Distinguish between how ntfs and fat store time, Computer Engineering

Assignment Help:

Problem

(a) Distinguish between how NTFS and FAT store time. Describe your answer.

(b) Unix epoch starts as from January 1, 1970, 00:00:00 GMT. Provide that Unix stores time (timestamp) as a 32-bit integer. Explian how time is calculated based on the 32 bit value.

(c) When a file is deleted in Windows Vista or higher, it goes to Recycle Bin and two files are created. These filenames start with $R and $I respectively.

(i) What is the importance of these two files.

(ii) What is the consequence, should the $I file be corrupted?

(d) Consider that evidence is required to prove that a suspect has downloaded a pirated movie named "Lost.avi".

(i) Which Windows OS artifact makes it possible to know if the suspect has viewed the file "Lost.avi" after it has been downloaded on his/her computer?

(ii) Where is this artifact often stored on the suspect's computer?

(iii) Is it possible to know when the last time the file "Lost.avi" was accessed through this artifact? Justify your answer.

(e) Consider a computer running Windows 2000 operating system and that there are no previous items in the Recycle Bin. If the user performs the subsequent actions, list down in the correct order the file name entries in the INFO2 file.

(i) user deletes the file named "ProgDescription.doc" from the D: drive.

(ii) user deletes the file named "budget2012.xls" from the C: drive.


Related Discussions:- Distinguish between how ntfs and fat store time

Convert the decimal number into its equivalent binary number, Write a progr...

Write a program to convert the given Decimal number into its equivalent Binary number.

What is load-through or early restart, What is load-through or early restar...

What is load-through or early restart? When a read miss happens for a system with cache the needed word may be sent to the processor as soon as it is read from the main memory

Objectives-parallel computer architecture , Objectives After going thro...

Objectives After going through this part, you will be capable to: Examine the meaning of Pipeline processing and explain pipeline processing architectures; Classify

Write a short notes on storage classes in c, Write a short notes on storage...

Write a short notes on storage classes in C. Every variable and function in C has two attributes : type and storage class. The four storage classes are automatic, external, reg

What happens if acknowledge() is called within a transaction, As per the JM...

As per the JMS specification, when you are in a transaction, the acknowledge Mode is ignored. If acknowledge() is known as within a transaction, it is ignored.

Determine about the stack organization, Stack Organization The CPU of t...

Stack Organization The CPU of the most computers comprises of stack or called as last-in-first-out (LIFO) list in which information is stored in such a manner that item stored

Explain the regular expression and transition diagram, State the relation a...

State the relation among Regular Expression, Transition Diagram and Finite State Machines. By using a simple instance establish your claim.   Answer: For each regular language,

Why disable statements are not allowed in functions, Why disable statements...

Why disable statements are not allowed in functions? If  disble  statement  is used  in function,it  invalids  function  and  its  return  value.  So  disable statements aren't

Documentation introduction, Documentation is done to give others with infor...

Documentation is done to give others with information and ease maintenance. The best documentation is done in the headers (function and scripts) and directly in the code. Any usefu

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd