I will assume this is a windows computer
Answer:
- Disk (Letter)\Users\<"Answer">\Folder\Documents\SuspiciousFile.exe
- You can use Windows Security Logs to try and find out from what IP address the user you just found logged in from.
Explanation:
The windows user folder has folders that contain each users data, Using the file path of the suspicious file you can figure out which user is associated with the file.
Windows Security Logs collect data on logon attempts so when the user logs in their IP address should be collected in these log files.
Nolur acil lütfen yalvarırım yalvarırım lütfen yalvarırım when should you integrate technology?
Answer:
Drive Wipe F is correct
Explanation:
Drives content is virtual so it wouldn't work to shred or incinerate it. overwriting it wouldn't work to get rid of files exactly. it might get rid of the files but it would replace the files with other files.
Answer:
1) 1st Gen : ENIAC
2nd Gen : IBM 7030
3rd Gen : IBM 360 / 370
4th Gen : Apple
5th Gen : Sun Workstation
2) Features of 2nd Gen computers
• Small in size
• Less heat generation
• Low power consumption
• Comparatively faster than the first generation
3) Quality , Storage of Text , Time Saving , Security
4) • Analog computer has no state.
• Digital computer has On and Off these 2 steps.
5) • Large in size
• Higher computing power
• Expensive
• Rare