Distinguish between how ntfs and fat store time, Computer Engineering

Assignment Help:

Problem

(a) Distinguish between how NTFS and FAT store time. Describe your answer.

(b) Unix epoch starts as from January 1, 1970, 00:00:00 GMT. Provide that Unix stores time (timestamp) as a 32-bit integer. Explian how time is calculated based on the 32 bit value.

(c) When a file is deleted in Windows Vista or higher, it goes to Recycle Bin and two files are created. These filenames start with $R and $I respectively.

(i) What is the importance of these two files.

(ii) What is the consequence, should the $I file be corrupted?

(d) Consider that evidence is required to prove that a suspect has downloaded a pirated movie named "Lost.avi".

(i) Which Windows OS artifact makes it possible to know if the suspect has viewed the file "Lost.avi" after it has been downloaded on his/her computer?

(ii) Where is this artifact often stored on the suspect's computer?

(iii) Is it possible to know when the last time the file "Lost.avi" was accessed through this artifact? Justify your answer.

(e) Consider a computer running Windows 2000 operating system and that there are no previous items in the Recycle Bin. If the user performs the subsequent actions, list down in the correct order the file name entries in the INFO2 file.

(i) user deletes the file named "ProgDescription.doc" from the D: drive.

(ii) user deletes the file named "budget2012.xls" from the C: drive.


Related Discussions:- Distinguish between how ntfs and fat store time

What do you understand by electronic funds transfer, What do you understand...

What do you understand by Electronic Funds Transfer?  Electronic Funds Transfer: It's an electronic payment method that transfers the money value from one bank account to

Breakthrough for computer engineering, what is the importance of chemistry ...

what is the importance of chemistry for computer engineering?

Designing the instruction format, Q. Designing the instruction format is a ...

Q. Designing the instruction format is a complex art? Instruction Length Significance: It's the fundamental issue of the format design. It concludes the richness and flex

Minimumshelf program in c, At a shop of marbles, packs of marbles are prepa...

At a shop of marbles, packs of marbles are prepared. Packets are named A, B, C, D, E …….. All packets are kept in a VERTICAL SHELF in random order. Any numbers of packets with thes

Explain simplifying the sop boolean expression using k-map, Explain Simplif...

Explain Simplifying the SOP f the Boolean expression using the K-Map? To simplify the SOP of the Boolean expression using the K map, first identify all the input combinations tha

Structure of 8086 cpu, 8086 microprocessor comprises two independent units:...

8086 microprocessor comprises two independent units:  1.  Bus Interface unit 2.  Execution unit Please refer to Figure below. Figure: The CPU of INTEL 8086 Microp

What is the concept of lock, Q. What is the Concept of Lock? Locks are ...

Q. What is the Concept of Lock? Locks are used for protected access of data in a shared variable system.  There are numerous kinds of locks:  1)  Binary Locks: These locks a

Radius of curvature in differential calculas, find the radius of curvature ...

find the radius of curvature at the point (3,3) at a point x3+xy2-6y2=0?

.image forgery detection, what is the code to detect image forgery using Ma...

what is the code to detect image forgery using Matlab..??

i use server session pools and connection consumers, When should I use ser...

When should I use server session pools and connection consumers? Ans) WebLogic JMS executes an optional JMS facility for defining a server-managed pool of server sessions. This

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd