Distinguish between how ntfs and fat store time, Computer Engineering

Assignment Help:

Problem

(a) Distinguish between how NTFS and FAT store time. Describe your answer.

(b) Unix epoch starts as from January 1, 1970, 00:00:00 GMT. Provide that Unix stores time (timestamp) as a 32-bit integer. Explian how time is calculated based on the 32 bit value.

(c) When a file is deleted in Windows Vista or higher, it goes to Recycle Bin and two files are created. These filenames start with $R and $I respectively.

(i) What is the importance of these two files.

(ii) What is the consequence, should the $I file be corrupted?

(d) Consider that evidence is required to prove that a suspect has downloaded a pirated movie named "Lost.avi".

(i) Which Windows OS artifact makes it possible to know if the suspect has viewed the file "Lost.avi" after it has been downloaded on his/her computer?

(ii) Where is this artifact often stored on the suspect's computer?

(iii) Is it possible to know when the last time the file "Lost.avi" was accessed through this artifact? Justify your answer.

(e) Consider a computer running Windows 2000 operating system and that there are no previous items in the Recycle Bin. If the user performs the subsequent actions, list down in the correct order the file name entries in the INFO2 file.

(i) user deletes the file named "ProgDescription.doc" from the D: drive.

(ii) user deletes the file named "budget2012.xls" from the C: drive.


Related Discussions:- Distinguish between how ntfs and fat store time

I printout the formulas in an excel spreadsheet, How can I printout the for...

How can I printout the formulas in an Excel spreadsheet - rather than the results? Ans) The trick is to change the way Excel shows the worksheet before you choose to print. Ch

Determine the advantages of sixth generation computers, Determine the advan...

Determine the advantages of sixth generation computers One of the major dramatic changes in sixth generation will be the explosive growth of wide area networking. Network bandw

How can you have an accession number, Accession number (bioinformatics), a ...

Accession number (bioinformatics), a unique identifier given to a biological polymer sequence (DNA, protein) when it is given to a sequence database.

Describe about directory in doc, Q. Describe about directory in DOC? We...

Q. Describe about directory in DOC? We all know that, the volume of the hard disk is generally quite large (10 MB to a few GB). You can keep hundreds or even thousands of files

Propositional inference rules - artificial intelligence, Propositional Infe...

Propositional Inference Rules -Artificial intelligence : Equivalence rules are specifically useful because of the vice-versa aspect,that means we can discover forwards andbackw

Drawbacks to having call centres overseas, Drawbacks to having call centres...

Drawbacks to having call centres overseas -  Culture and language problems -  Animosity to overseas call centres (resulting in loss of customers) -  need for extensive r

Link your documents to site, Images in the top area of Compass home page gu...

Images in the top area of Compass home page guide visitors to specific pages on the site. Now you will add links for navigation buttons. You will see that there are some ways to

Illustrate about the single inheritance, Illustrate about the single inheri...

Illustrate about the single inheritance During inheritance, superclass feature may by override by a subclass defining that feature with the same name. The overriding features (

System analysis and design, write an algorithm on railway reservation ticke...

write an algorithm on railway reservation ticket window

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd