms c. steganography b. watermarks d. digital certificates

Last Answer : a. hashing algorithms