Which command deletes files without physically removing file

Assignment Help Computer Engineering
Reference no: EM132344694

Assignment: Solve the given multiple choice questions:

1. If a file has been removed from the Recycle Bin, what must you do to restore it?

a. remove the "deleted" flag from the file
b. run the attrib command on the Recycle Bin
c. use the Recycle Bin recover option
d. format the partition using the /Recycle option

2. In Linux, which command deletes files without physically removing the file from the disk?

a. /bin/purge
b. /bin/rm
c. /bin/format
d. /bin/clean

3. In Windows, what command can you use to delete a partition?

a. erase
b. format
c. diskpart
d. del

4. On a FAT or NTFS drive, where are deleted files stored?

a. C:\RECYCLED
b. C:\RESTORE
c. C:\ERASED
d. C:\DELETED

5. Recycled files on the NTFS system are categorized into directory names based on which of the following?

a. PID
b. GID
c. SID
d. UID

6. What command should a user run before deleting the recycled folder in Windows?

a. backup tecycled
b. attrib -s -h recycled
c. copy /recycled /newrecycled
d. format recycled

7. What term is best described as "looking for pieces of a file", and in some parts of North America it is called carving?

a. imaging
b. chaining
c. salvaging
d. sectoring

8. What type of technology does JPEG 2000 employ resulting in images that can be better compressed without affecting the quality of an image?

a. interlacing
b. rastering
c. indexing
d. wavelet

9. Which algorithm is a lossless data compression algorithm that combines the string of same byte values into the single code word?

a. Interlacing
b. CMYK
c. LZW
d. JPEG

10. Which of the following is a lossless image format intended to replace the GIF and TIFF formats?

a. ZIP
b. BMP
c. PNG
d. JPEG

11. Which of the following is a method of compressing files designed by Phil Katz?

a. JPEG
b. ZIP
c. PNG
d. TIFF

12. Which process determines the encoded hidden message and, if possible, recovers that message?

a. steganography
b. steganalysis
c. cryptanalysis
d. image data compression

13. Which technique uses an algorithm to find out if the data can be disregarded based on vectors that are present in the image file?

a. Vector quantization
b. ZIP
c. LZW
d. The Huffman Coding Algorithm

14. Which tool can be used to recover data from a Blu-ray disk?

a. Zip Repair Pro
b. CD Data Rescue
c. Flash Recovery
d. IsoBuster

15. Which tool can recover deleted or lost partitions?

a. Scaven
b. Acronis Recovery Expert
c. Zip Repair Pro
d. R-Linux

16. Which tool contains the unique feature of being able to open disk images and preview files and folders inside, before image restoration?

a. Partition Table Doctor
b. TestDisk
c. DiskInternals Partition Recovery
d. Active@ Disk Image

17. Which tool was designed to perform unattended multisession searches through large hard drives?

a. Scaven
b. Acronis Recovery Expert
c. Zip Repair Pro
d. R-Linux

18. Which type of data compression techniques are used with GIF images?

a. lossy
b. lossless
c. virtual
d. logical

19. Which type of image scale contains the colors in RGB, but only the colors used by the image?

a. Indexed color
b. CMYK
c. Grayscale
d. A vector image

20. Which type of images use geometrical shapes and primitives, such as points, lines, curves, and polygons, based upon mathematical equations, in order to represent images in a computer?

a. Raster images
b. Metafile graphics
c. Indexed color images
d. Vector images

Reference no: EM132344694

Questions Cloud

Why is society unwilling to discuss racial supremacy : Why is society unwilling to discuss racial supremacy? Would you say it is more of a matter of neglect or is it due to conditioning?
The number of units of widgets for dorchester to breakeven : Towson Manufacturing had a Work in Process balance of $62,000 on January 1, 2018. The year end balance of Work in Process was $80,000.
Process of teaching sociology : In the process of teaching sociology, what cultural capital (as opposed to, sociology, the subject matter), did the instructor try to transfer
Describe what is involved in corrective action : Describe what is involved in corrective action. Would an employee be motivated or empowered to improve after corrective action is implemented?
Which command deletes files without physically removing file : In Linux, which command deletes files without physically removing the file from the disk? In Windows, what command can you use to delete a partition?
Important to understand the management functions : As a health care manager, it will be important to understand the management functions, which include planning, organizing, controlling, and leading.
Observed in educational experience : What hidden curricula have you observed in your educational experience? Discuss and explain the example of hidden curriculum, and its consequences.
Does good communication build trust in an organization : Discuss the types of communication and the barriers to communication. Does good communication build trust in an organization?
What linux command used tcp or udp to write disk data : What Linux command used TCP or UDP to read and write disk data across the network? What is the most common method forensic investigators use to acquire digital.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd