Igital Forensics Analysis and Validation

Whats a keylogger? How can it be used as part of an investigation? How do you keep it from being discovered?
Explain hexadecimal values in computers. Why and how are they used in computers?
Explain the process of hiding disk partitions. How would a perpetrator do it? How would an investigator find it?