- Apr 25, 2015
- 1,845
- 2
- 2,199
- 327

You use ____ to create, modify, and save bitmap, vector, and metafile graphics.
Graphics editors
Code:
See: Ch. 8: Recovering Graphics Files, Section - Recognizing a Graphics File
____ compression compresses data by permanently discarding bits of information in the file.
Lossy
Code:
See: Ch. 8: Recovering Graphics Files, Section - Understanding Data Compression
____ is the file structure database that Microsoft originally designed for floppy disks.
FAT
Code:
See: Ch. 5: Working with Windows and CLI Systems, Section - Exploring Microsoft File Structures
Lab costs can be broken down into monthly, ____, and annual expenses.
Quarterly
Code:
See: Ch. 2: The Investigator's Office and Laboratory, Section - Understanding Forensics Lab Accreditation Requirements
Software forensics tools are commonly used to copy data from a suspect's disk drive to a(n) ____.
Image file
Code:
See: Ch. 6: Current Digital Forensics Tools, Section - Evaluating Digital Forensics Tool Needs
The ____ command displays pages from the online help manual for information on Linux commands and their options.
man
Code:
See: Ch. 3: Data Acquisition, Section - Using Acquisition Tools
____ involves recovering information from a computer that was deleted by mistake or lost during a power surge or server crash, for example.
Data recovery
Code:
See: Ch. 1: Understanding the Digital Forensics Profession and Investigations, Section - An Overview of Digital Forensics
In general, a criminal case follows three stages: the complaint, the investigation, and the ____.
Prosecution
Code:
See: Ch. 1: Understanding the Digital Forensics Profession and Investigations, Section - Preparing a Digital Forensics Investigation
With ____, Macintosh moved to the Intel processor and became UNIX based.
OS X
Code:
See: Ch. 7: Linux and Macintosh File Systems, Section - Understanding Macintosh File Structures
____ records are data the system maintains, such as system log files and proxy server logs.
Computer-generated
Code:
See: Ch. 4: Processing Crime and Incident Scenes, Section - Identifying Digital Evidence