Poster because if you have that much space....well what I do is calculate it by the centimeters in square divide:)
Answer:
Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation and maintain a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.
Explanation:
If this helped you, please consider brainly.
Thank you ,
Miss Hawaii
Answer:
filter
Explanation:
Some email programs let you use a filter to move incoming mail to a specific folder or to delete it automatically based on the content of the message.
The filter performs this role by either automatically deleting or moving to another location.
Most messages that are moved or deleted are unsolicited emails or spam messages.
Filtering of your mails helps so you ou can manage your incoming mail using filters to send email to a label, or archive, delete, star, or automatically forward your mail.
This is a way of organising your correspondence.
Answer:
B - array; hash
Explanation:
Arrays store elements of the same data type in a list. Every element in the array is assigned a unique integer (starting at 0). You are able to access/process an element by using its assigned integer. Hashes are similar in the fact that they also store data. The difference is that each element is assigned an object type (instead of an integer), making it a collection of key pairs, as such you would typically not use this to process elements efficiently.