Social Studies, 25.05.2021 21:30 nshuey0930
My bf lives across the street from where I work, his 10 year old daughter spent the long weekend with him she was supposed to be picked up last night but was not so she ended up staying he left her at the house alone because he has to go to work. When I got to work a lady gave me some money to bring her to the store at lunch on our break she is a good lady and elderly I left him know on lunch I would be gone. He then tells me he hasunch at his house for me I already brought my lunch because I pack it in the morning and he only t me this as I told him about the lady. I had a bream before my lunch break I asked him if his daughter was awake? He said nothing. Then before I left for lunch I asked about his daughter again still no response so I went to bring the lady to the store at lunch. As my lunch is done hes messaging me getting all upset saying that his daughter just messaged him that she's hungry now.. I feel like I tried to reach out to see if she was good got no response not only that like why isn't her mother picking her up she's at his house alone, us there is school today & she's missing itto me I just feel like this is not my fault because I tried am I wrong for this?
Answers: 2
Social Studies, 22.06.2019 07:20
Based on your approved case, create fictitious digital evidence. you may use logs from your own computer (no personal information) as a guide or search the internet for samples. these samples do not have to be technically correct, but there must be a reasonable presumption that this information would exist, supported by a reference. document who, when, and how the evidence was obtained. remember, you are creating fictitious examples, so refer to prior reading or examples of how digital evidence was collected. if necessary, refer to the "who" as a "systems administrator" and ensure the fictitious person is identified and referenced in your investigation. digital evidence must meet each of the following criteria: some of your digital evidence must be retrieved by computer forensics. some of your digital evidence must be retrieved from log files. digital evidence must contain information to support who, what, when, where, and how the cyber-crime was committed. present digital copies of your evidence in text files, screen shots, or pdfs.
Answers: 3
Social Studies, 22.06.2019 13:00
Which common characteristic of renaissance buildings does this image show
Answers: 1
My bf lives across the street from where I work, his 10 year old daughter spent the long weekend wit...
History, 06.05.2020 02:44
Mathematics, 06.05.2020 02:44
History, 06.05.2020 02:44
Computers and Technology, 06.05.2020 02:44
English, 06.05.2020 02:44
Mathematics, 06.05.2020 02:44
English, 06.05.2020 02:44