Answer:C
Explanation:it authorizes and authenticates all users and computer in a window domain- type network assigning and enforcing security for all computers and installing or updating software
Answer:
Open a file when the program needs to work with it and close the file as soon as you have finished using it.
Explanation:
In programming, we have some files that are stored in memory, or created in some other section of the program to save information.
<u><em>for example</em></u>, we want to save the data of a class or school faculty to create a database. For this purpose I need to create a file.
As the files that we will create may contains data, these files will utilize computer resources such as, memory (RAM, Cache) and other resources. While programming, we need these resources as well.
<em>Therefore, It is necessary to open a file when the program needs to work with it and close the file as soon as we have finished using it. The reason is that, it takes computer resources which are limited. </em>
I think assembly level command mov ,push ,call
Answer:
In the computer forensics, it basically examining the digital media by using the different types of specialist tools which is known as forensic tool.
It has the ability to acquiring the several evidence from the computer hard disk and by copying information, the data from the machine that can be procured and after that broke down for any data that is appropriate for the case.
There are different types of forensics tools that are:
- SIFT (SANS Investigative Forensics Toolkit)
- Volatility
- Redline
- Digitally forensics framework
- COFEE
<span>Computer design replaced (B) models draw or created by hand. Technology nowadays has a big contribution in terms of planning and designing a building or a structure without burning your eyebrow facing that paper and handling your pen. Computer designs are used to make the design more accurate and more precise compared to traditional hand drawn designs.</span>