What set of rules and conventions governs how computers exchange information over the network medium?
Name some factors that motivate criminal activity.
As a Word document is written and changed, these changes are tracked and produce a type of evidence that is called what?
What types of file should arouse your suspicion when you are examining data?
Why should you look at the header of an e-mail?
What is steganography?
What method can you use to determine if the extension of a file has been changed to avoid suspicion?
If you are investigating a case that involves the Internet and pictures, what three areas could reveal the Internet habits of the suspect?
What is a dual-boot system?
Name three types of trace evidence.