JOHNboy9070 JOHNboy9070 05-12-2022 Computers and Technology contestada when performing computer forensics, what can be prevented with a properly and carefully documented chain of custody?