TRUE/FALSE. computer forensic examiners secure the crime scene and any electronic devices and ensure no one tampers with or modifies evidence during the collection phase of an investigative process.

Answers

Answer 1

The statement " computer forensics examiners secure the crime scene and any electronic devices and ensure no one tampers with or modifies evidence during the collection phase of an investigative process" is False.

What is computer forensics?

The study of evidence discovered on computers and other digital storage devices is known as computer forensics, a subfield of digital forensic science. Computer forensics aims to detect, preserve, recover, analyze, and provide facts and views about digital information by carefully examining digital media in a forensically sound manner.

A branch of technology known as computer forensics uses investigative methods to locate and preserve digital data. Finding evidence that could be utilized in court is frequently done via computer forensics.

Information from computers and other digital storage devices is helped to be retrieved by computer forensic investigators. The retrieved information can then be utilized in criminal investigations or as proof in cybercrime cases.

To learn more about computer forensics, use the link given
https://brainly.com/question/14405745
#SPJ4


Related Questions

What is the command to launch each of the following tools? Local Group Policy Local Security Policy Computer Management console Local Users and Groups console Resultant Set of Policy (RSoP)

Answers

Answer:

The command for

Local Group Policy  is GPedit.msc

Local Security Policy is SecPol.msc

Computer Management console is Compmgmt.msc

Local Users and Groups console is Lusrmgr.msc

Resultant Set of Policy is RSOP.msc

Explanation:

The command for

Local Group Policy  is GPedit.msc

Local Security Policy is SecPol.msc

Computer Management console is Compmgmt.msc

Local Users and Groups console is Lusrmgr.msc

Resultant Set of Policy is RSOP.msc

What is the difference between an information system and a computer application?

Answers

Answer:

An information system is a set of interrelated computer components that collects, processes, stores and provides output of the information for business purposes

A computer application is a computer software program that executes on a computer device to carry out a specific function or set of related functions.

To add musical notes or change the volume of sound, use blocks from.

i. Control ii. Sound iii. Pen​

Answers

Sorry but what’s the question?
ii-i-iii I got you.

Read the 4 entities below and assume that customer_id is the key common to all tables.
Customer: An entity that describes a customer. An instance occurs for unique customers only using name, date of birth, and login name as customer_id primary key.
Online: An entity that describes a customer purchasing activity online. An instance occurs when the customer completes the transaction. Customers can purchase more than once.
Visits: An entity that describes a customer purchase in a physical store. An instance occurs if a customer makes or purchase or checks-in using an app. Customers can visit more than once per day.
Satisfaction: An entity that represents data from a recent customer satisfaction survey. An instance occurs when a customer takes the Survey. A customer is tracked by login name and can only take the survey one time.
Use the information to match the following relationships. Answers can be reused more than once.
1. The relationship between Customer and Online.
2. The relationship between Customer and Satisfaction.
3. The relationship between Online and Visits.
4. The relationship between Visits and Satisfaction
A. prototype
B. one-to-one
C. Zero-sum
D. one-to-many
E. TOO many
F. many-to-many

Answers

Answer:

1. The relationship between Customer and Online - One to One

2. The relationship between Customer and Satisfaction - Many to Many

3. The relationship between Online and Visits - Zero sum

4. The relationship between Visits and Satisfaction - Prototype

Explanation:

The relationship between customers and satisfaction is important for any business. One disappointed customer will make a business to loose 10 new customers. The customer satisfaction is most important for any business and it is necessary to get feedback from customers in order to know whether the business service is adequate to satisfy a customer positively.

Earl develops a virus tester which is very good. It detects and repairs all known viruses. He makes the software and its source code available on the web for free and he also publishes an article on it. Jake reads the article and downloads a copy. He figures out how it works, downloads the source code and makes several changes to enhance it. After this, Jake sends Earl a copy of the modified software together with an explanation. Jake then puts a copy on the web, explains what he has done and gives appropriate credit to Earl.
Discuss whether or not you think Earl or Jake has done anything wrong?

Answers

Answer:

They have done nothing wrong because Jake clearly gives credit to Earl for the work that he did

Explanation:

Earl and Jake have nothing done anything wrong because Jake give the proper credit to Earl.

What is a virus tester?

A virus tester is a software that scan virus on computer, if any site try to attack any computer system, the software detect it and stop it and save the computer form virus attack.

