<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>onlineclassesguru</provider_name><provider_url>https://onlineclassesguru.com</provider_url><title>The Investigation of Computer-Related Crime - onlineclassesguru</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="0HXcYN0YLl"&gt;&lt;a href="https://onlineclassesguru.com/index.php/2020/11/14/the-investigation-of-computer-related-crime/"&gt;The Investigation of Computer-Related Crime&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://onlineclassesguru.com/index.php/2020/11/14/the-investigation-of-computer-related-crime/embed/#?secret=0HXcYN0YLl" width="600" height="338" title="&#x201C;The Investigation of Computer-Related Crime&#x201D; &#x2014; onlineclassesguru" data-secret="0HXcYN0YLl" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><description>&#x201C;The Investigation of Computer-Related Crime&#x201D; Please respond to the following: From the reading, there are general principles that investigators must follow when they respond to any crime scene in which computers and electronic technology may be involved. Suggest at least two general principles for proper evidence preservation for stand-alone personal computers, networked home personal computers,...</description></oembed>
