Brendalee3694 Brendalee3694 08-11-2022 Computers and Technology contestada when performing computer forensics, what can be prevented with a properly and carefully documented chain of custody?