Answer:
Other sources may be computer documents emails, text messages, transactions, images, and internet histories.
Step-by-step explanation:
from forensic science simplified.
5.8m questions
7.5m answers