Thus, Earl and Jake have nothing done anything wrong because Jake give the proper credit to Earl.

Learn more about virus tester

https://brainly.com/question/26108146

#SPJ2

Complete the problem about Olivia, the social worker, in this problem set. Then determine the telecommunications tool that would best meet Olivia's needs.


PDA

VoIP

facsimile

Internet

Answers

Answer:

PDA is the correct answer to the following answer.

Explanation:

PDA refers for Programmable Digital Assistant, which is a portable organizer that stores contact data, manages calendars, communicates via e-mail, and manages documents and spreadsheets, typically in conjunction with the user's personal computer. Olivia needs a PDA in order to communicate more effectively.

Which of the following techniques is a direct benefit of using Design Patterns? Please choose all that apply Design patterns help you write code faster by providing a clear idea of how to implement the design. Design patterns encourage more readible and maintainable code by following well-understood solutions. Design patterns provide a common language / vocabulary for programmers. Solutions using design patterns are easier to test

Answers

Answer:

Design patterns help you write code faster by providing a clear idea of how to implement the design

Explanation:

Design patterns help you write code faster by providing a clear idea of how to implement the design. These are basically patterns that have already be implemented by millions of dev teams all over the world and have been tested as efficient solutions to problems that tend to appear often. Using these allows you to simply focus on writing the code instead of having to spend time thinking about the problem and develop a solution. Instead, you simply follow the already developed design pattern and write the code to solve that problem that the design solves.

What is a foreign key? a security key to a database that stores foreign data a security key to a database located in another country a field in a table that uniquely identifies a record in a relational database a field in a table that links it to other tables in a relational database

Answers

Answer: a field in a table that links it to other tables in a relational database

A - a security key to a database that stores foreign data

Joseph learned in his physics class that centimeter is a smaller unit of length and a hundred centimeters group to form a larger unit of length called a meter. Joseph recollected that in computer science, a bit is the smallest unit of data storage and a group of eight bits forms a larger unit. Which term refers to a group of eight binary digits? A. bit B. byte O C. kilobyte D. megabyte​

Answers

Answer:

byte

Explanation:

A byte is made up of eight binary digits

the
Wnte
that
Program
will accept three
Values of
sides of a triangle
from
User and determine whether Values
carceles, equal atera or sealen
- Outrast of your
a
are for
an​

Answers

Answer:

try asking the question by sending a picture rather than typing

When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This adjustment can be done by normalizing to values between 0 and 1, or throwing away outliers.
For this program, adjust the values by dividing all values by the largest value. The input begins with an integer indicating the number of floating-point values that follow.
Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('{:.2f}'.format(your_value))
Ex: If the input is:
5 30.0 50.0 10.0 100.0 65.0
the output is:
0.30 0.50 0.10 1.00 0.65
The 5 indicates that there are five floating-point values in the list, namely 30.0, 50.0, 10.0, 100.0, and 65.0. 100.0 is the largest value in the list, so each value is divided by 100.0.
For coding simplicity, follow every output value by a space, including the last one
1 #include
2 #include
3 #include
4 using namespace std;
5
6 int main() {
7
8 /* Type your code here. */
9
10 return 0;
11 }
12

Answers

Answer:

5.23 LAB: Adjust values in a list by normalizing When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This can be done by normalizing to values between 0 and 1, or throwing away outliers.

Explanation:

How was the first computer reprogrammed

Answers

Answer:

the first programs were meticulously written in raw machine code, and everything was built up from there. The idea is called bootstrapping. ... Eventually, someone wrote the first simple assembler in machine code.

Explanation:

Suppose you are choosing between the following three algorithms:
• Algorithm A solves problems by dividing them into five subproblems of half the size, recursively solving each subproblem, and then combining the solutions in linear time.
• Algorithm B solves problems of size n by recursively solving two subproblems of size n − 1 and then combining the solutions in constant time.
• Algorithm C solves problems of size n by dividing them into nine sub-problems of size n=3, recursively solving each sub-problem, and then combining the solutions in O(n2) time.
What are the running times of each of these algorithms (in big-O notation), and which would you choose?

Answers

Answer:

Algorithm C is chosen

Explanation:

For Algorithm A

T(n) = 5 * T ( n/2 ) + 0(n)

where : a = 5 , b = 2 , ∝ = 1

attached below is the remaining part of the solution

This lab was designed to teach you more about using Scanner to chop up Strings. Lab Description : Take a group of numbers all on the same line and average the numbers. First, total up all of the numbers. Then, take the total and divide that by the number of numbers. Format the average to three decimal places Sample Data : 9 10 5 20 11 22 33 44 55 66 77 4B 52 29 10D 50 29 D 100 90 95 98 100 97 Files Needed :: Average.java AverageRunner.java Sample Output: 9 10 5 20 average = 11.000 11 22 33 44 55 66 77 average = 44.000 48 52 29 100 50 29 average - 51.333 0 average - 0.000 100 90 95 98 100 97 average - 96.667

Answers

Answer:

The program is as follows:

import java.util.*;

public class Main{

public static void main(String[] args) {

    Scanner input = new Scanner(System.in);

 String score;

 System.out.print("Scores: ");

 score = input.nextLine();

 String[] scores_string = score.split(" ");

 double total = 0;

 for(int i = 0; i<scores_string.length;i++){

     total+= Double.parseDouble(scores_string[i]);  }

 double average = total/scores_string.length;

 System.out.format("Average: %.3f", average); }

}

Explanation:

This declares score as string

 String score;

This prompts the user for scores

 System.out.print("Scores: ");

This gets the input from the user

 score = input.nextLine();

This splits the scores into an array

 String[] scores_string = score.split(" ");

This initializes total to 0

 double total = 0;

This iterates through the scores

 for(int i = 0; i<scores_string.length;i++){

This calculates the sum by first converting each entry to double

     total+= Double.parseDouble(scores_string[i]);  }

The average is calculated here

 double average = total/scores_string.length;

This prints the average

 System.out.format("Average: %.3f", average); }

}

SOMEONE PLS HELP?!?!!

Answers

Answer:

B. To continuously check the state of a condition.

Explanation:

The purpose of an infinite loop with an "if" statement is to constantly check if that condition is true or false. Once it meets the conditions of the "if" statement, the "if" statement will execute whatever code is inside of it.

Example:

//This pseudocode will print "i is even!" every time i is an even number

int i = 0;

while (1 != 0)       //always evaluates to true, meaning it loops forever

  i = i + 1;               // i gets incrementally bigger with each loop

     if ( i % 2 == 0)     //if i is even....

               say ("i is even!"); //print this statement

Think of an aspect of HTML that you found challenging to master. Why is that aspect of HTML important? What are some future situations that you could use it in?

Answers

Answer:

html is a thing that u can to create an website business that u can make money on it

An example of a host-based intrusion detection tool is the tripwire program. This is a file integrity checking tool that scans files and directories on the system on a regular basis and notifies the administrator of any changes. It uses a protected database of cryptographic checksums for each file checked and compares this value with that recomputed on each file as it is scanned. It must be configured with a list of files and directories to check and what changes, if any, are permissible to each. It can allow, for example, log files to have new entries appended, but not for existing entries to be changed. What are the advantages and disadvantages of using such a tool? Consider the problem of determining which files should only change rarely, which files may change more often and how, and which change frequently and hence cannot be checked. Hence consider the amount of work in both the configuration of the program and on the system administrator monitoring the responses generated.

Answers

Answer:

The main problem with such a tool would be resource usage

Explanation:

The main problem with such a tool would be resource usage. Such a tool would need a large amount of CPU power in order to check all of the files on the system thoroughly and at a fast enough speed to finish the process before the next cycle starts. Such a program would also have to allocate a large amount of hard drive space since it would need to temporarily save the original versions of these files in order to compare the current file to the original version and determine whether it changed or not. Depending the amount of files in the system the work on configuring the program may be very extensive since each individual file needs to be analyzed to determine whether or not they need to be verified by the program or not. Monitoring responses may not be so time consuming since the program should only warn about changes that have occurred which may be only 10% of the files on a daily basis or less.

examples of pop in computer​

Answers

Answer:

Short for Post Office Protocol, POP or POP mail is one of the most commonly used protocols used to receive e-mail on many e-mail clients. There are two different versions of POP: POP2 and POP3. POP2was an early standard of POP that was only capable of receiving e-mail and required SMTP to send e-mail. POP3 is the latest standard and can send and receive e-mail only using POP, but can also be used to receive e-mail and then use SMTP to send e-mail.

