The aim of this project is to exercise and test your

Assignment Help Computer Engineering
Reference no: EM13354839

The aim of this project is to exercise and test your ability to read and understand descriptions of data formats and to interpret raw data according to a particular format.  In this exercise you will produce and read the dump of a ZIP file.
Detailed description:
perform four tasks:

(a) create ZIP archive with a single file in it (each person should produce her/his own - if identical files are submitted for interpretation, they will be returned to the students unmarked);
(b) prepare a hexadecimal dump of the first 80 bytes of the ZIP archive using online hexadecimal dumping utility https://www.fileformat.info/tool/hexdump.htm;
(c) analyze the hexadecimal dump using the description of the ZIP file format given in this Wikipedia article. The aim of the analysis is to determine the following information about the file stored in the ZIP archive:
o    Uncompressed size of the file (31%),
o    last modification date of the file (31%),
o    last modification time of the file (31%)
(d) Produce a brief (2-3 page) report showing how you MANUALLY translated hexadecimal dump values into the resulting values. 7% of the overall grade may be given for the tidiness of the report.

Summary:

The aim of this assignment is to exercise and test your ability to read and understand descriptions of incomplete FAT file system fragments.  In this exercise you will explore a binary file that contains part of a FAT file system and will recover files and folders present in that fragment.
Detailed description:
Suppose that you found an incomplete disk image (a bit-for-bit copy of the contents) of a small computer disk drive. The disk image is incomplete - the boot sector and some unknown number of the following sectors are missing. You can download the file data.bin here.


Perform the following tasks:

(a) Explore the supplied disk image using a hexadecimal editor, such as WinHex,and identify the location (offset from the start of the file) of each of the main FAT file system elements found in the supplied file :
1.    File Allocation Table
2.    Root Directory
3.    Beginning of the Data Area


(b) Identify - as much as possible - the information about the active and deleted files and sub-directories present in data.bin . For each discovered file or sub-directory please try to determine its:
1.    Short File Name
2.    Long File Name (if present)
3.    Active / Deleted status
4.    Attributes
5.    Timestamps (Creation, Last modification & Last Access)
6.    Likely contents

Although it is possible to do the analysis completely manually, you are allowed to use automation with the following condition: If you are using an automated tool, you must explain step by step how the tool got its results.


(c) Produce a report presenting the above. Extra 3 points are given for the tidiness of the report.ma

Reference no: EM13354839

Questions Cloud

Q 1 suggest how an economist would approach the problem of : q. 1. suggest how an economist would approach the problem of alcohol abuse. provide two possible solutions to this
Q1 the project management role has several responsibilities : q1. the project management role has several responsibilities in the area of scope. which of the following represent
Questionnbsp digital wireless sells a variety of mobile : questionnbsp digital wireless sells a variety of mobile telephones. the business began the last quarter of 2012 october
Qthis is a drag-and-drop question click on the curves below : q.this is a drag-and-drop question. click on the curves below and drag them to a new location on the graph that will
The aim of this project is to exercise and test your : the aim of this project is to exercise and test your ability to read and understand descriptions of data formats and to
Q client 2 is in the express small package industry limit : q. client 2 is in the express small package industry. limit your recommendation and supporting analysis to 250 words
Q i choose a sweater at the price of 12 in the past month : q. i choose a sweater at the price of 12 in the past month. describe how each of the 4 factors contributed to the
You are a policy person working in the budget office within : you are a policy person working in the budget office within your state government and you have to make a presentation
Q a selfless person approaches jones and smith with a 100 : q. a selfless person approaches jones and smith with a 100 bill and offers to sell it to the highest bidder but both

Reviews

Write a Review

Computer Engineering Questions & Answers

  Problem on bubble sort algorithm

Problem on Bubble sort algorithm

  Why sapient developed its own agile methodology

Identify at least three requirements needed before implementing Sapient's agile methodology for its internal and external customers and describe a non-agile alternative that Sapient could have considered.

  List minimum five non-computer related businesses

List minimum five non-computer related businesses where software has a significant, if 'behind the scenes' impact.

  Wan technologies for mobile user-to-office

WAN technologies for each of the Wilke’s three connectivity situations: mobile user-to-office, office to office, and home-to-office.

  Questionafter front-office network at xyz corp is set up an

questionafter front-office network at xyz corp. is set up an accountant realizes that if loading dock connected to the

  Convert structure plan into a function m-file

how to Convert the following structure plan into a function m-file with two inputs (M and N).

  Compares and contrasts linux server and linux workstation

Your company is currently investigating the use of Linux. Your manager has asked you to research the feasibility of using Linux in both the server and workstation environments. Your manager would like to see an 8- to 10-page paper that:

  How to protect your network to keep data safe

describe how to protect your network to keep data safe from loss or damage.

  Providing overview of lane

Describe in scholarly detail an overview of the LANE and explain its place in an organization's network strategy. Answer should be of 300 words and also provide reference.

  Describe how it applies to the realm of data communication

Write one to two paragraphs on each topic below, and describe how it applies to the realm of data communication. Also discuss what type of damage these computer infections can do to data in a computer.

  Creating program that accepts infix expression as input

The left and right sub trees of an operator explain a sub expression that is evaluated and utilized as one of the operands for operator. Write down a program that inputs an infix expression and generates an expression tree. Output prefix expressi..

  Scripts_new directory and dir.txt file

Write down the following folder structure on C: drive of your computer: Scripts_New, Networking, User.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd