1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Art [367]
2 years ago
12

Definition of Computer forensics?

Computers and Technology
2 answers:
sukhopar [10]2 years ago
7 0

Answer:

Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media.

zysi [14]2 years ago
5 0

Answer:

Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation and maintain a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.

Explanation:

If this helped you, please consider brainly.

Thank you ,

Miss Hawaii

You might be interested in
How to improve a poor game design puzzles
Kipish [7]

Answer:

Steal code from github omegaLoL

Explanation:

ez clap CTRL+C CTRL+V

6 0
2 years ago
Please help!
Dafna1 [17]
You'd have to convert it into a supported format (mp4, avi, etc.) To do this I would add either video in the background or you can also add a plain color background
8 0
3 years ago
Read 2 more answers
Anyone can help me please ?
REY [17]

Answer:

no i m sorry realky sorry

4 0
2 years ago
What is the build in libary function to compare two strings?​
worty [1.4K]

Answer:

strcmp() is a built-in library function and is declared in <string. h> header file. This function takes two strings as arguments and compare these two strings lexicographically.

Explanation:

Hope it helps

3 0
3 years ago
What is an online reputation?
taurus [48]

Answer:

Reputation management refers to the influencing and controlling or concealing of an individual's or group's reputation

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Explain what a dam is and what it does
    12·1 answer
  • This library function returns a random floating point number within a specified range of values. The function returns a random f
    12·1 answer
  • Which of the following illustrations is depicted in the icon that's used to access Windows Help and Support files?
    13·1 answer
  • Select the correct text in the passage. George is working as a lead team lead. Which statements correctly describes the skills t
    12·1 answer
  • Given two strings s and t of equal length, the Hamming distance between s and t, denoted dH(s,t), is the number of corresponding
    6·1 answer
  • Peripeteia is also referred to as __________.
    5·2 answers
  • Please choose odd one out please tell fast ​
    13·2 answers
  • A. Why are the data known as raw facts? Explain.​
    14·2 answers
  • A laptop can be kept on palm to work. [true/false) ​
    5·1 answer
  • ________ helps in determining the cause of a security threat in an incident response plan. Question 7 options: A) Restricting sy
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!