to understand what information is stored on your computer, examine the contents of the temporary internet files folders on your own computer as described in the text. review the filenames and examine the contents of a few of the files. describe how this information could be used as evidence of a crime. record information in a word document name