Create a list of 30 words, phrases and company names commonly found in phishing messages. Assign a point value to each based on your estimate of its likeliness to be in a phishing message (e.g., one point if it’s somewhat likely, two points if moderately likely, or three points if highly likely). Write a program that scans a file of text for these terms and phrases. For each occurrence of a keyword or phrase within the text file, add the assigned point value to the total points for that word or phrase. For each keyword or phrase found, output one line with the word or phrase, the number of occurrences and the point total. Then show the point total for the entire message. Does your program assign a high point total to some actual phishing e-mails you’ve received? Does it assign a high point total to some legitimate e-mails you’ve received?

Answers

Answer:

Words found in phishing messages are:

Free gift

Promotion

Urgent

Congratulations

Check

Money order

Social security number

Passwords

Investment portfolio

Giveaway

Get out of debt

Ect. this should be a good starting point to figuring out a full list

Write the Java classes for the following classes. Make sure each includes 1. instance variables 2. constructor 3. copy constructor Submit a PDF with the code The classes are as follows: Character has-a name : String has-a health : integer has-a (Many) weapons : ArrayList has-a parent : Character has-a level : Level (this should not be a deep copy) Level has-a name : String has-a levelNumber : int has-a previousLevel : Level has-a nextLevel : Level Weapon has-a name : String has-a strength : double Monster is-a Character has-a angryness : double has-a weakness : Weakness Weakness has-a name : String has-a description: String has-a amount : int

Answers

Answer:

Explanation:

The following code is written in Java. It is attached as a PDF as requested and contains all of the classes, with the instance variables as described. Each variable has a setter/getter method and each class has a constructor. The image attached is a glimpse of the code.

To use cache memory main memory are divided into cache lines typically 32 or 64 bytes long.an entire cache line is cached at once what is the advantage of caching an entire line instead of single byte or word at a time?

Answers

Answer:

The advantage of caching an entire line in the main memory instead of a single byte or word at a time is to avoid cache pollution from used data

Explanation:

The major advantage of caching an entire line instead of single byte is to reduce the excess cache from used data and also to take advantage of the principle of spatial locality.

In java I need help on this specific code for this lab.


Problem 1:


Create a Class named Array2D with two instance methods:


public double[] rowAvg(int[][] array)


This method will receive a 2D array of integers, and will return a 1D array of doubles containing the average per row of the 2D array argument.


The method will adjust automatically to different sizes of rectangular 2D arrays.


Example: Using the following array for testing:


int [][] testArray =

{

{ 1, 2, 3, 4, 6},

{ 6, 7, 8, 9, 11},

{11, 12, 13, 14, 16}

};

must yield the following results:


Averages per row 1 : 3.20

Averages per row 2 : 8.20

Averages per row 3 : 13.20

While using this other array:


double[][] testArray =

{

{1, 2},

{4, 5},

{7, 8},

{3, 4}

};


must yield the following results:


Averages per row 1 : 1.50

Averages per row 2 : 4.50

Averages per row 3 : 7.50

Averages per row 4 : 3.50

public double[] colAvg(int[][] array)


This method will receive a 2D array of integers, and will return a 1D array of doubles containing the average per column of the 2D array argument.


The method will adjust automatically to different sizes of rectangular 2D arrays.


Example: Using the following array for testing:


int [][] testArray =

{

{ 1, 2, 3, 4, 6},

{ 6, 7, 8, 9, 11},

{11, 12, 13, 14, 16}

};

must yield the following results:


Averages per column 1: 6.00

Averages per column 2: 7.00

Averages per column 3: 8.00

Averages per column 4: 9.00

Averages per column 5: 11.00

While using this other array:


double[][] testArray =

{

{1, 2},

{4, 5},

{7, 8},

{3, 4}

};


must yield the following results:


Averages per column 1: 3.75

Averages per column 2: 4.75



My code is:


public class ArrayDemo2dd

{


public static void main(String[] args)

{

int [][] testArray1 =

{

{1, 2, 3, 4, 6},

{6, 7, 8, 9, 11},

{11, 12, 13, 14, 16}

};

int[][] testArray2 =

{

{1, 2 },

{4, 5},

{7, 8},

{3,4}

};


// The outer loop drives through the array row by row

// testArray1.length has the number of rows or the array

for (int row =0; row < testArray1.length; row++)

{

double sum =0;

// The inner loop uses the same row, then traverses all the columns of that row.

