Answer:
boot disk
Explanation:
This disk contains files required by the boot sequence as well as the operating system, which is loaded at the end of the startup process.
 
        
             
        
        
        
Answer:
Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation and maintain a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.
Explanation:
If this helped you, please consider brainly.
Thank you ,
 Miss Hawaii
 
        
                    
             
        
        
        
Answer:
The answer of the following question is Brute force attack
.
Explanation:
A brute force attack is the error and trial method that is used by an application program to decode the encrypted data like passwords or the Data Encryption Standard (DES) keys, which through an exhaustive effort (by using brute force) rather than the employing an intellectual strategies.
 
        
             
        
        
        
Answer:
File, Edit, and View
Explanation:
These are the standard ones that come with the software.