The aim of this project is to exercise and test your

Assignment Help Computer Engineering
Reference no: EM13354839

The aim of this project is to exercise and test your ability to read and understand descriptions of data formats and to interpret raw data according to a particular format.  In this exercise you will produce and read the dump of a ZIP file.
Detailed description:
perform four tasks:

(a) create ZIP archive with a single file in it (each person should produce her/his own - if identical files are submitted for interpretation, they will be returned to the students unmarked);
(b) prepare a hexadecimal dump of the first 80 bytes of the ZIP archive using online hexadecimal dumping utility https://www.fileformat.info/tool/hexdump.htm;
(c) analyze the hexadecimal dump using the description of the ZIP file format given in this Wikipedia article. The aim of the analysis is to determine the following information about the file stored in the ZIP archive:
o    Uncompressed size of the file (31%),
o    last modification date of the file (31%),
o    last modification time of the file (31%)
(d) Produce a brief (2-3 page) report showing how you MANUALLY translated hexadecimal dump values into the resulting values. 7% of the overall grade may be given for the tidiness of the report.

Summary:

The aim of this assignment is to exercise and test your ability to read and understand descriptions of incomplete FAT file system fragments.  In this exercise you will explore a binary file that contains part of a FAT file system and will recover files and folders present in that fragment.
Detailed description:
Suppose that you found an incomplete disk image (a bit-for-bit copy of the contents) of a small computer disk drive. The disk image is incomplete - the boot sector and some unknown number of the following sectors are missing. You can download the file data.bin here.


Perform the following tasks:

(a) Explore the supplied disk image using a hexadecimal editor, such as WinHex,and identify the location (offset from the start of the file) of each of the main FAT file system elements found in the supplied file :
1.    File Allocation Table
2.    Root Directory
3.    Beginning of the Data Area


(b) Identify - as much as possible - the information about the active and deleted files and sub-directories present in data.bin . For each discovered file or sub-directory please try to determine its:
1.    Short File Name
2.    Long File Name (if present)
3.    Active / Deleted status
4.    Attributes
5.    Timestamps (Creation, Last modification & Last Access)
6.    Likely contents

Although it is possible to do the analysis completely manually, you are allowed to use automation with the following condition: If you are using an automated tool, you must explain step by step how the tool got its results.


(c) Produce a report presenting the above. Extra 3 points are given for the tidiness of the report.ma

Reference no: EM13354839

Questions Cloud

Q 1 suggest how an economist would approach the problem of : q. 1. suggest how an economist would approach the problem of alcohol abuse. provide two possible solutions to this
Q1 the project management role has several responsibilities : q1. the project management role has several responsibilities in the area of scope. which of the following represent
Questionnbsp digital wireless sells a variety of mobile : questionnbsp digital wireless sells a variety of mobile telephones. the business began the last quarter of 2012 october
Qthis is a drag-and-drop question click on the curves below : q.this is a drag-and-drop question. click on the curves below and drag them to a new location on the graph that will
The aim of this project is to exercise and test your : the aim of this project is to exercise and test your ability to read and understand descriptions of data formats and to
Q client 2 is in the express small package industry limit : q. client 2 is in the express small package industry. limit your recommendation and supporting analysis to 250 words
Q i choose a sweater at the price of 12 in the past month : q. i choose a sweater at the price of 12 in the past month. describe how each of the 4 factors contributed to the
You are a policy person working in the budget office within : you are a policy person working in the budget office within your state government and you have to make a presentation
Q a selfless person approaches jones and smith with a 100 : q. a selfless person approaches jones and smith with a 100 bill and offers to sell it to the highest bidder but both

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd