Challenger App

No.1 PSC Learning App

1M+ Downloads
The process of recovering deleted and damaged files from criminal's computers comes under:

AComputer Graphics

BComputer Animation

CComputer Forensics

DComputer Organisation

Answer:

C. Computer Forensics


Related Questions:

What is E-mail Spoofing ?
The network topology in which nodes are connected to a central hub as known as
What is a firewall protection?
FIFO ഷെഡ്യൂളിംഗ് എന്നാൽ എന്താണ് ?
Which hardware device is used to interconnect different types of networks with different protocols?