A separate ________ should be completed for each computer that is analyzed, which should note Case Number, Date, Location, Make, Model, and Serial Number

Fill in the blank(s) with the appropriate word(s).


Answer: Worksheet. Other items such as Suspect and/or Custodian, Investigator, CPU, RAM, BIOS, BIOS Boot Sequence, Operating System, Drives, System Time and Date, Actual Time and Date, and Ports should be listed.

Computer Science & Information Technology

You might also like to view...

The method int getPosition(int array[], int X) is designed to return the position of X within the array. If X is not in the array, the method may return either -1 or array.length. Which of the following is a correct implementation for this method?

A) int k = 0; while (array[k] != X) { k++; } return k; B) int k = 0; while (k < array.length) { if (array[k] != X) return -1; else return k; } C) int k = 0; while (k < array.length && array[k] != X) { k++; } return k; D) int k = 0; while (k < array.length && array[k] != X) { k++; return k; }

Computer Science & Information Technology

__________ senses an interrupt signal, saves key control information for the currently executing program, and starts the operating system’s interrupt handler routine.

a. Hardware b. Software c. The operating system d. The file system

Computer Science & Information Technology

Master/slave multiprocessor organizations __________.

a) exhibit high fault tolerance b) enable many processors to execute the operating system, reducing the likelihood that contention will build up for operating system resources. c) exploit hardware asymmetry (e.g., if one processor is more powerful than other processors) and known parallelism in computationally-intensive tasks. d) exhibit high scalability, where adding a processor increases the system throughput by the new processor’s rated capacity.

Computer Science & Information Technology

Viruses that load from USB drives left connected to computers when computers are turned on are known as

a. boot-sector viruses. b. script viruses. c. polymorphic viruses. d. encryption viruses.

Computer Science & Information Technology