Answer:
Other sources may be computer documents emails, text messages, transactions, images, and internet histories.
Step-by-step explanation:
from forensic science simplified.
3.6m questions
4.6m answers