Where data could be hidden, Basic Computer Science

Assignment Help:

QUESTION

(a) Being just employed as junior forensic examiner at SAI computer forensic Ltd, your supervisor told you, ‘hey Moona Tambi, we have received a hard disk for examination, I would like you to analyze the areas on this hard disk where we can get hidden information and document your findings'. Stunned I looked at his face. I said to myself, ‘how the hell will i do it'
Surprisingly the supervisor starts asking-

i. Where data could be hidden? Give two places and explain them in detailed

ii. What command would you use to take a backup and restore the first sector of the hard disk in Linux?

(b) After that your supervisor has asked the above questions, he realized that you have just been recruited and hence he himself did the analysis. When retrieving ‘a.ii' he could only get the below information about the hard disk. ‘Moona Tambi, I have already retrieved the required information, we need the hard disk size to finalize our report, please calculate the size of it and let me know', instructed my supervisor with a smile on his face and again added, ‘hope this time I will not have to come and do it. Don't forget it's a Windows machine with FAT 32.'

1. 16,384 cylinders

2. 80 heads

3. 63 sectors per track

(c) Briefly explain the different types of file systems that you as forensic expert would be experiencing


Related Discussions:- Where data could be hidden

Basic computer structure, Basic computer structure: A computer is an el...

Basic computer structure: A computer is an electronic device, which can accept and process data by carrying out a set of stored instructions in sequence. This sequence of math

Switching mechanisms , SWITCHING MECHANISMS: Switching mechanisms are ...

SWITCHING MECHANISMS: Switching mechanisms are techniques devised to send messages in many dinections at once and to ensure that these messages are received with a minimum of

Packet switching, Packet Switching: This is one of recent techniques o...

Packet Switching: This is one of recent techniques of switching. Packet switching was originally developed for use by ARPA network by the Defence Department of US. According t

Goals of autonomous rational agents, Goals of Autonomous Rational Agents: A...

Goals of Autonomous Rational Agents: Artificial intelligence One possible way to improve an agent's performance is to enable it to have some kind of details about what it is tr

Logic instructions , They are used to act upon logic operations on the oper...

They are used to act upon logic operations on the operators. AND OR, NEG NOT TEST XOR AND INSTRUCTION Function: It acts upon the conjunction of the operators bit by bit. Syntax: A

Iterative deepening search-artificial intelligence, Iterative Deepening Sea...

Iterative Deepening Search- Artificial intelligence: So, breadth first search is guaranteed to find a solution (if one exists), but it grape whole memory. However, Depth first

Nursing care activity module, Nursing Care Activity Module Retrievi...

Nursing Care Activity Module Retrieving of identification data of patient  Assessment of the patient  - Physical - Mental - Personal - Socio-c

Comparison instructions , They are used to evaluate operators, and they hav...

They are used to evaluate operators, and they have an effect on the content of the flags. CMP CMPS (CMPSB) (CMPSW) CMP INSTRUCTION Idea: To measure up to the operators. Syntax: CMP

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd