This amendment support the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures
4th Amendment
This device is used to ensure continuity of power during potential outages
UPS
This process is used in SSDs to extend their lifespan in regard to storage usage
Wear Leveling
This is the full version for the acronym BIOS
Basic Input Output System
This is the conversion of the binary number 1111 to decimal
15
This involves hiding, altering, or destroying evidence related to an investigation
Spoliation
This tool is a desktop application that an be used to quickly hash a file using multiple algorithms
HashCalc
This technology is used for connecting external drives, and is a form of SATA
eSATA
This is the full version for the acronym UEFI
Unified Extensible Firmware Interface
This is the conversion of the binary number 1101011 to decimal
107
What is a unit within the FBI that is responsible for providing support for investigations that require skilled computer forensics examinations
Computer Analysis Response Team
This application is robust, and you may bookmark evidence which helps create reports
EnCase
This file system has a file size limit of 4GB
FAT32
This is the full version for the acronym SSD
Solid State Drive
When copying one drive to another, this drive is the drive being copied to
Harvest Drive
This is an important crime database utilized by law enforcement nationwide to apprehend fugitives, recover stolen goods, identify terrorists, and locate missing persons
National Crime Information Center (NCIC)
This product is used to image Apple computers, iPhone's and iPads
Blacklight
This file system is the most commonly used in Microsoft Windows today
NTFS
This is the full version for the acronym RAID
When you acquire a hard disk with the intent to create a file containing the entirety of the information you create this
Disk image
This individual testifies about personal experience and knowledge and may not express an opinion
Lay witness
This technology can be used to encrypt USB drives
Bitlocker 2 Go
This is used to extract data from a disk drive or other storage device without the assistance of the file system that originality created the file
File Carving
This is the full version for the acronym SWGDE
Scientific Work Group on Digital Forensics
When working with USB forensics, this is where you will find most of the evidence
Registry