Answer:
Explanation:
It knows how to remember data and where to find that data. In other words, it knows how the raw memory works. (RAM).
It understands how to make a program run within the confines of its logical steps in an order that makes the program work the way the user intends.
It can be made to display short cuts, or any icon or picture (not an obvious talent).
It can search for unwanted intruders like ads or viruses.
It can can time events even to the point of getting your coffee ready for you with the proper add on.
<span>If a thread is not finished running, perhaps because it had to wait or it was preempted, it is typically restarted on the same processor that previously ran it. This is this known as </span>processor affinity.
The quick access toolbar provides shortcuts to commonly used elements.
The Home Tab brings you to the home page and the File Tab allows you to save the file or print it.
I hope this helps! :)
Answer:
Cyber crime is also known as computer crime in which the illegal activities are done by the computer and many mobile devices. There are many types of crime but the cyber crime are associated with the computer crime by hacking personal documents and email spamming.
To resolve these type of cyber crime there is special type of police which is known as cyber cell. Data theft, cyber stalking and accessing other user data without there permission is all comes under the cyber crime.
Computer forensics is type of application that are used in investigation purpose and gathering the information from the computer.
The main aim of computer forensic is to perform and maintain the various type structured investigation and also maintain the systematic documents for the evidence.