// testArray1[row].length has the number of columns of each row.

for(int col =0 ; col < testArray1[row].length; col++)

{

// An accumulator adds all the elements of each row

sum = sum + testArray1[row][col];

}

//The average per row is calculated dividing the total by the number of columns

System.out.println(sum/testArray1[row].length);

}

} // end of main()


}// end of class


However, it says there's an error... I'm not sure how to exactly do this type of code... So from my understanding do we convert it?

Answers

Answer:

Explanation:

The following code is written in Java and creates the two methods as requested each returning the desired double[] array with the averages. Both have been tested as seen in the example below and output the correct output as per the example in the question. they simply need to be added to whatever code you want.

public static double[] rowAvg(int[][] array) {

       double result[] = new double[array.length];

     for (int x = 0; x < array.length; x++) {

         double average = 0;

         for (int y = 0; y < array[x].length; y++) {

             average += array[x][y];

         }

         average = average / array[x].length;

         result[x] = average;

     }

     return result;

   }

   public static double[] colAvg(int[][] array) {

       double result[] = new double[array[0].length];

       for (int x = 0; x < array[x].length; x++) {

           double average = 0;

           for (int y = 0; y < array.length; y++) {

               average += array[y][x];

           }

           average = average / array.length;

           result[x] = average;

       }

 

       return result;

   }

Which of the following describes a codec? Choose all that apply.
a computer program that saves a digital audio file as a specific audio file format
short for coder-decoder
converts audio files, but does not compress them

Answers

Answer:

A, B

Explanation:

How does it relate
to public domain
and fair use?

Answers

Because the corilateion of the hippo

Before hard disk drives were available, computer information was stored on:

Floppy Disks

Cassette Tapes

Punch Cards

All of the Above

Answers

floppy disks . is the answer

Write a line of code that declares a variable called shipName and set it equal to the string SpaceX3000.

Answers

Answer:

shipName = "SpaceX3000"

Explanation:

Suppose you have the following search space:

State
next
cost

A
B
4

A
C
1

B
D
3

B
E
8

C
C
0

C
D
2

C
F
6

D
C
2

D
E
4

E
G
2

F
G
8

Draw the state space of this problem.

Assume that the initial state is A and the goal state is G. Show how each of the following search strategies would create a search tree to find a path from the initial state to the goal state:
Breadth-first search
Depth-first search
Uniform cost search

Answers

Breadth

Depth

Uniform

U

Animation timing is does not affect the
speed of the presentation
Select one:
True
False​

Answers

Answer:

True

Explanation:

I think it's true.....

Which of the follwing are examples of meta-reasoning?
A. She has been gone long so she must have gone far.
B. Since I usually make the wrong decision and the last two decisions I made were correct, I will reverse my next decision.
C. I am getting tired so I am probably not thinking clearly.
D. I am getting tired so I will probably take a nap.

Answers

Answer: B. Since I usually make the wrong decision and the last two decisions I made were correct, I will reverse my next decision.

C. I am getting tired so I am probably not thinking clearly

Explanation:

Meta-Reasoning simply refers to the processes which monitor how our reasoning progresses and our problem-solving activities and the time and the effort dedicated to such activities are regulated.

From the options given, the examples of meta reasoning are:

B. Since I usually make the wrong decision and the last two decisions I made were correct, I will reverse my next decision.

C. I am getting tired so I am probably not thinking clearly

Write a SELECT statement that displays each product purchased, the category of the product, the number of each product purchased, the maximum discount of each product, and the total price from all orders of the item for each product purchased. Include a final row that gives the same information over all products (a single row that provides cumulative information from all your rows). For the Maximum Discount and Order Total columns, round the values so that they only have two decimal spaces. Your result

Answers

Answer:

y6ou dont have mind

Explanation:

