A digital hash is a unique hexadecimal code value created by running a file through a mathematical formula (hashing algorithm) that can be used to check if a file has been altered. The reverse funnel method is an e-discovery approach where discovery begins with a small, targeted data collection that expands in scope as relevant data is identified during review. A load file contains scanned or electronic documents and metadata and may include extracted text. A targeted e-discovery scope focuses initial collection on specific data sources and custodians, expanding as needed, while a broad scope aims to collect as much data as possible upfront.
A digital hash is a unique hexadecimal code value created by running a file through a mathematical formula (hashing algorithm) that can be used to check if a file has been altered. The reverse funnel method is an e-discovery approach where discovery begins with a small, targeted data collection that expands in scope as relevant data is identified during review. A load file contains scanned or electronic documents and metadata and may include extracted text. A targeted e-discovery scope focuses initial collection on specific data sources and custodians, expanding as needed, while a broad scope aims to collect as much data as possible upfront.
A digital hash is a unique hexadecimal code value created by running a file through a mathematical formula (hashing algorithm) that can be used to check if a file has been altered. The reverse funnel method is an e-discovery approach where discovery begins with a small, targeted data collection that expands in scope as relevant data is identified during review. A load file contains scanned or electronic documents and metadata and may include extracted text. A targeted e-discovery scope focuses initial collection on specific data sources and custodians, expanding as needed, while a broad scope aims to collect as much data as possible upfront.
A digital hash is a unique hexadecimal code value created by running a file through a mathematical formula (hashing algorithm) that can be used to check if a file has been altered. The reverse funnel method is an e-discovery approach where discovery begins with a small, targeted data collection that expands in scope as relevant data is identified during review. A load file contains scanned or electronic documents and metadata and may include extracted text. A targeted e-discovery scope focuses initial collection on specific data sources and custodians, expanding as needed, while a broad scope aims to collect as much data as possible upfront.
A. An analogy describing how discovery can begin with small, targeted data collections and expand in scope based on parsing and reviewing data in the initial collection. B. A value created by using a mathematical formula (a hashing algorithm) that translates a file into a unique hexadecimal code value; used to determine whether data in a file has changed or been altered. C. An e-discovery method that focuses on small data collections, usually from specified data locations or custodians; typically, the data collection is expanded as relevant data is identified. D. A set of scanned images or electronically processed files containing pages and attachments to documents, e-mails, or files. A load file can also contain data related to documents it contains, such as selected metadata, coded data, and extracted text. Key: B
2. What is Reverse Funnel Method?
A. A set of scanned images or electronically processed files containing pages and attachments to documents, e-mails, or files. A load file can also contain data related to documents it contains, such as selected metadata, coded data, and extracted text. B. An e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found. C. An analogy describing how discovery can begin with small, targeted data collections and expand in scope based on parsing and reviewing data in the initial collection. D. An e-discovery method that focuses on small data collections, usually from specified data locations or custodians; typically, the data collection is expanded as relevant data is identified. Key: C
3. What is a Load File?
A. A value created by using a mathematical formula (a hashing algorithm) that translates a file into a unique hexadecimal code value; used to determine whether data in a file has changed or been altered. B. An analogy describing how discovery can begin with small, targeted data collections and expand in scope based on parsing and reviewing data in the initial collection. C. An e-discovery method that focuses on small data collections, usually from specified data locations or custodians; typically, the data collection is expanded as relevant data is identified. D. A set of scanned images or electronically processed files containing pages and attachments to documents, e-mails, or files. A load file can also contain data related to documents it contains, such as selected metadata, coded data, and extracted text. Key: D
4. What is a Targeted E-Discovery Scope?
A. An e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found. B. An analogy describing how discovery can begin with small, targeted data collections and expand in scope based on parsing and reviewing data in the initial collection. C. An e-discovery method that focuses on small data collections, usually from specified data locations or custodians; typically, the data collection is expanded as relevant data is identified. D. A value created by using a mathematical formula (a hashing algorithm) that translates a file into a unique hexadecimal code value; used to determine whether data in a file has changed or been altered. Key: C
5. What is a Broad E-Discovery Scope?
A. A value created by using a mathematical formula (a hashing algorithm) that translates a file into a unique hexadecimal code value; used to determine whether data in a file has changed or been altered. B. An e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found. C. An analogy describing how discovery can begin with small, targeted data collections and expand in scope based on parsing and reviewing data in the initial collection. D. An e-discovery method that focuses on small data collections, usually from specified data locations or custodians; typically, the data collection is expanded as relevant data is identified. Key: B