Which of the following programs can be employed by an investigating officer to counter alteration of file extensions?
a. Simple 6.0
b. BIOSTAR
c. DiskEdit
d. Mareswares HexDump
Answer: d
Computer Science & Information Technology
You might also like to view...
Queries are used to retrieve information from tables and enable you to sort, search, and limit the data to just those records that you want to see
Indicate whether the statement is true or false
Computer Science & Information Technology
Compare the WHERE and HAVING clauses.
What will be an ideal response?
Computer Science & Information Technology