seize that computer!
you should really organize this computer
random computer stuff
straight up acronyms
that's a lot of 1s and 0s
100

regarding a physical computer system, what is a peripheral device

devices that are plugged in/connected to computer
ex. keyboard, mouse

100

partitioning is used to separate data into different files, with the use of different file systems. why might this be helpful to have on a computer

prevent overfill which would render the system useless

100

when defragging, data is organized in order to eliminate _______ which was created due to the way in which a HDD stores files

slack space

100

HDD

hard disk drive

100

In a computer, the software refers to a non-physical part. What is the purpose of the software

the software is a set of instructions compiled into a digital program
ex: Microsoft or chrome

200

evidentiary data that exists in RAM and has not been saved to the ____, will be lost

HDD

200

In disk formatting process, there are three levels. Name them

low-level formatting

partitioning

high-level formatting

200

____________ forensics is the process of identifying, acquiring, analyzing, and reporting date from digital devices, often for legal cases

digital/system

200

CPU

Central Processing Unit



200

the smallest increment of data on a computer is the binary code. What is an individual binary called

a bit

300

Regarding the components of a computer, what is the general name for the pieces like the keyboard, RAM, and HDD

hardware

300

what is RAM slack and how is it different from File slack

RAM slack occupies the space remaining after the data has been placed in the sector 

file slack is the remaining space of the cluster

300

what is visible data on a computer

all info the operating system is aware of
data/work product files
text based docs for correspondence
financial records

300

SIMM and DIMM

Single/Dual Inline Memory Module

300

how many clusters does a hard drive typically contain and what is the number dependent on

it can contain as many clusters as drive geometry allows. Dependent on how many sectors are in a cluster

400

why is removing the HDD from the original system and placing it in a laboratory forensic computer to create a forensic image safer than just booting the system

the HDD can be placed in a faraday box when not in use and then inserted into a computer that has no software that could interfere with the HDD

400

when a system is low on memory, the swap file system creates temp storage on a hard disk/drive. What does the swap file move around

swaps a section of RAM storage from an unused program and frees up memory for other programs

400

in order to reconstruct a timeline of digital event, investigators can analyze data in transit. What kind of computer forensics deals with understanding how a breach occurred

network forensics

400

SDRAM

synchronous dynamic random access memory

400

what is latent data and how is it viewed

hidden data that uses binary code to read a HDD

500

what is a forensic copy of a computer

all the software and storage is copied so the forensic copy is a exact replica of the system

500

Sometimes a forensic copy can not be made due to the BIOS, so the entire physical computer must be seized. why

the basic input-output system interprets the geometry of the HDD differently than the forensic computer 

500

Data forensics deals with determining how an incident occurred, who was involved, and what system was affected. What do investigators look for

anomalies and patterns in data software like messages, web history, unauthorized access.

500

what is Internet Protocol (IP)

a protocol for sending data across the Internet that assigns unique numbers (IP addresses) to each connected device

500

when performing a system shut down, the plug should be pulled from the back of the computer, not the wall. why?

When the plug is pulled from the wall the computer will go to generator and will trigger the operating system to stay powered up. The data will also be encrypted and be rendered unreadable without a password