Other Questions
What are the three key elements of a campaign strategy? How do you explain comparing numbers? Why should we fund the arts in schools? What are the terms of expression 4x 3xy? Select the correct answer from each drop-down menu. abc has the points a(1, 7), b(-2, 2), and c(4, 2) as its vertices. the measure of the longest side of abc is units. abc is triangle. if abd is formed with the point d(1, 2) as its third vertex, then abd is triangle. the length of side ad is units. I NEED HELP ASAP!!! Martina and Sabrina created a number pattern that began with the number 0. Martina used the rule Add 2. Sabrina used the rule Add 6.Which statement is true about each corresponding pair of numbers in the two patterns?ResponsesA Each number in Sabrinas pattern is 4 more than the corresponding number in Martinas pattern.Each number in Sabrinas pattern is 4 more than the corresponding number in Martinas pattern.B Each number in Sabrinas pattern is 3 times the corresponding number in Martinas pattern. Each number in Sabrinas pattern is 3 times the corresponding number in Martinas pattern.C Each number in Sabrinas pattern is 4 times the corresponding number in Martinas pattern. Each number in Sabrinas pattern is 4 times the corresponding number in Martinas pattern.D Each number in Sabrinas pattern is 4 less than the corresponding number in Martinas pattern. What are the different types of musical instruments of Latin American music? Why did God give us with freedom? 65% Wed 11:13 PM MyMassasoit Login a In a downhill ski race, surprisingly, little advantage is gained by getting a running start. (This small hills.) To demonstrate this, find the final speed in m/s and the time taken in seconds for a skier who skies 67.0 m along a 25 slope neglecting friction for the following two cases. (En speeds to at least one decimal place Your s is because the initial kinetic energy is small compared with the gain in gravitational potential energy even on (a) starting from rest final speed the final m/s time takern (b) starting with an initial speed of 3,40 m/s final speed m/s time taken (c) Does the answer surprise you? Discuss why it is still advantageous to get a running start in very competitive events. Reading The central idea of "The Mysterious Olm" is the olm hasadapted especially well to its environment. Find textevidence and details that support the central idea in theexcerpt below. Write the text evidence and supportingdetails on the lines below.Like other cave salamanders, the olm survives on a dietof insects, snails, and crabs. But over 20 million years ofliving in dark caves, it has become mostly blind. It doeshave eyes that are almost microscopic, but they stopdeveloping early in its life. Gradually, layers of skingrow over them. But the olm doesn't need its eyes tolocate its prey. Instead, it relies on its super keen sensesof smell and hearing.The olm's skin is pale pink and translucent. Underneath,the shapes of its internal organs can be seen. Scientiststhink the olm's skin may also be a source of informa-tion. It may feel tiny vibrations in the air and waterthat help the olm sense the presence of moving things.Central Idea: The olm has adapted especially well to itsenvironment.Supporting Details: kierra is a young, single parent who is emotionally distant to her children. when she does interact with them, she often gets frustrated and sends them away from her. what type of attachment are her children likely to form What are the 4 pillars of joy? which of the following organizations is less focused on research and more focused on the practical side of being a behavior analysis professional? Item ARight Realist theories have had a significant influence on government policy, especiallybecause they appear to offer practical answers to the problem of crime. Like manyin later life. they focus on the idea that some people are naturally more aggressive orsociologists, they see childhood experiences as very important in determining behaviourless intelligent than others, and they stress the need to ensure the crime does not gounpunished.1. Applying material from item A, analyse two explanations for the causes of crime putforward by the right realists. [10] Mandy the Medical student is building her own ECG (ElectroCardioGram). She has set up the leads and is getting a signal with a magnitude up to 5 mV. She would like to filter the signal to only capture signal in the frequency range from 1 Hz to 40 Hz. She would also like to amplify the signal to have magnitude up to 1 V, so that it can be captured by the sound card on her computer. Produce a design for the active filter that will produce the neccessary filtering and gain required for Mandy's needs. 1, Class - 12, Question, In any triangle ABC, if, A=30 B= 90 find. a:b:c. Is there an inverse relationship between wavelength and frequency? _CH3CH2OH+_O2->_ CH2+_H2OBalance Equation Machine Learning is a science that studies the way computers have the ability to learn without being explicitly programmed (Arthur Samuel, 1959). Meanwhile, according to Tom Mitchell (1998) explained that Machine Learning is the ability of computers to learn from experience (experience) E to task (task) T charged with performance (performance) P measured. Based on the statement above, it can be concluded that machine learning is a field of study that gives computers the ability to learn without being programmed exclusively based on the data that is Obtained by a computer whose results from computer learning can handle and predict the data provided to the computer. The more data obtained by the computer, the better the performance. In short, if there is enough data, the program will study patterns and make good predictions of the data obtained. Machine learning can be said to provide inductive learning, because programs from computers try to infer the data obtained by the computer. Broadly speaking Machine Learning can be described as the Mind Map image below:Question: EXPLAIN AND GIVE EXAMPLES of definitions of machine learning, concept, techniques and algorithms. Answers must be supported by at least 3 references (Write using keyboard and references and links that can be accessed on the internet) What happened because of the Patriot Act?