1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aneli [31]
4 years ago
13

?In computer forensics, hidden data such as deleted files and file fragments are known as what term?

Computers and Technology
1 answer:
dexar [7]4 years ago
4 0
<span>In computer forensics, hidden data such as deleted files and file fragments are known as ambient data.
That term refers to any sort of data that the user cannot access on his or her own - it's not active, it just exists there somewhere in your computer. This term was first used in 1996, but it is still widely used even today in computer forensics.
</span>
You might be interested in
Can. you please help me with this ​
slava [35]

Answer:

the answer is A

7 0
3 years ago
Please hurry Arrange the steps of the engineering design process in the correct sequence.
AnnZ [28]

Answer:The Nine steps  of the engineering design process

  1. <u>Identify the Problem</u>-Defining the problem
  2. Finding solutions through Brainstorming technique
  3. Conducting a background research/Survey
  4. Developing the solution-Creating an array of solutions
  5. Selecting the best solution
  6. Building a prototype
  7. Testing and redesigning
  8. Improve the design-Specifying the requirement
  9. Communicating the result

6 0
3 years ago
You have repaired a broken LCD panel in a laptop computer. However, when you disassembled the laptop, you bent the hinge on the
Romashka-Z-Leto [24]

Answer:

Listen carefully to the customer and avoid getting defensive or even offensive.

Explanation:

The customer have every right to be angry since he might be ignorant of the work done and only act base on what he sees. In this scenario you need to listen carefully to his complain avoid been defensive and also avoid getting him/her more angry by been offensive. after he has laid out his complain you can then go ahead to explain why it is necessary to bend the hinge on the lid.

5 0
3 years ago
A security administrator wants to empty the DNS cache after a suspected attack that may have corrupted the DNS server. The serve
MAVERICK [17]

Answer:

The easiest method to clear a DNS cache is to use either the command line, PowerShell or Windows Server's DNS Manager

Explanation:

You can use either the ipconfig /flushdns (command line), Clear-DnsClientCache (PowerShell) or DNS->(name)->Clear Cache (from the DNS Manager)

source:

https://activedirectorypro.com/clear-windows-dns-cache/

https://www.technipages.com/flush-and-reset-the-dns-resolver-cache-using-ipconfig

8 0
3 years ago
Read 2 more answers
How can you get a fraction bar on a calculatar?
ArbitrLikvidat [17]
Convert a fraction to a decimal value using the fraction to decimal calculator by entering your fraction below. Use the “/” symbol for the fraction bar. To convert a decimal to a fraction, use our decimal to fraction calculator. Check out our fraction to percent calculator to convert fractions to a percentage.
6 0
3 years ago
Other questions:
  • In GIMP, the ( ) displays the image that the user is currently working on
    12·1 answer
  • In order for two computers to communicate via the internet, they must first locate one another. How do computers locate one anot
    12·1 answer
  • 6. Which of the following is malware? (1 point)
    10·2 answers
  • All members within a class are by default
    8·1 answer
  • Which example task should a developer use a trigger rather than a workflow rule for?
    11·1 answer
  • A falsh movies consist of how many frame? ​
    12·2 answers
  • How to fix this? Zoom it in to see it better
    8·1 answer
  • I DON"T GET THIS WHY IS THIS FUNNY
    8·1 answer
  • Levi wants to run 5 commands sequentially, but does not want to create a shell script. He knows that each command is going to ta
    5·1 answer
  • What dictionary operation can you use to remove all the keys within the dictionary-named contacts?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!