Use ____ to secure and catalog the evidence contained in large computer components.

a. Hefty bags
b.regular bags
c. paper bags
d.evidence bags

ANSWER: d

Computer Science & Information Technology

You might also like to view...

In a Word document, the character indicates that the Enter key has been pressed

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following can be used to compare two algorithms?

a. growth rates of the two algorithms b. implementations of the two algorithms c. test data used to test programs which implement the two algorithms d. computers on which programs which implement the two algorithms are run

Computer Science & Information Technology