Ethical Hacking

I don’t know how to handle this Computer Science question and need guidance.

Topic 1

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals. In 250-300 words

Topic 2

Describe some ways that an organization can recover it’s IT resources from a natural disaster (fire, flood, hurricane, tornado etc.). What controls should have been in place in order to be able to retrieve this data? In 250-300 words