I know the answer for 1 is A
Answer:
If we are investigating login issues then we have to start with 'security logs' in 'windows logs' portion of Event viewer.
Explanation:
Much information about login issues is contained in log files which are related to security because it is mostly security issue. Some it is also better to start with 'system logs' portion of windows logs portion of Event viewer when there may be system problems instead of security issues. But in most cases there is security issues so 'security logs' is better option overall
Answer:
1) A kiosk are small platforms that can be used for obtaining information and programming relate to entertainment, transportation, commerce, applications, and other areas. A kiosk is located in busy business areas. With Kiosks, one is able to get answers to important information such as service locations.
2) Enterprise computing is the use of information technologies and computing in organizational setting. Enterprise computing provides improved data security
3) Natural language processing is the artificial intelligence concept that deals with the interaction between man and computer by use of natural language. With natural language processing, it is possible to interact with artificial intelligence application in the same manner we interact with a real person
4) Robotics is concerned with the design construction, and operation of robots. It involves the collaboration of computer science and engineering fields. Robotics provide 24 hours assistance including in inhuman conditions such as low oxygen
5) Virtual Reality (VR) is the creation of easily believable simulation of real life by means of computer technology. With virtual reality, one is able to practice practical trade skills in their living room
Explanation:
Answer: C. Live
Explanation:
A live acquisition is where data is retrieved from a digital device directly via its normal interface such as activating a computer and initiating executables. Doing so has a certain level of risk because data is highly likely to be modified by the operating system. The process becomes significantly more common likely with less available disk space to the point of completely impractical to image.
c. would be the best answer.