Use ____ to secure and catalog the evidence contained in large computer components.
a. Hefty bags
b.regular bags
c. paper bags
d.evidence bags
ANSWER: d
Computer Science & Information Technology
You might also like to view...
In a Word document, the character indicates that the Enter key has been pressed
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following can be used to compare two algorithms?
a. growth rates of the two algorithms b. implementations of the two algorithms c. test data used to test programs which implement the two algorithms d. computers on which programs which implement the two algorithms are run
Computer Science & Information Technology