Challenger App

No.1 PSC Learning App

1M+ Downloads
The process of recovering deleted and damaged files from criminal's computers comes under:

AComputer Graphics

BComputer Animation

CComputer Forensics

DComputer Organisation

Answer:

C. Computer Forensics


Related Questions:

Cryptography is the study of information …….
ADSL gives
Forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source is known as:
TCP/IP stands for
What type of email attack involves a forged email header to make it appear as if it came from a legitimate source?