FSCI 1010U Lecture Notes - Lecture 11: Secure Hash Algorithms, Word Processor, Caller Id

62 views12 pages

Document Summary

They are examples of computers: electronic numerical integrator and calculator (eniac) Started building at 1933 but finished at 1946. To help against the german forces: whirlwind machine. Computers have permeated society and are used in countless ways with innumerable applications. Similarly, the role of electronic data in investigative work has realized exponential growth in the last decade. The usage of computers and other electronic data storage devices: leaves behind some footprints and, data trails of their users. Computer forensics involves the: preservation, acquisition, extraction, interpretation information of computer data information of computer data information of computer data information of computer data. In today"s world of technology, many devices are capable of storing data and could thus be grouped into the field of computer forensics: ipods, phones, usb ect. , Hardware: physical components of a computer. Ex: case, keyboards, mother boards, monitor, hard drives, cpu, Software: set of instructions compiled into programs that perform a specific task.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents