In: Computer Science
1.What process is used to ensure that evidence is kept secure and it's integrity is maintained from collection to destruction?
2.Blank image is an exact copy without the addition of any compression or metadata.
3.What is the part of the hard drive that is not easily accessible to the user or the operating system?
4.
A firewall log is an example of a computer______
record while a budget spreadsheet is an example of a computer_____record.