Answer:
Defragmenting, and optimizing, also on Windows to not use Paging unless you have an SSD. And to install a lightweight OS like Windows 11 super-lite, Linux etc.
The three components is a specialized video card, large and fast hard drives and specialized audio card.
Traditional crime scenes have physical evidence while electronic crime scenes have digital evidence such as IP address, geolocation, and user data.
Answer:
(a) Weak passwords
Explanation:
Typically, a password is weak if it is easily discovered by all persons including unauthorized users. When passwords to a network are weak, the network is vulnerable to unauthorized access and may permit access to proprietary code, accounting files and other sensitive documents in the network.
Examples of weak passwords are;
i. those generated from the name of a user.
ii. those generated for a user by default.
iii. those generated from words from dictionary or other similar materials.
iv. those that don't include a combination of letters and numbers and even symbols.
v. those that are short in length e.g less than 8 characters.