Where data could be hidden, Basic Computer Science

Assignment Help:

QUESTION

(a) Being just employed as junior forensic examiner at SAI computer forensic Ltd, your supervisor told you, ‘hey Moona Tambi, we have received a hard disk for examination, I would like you to analyze the areas on this hard disk where we can get hidden information and document your findings'. Stunned I looked at his face. I said to myself, ‘how the hell will i do it'
Surprisingly the supervisor starts asking-

i. Where data could be hidden? Give two places and explain them in detailed

ii. What command would you use to take a backup and restore the first sector of the hard disk in Linux?

(b) After that your supervisor has asked the above questions, he realized that you have just been recruited and hence he himself did the analysis. When retrieving ‘a.ii' he could only get the below information about the hard disk. ‘Moona Tambi, I have already retrieved the required information, we need the hard disk size to finalize our report, please calculate the size of it and let me know', instructed my supervisor with a smile on his face and again added, ‘hope this time I will not have to come and do it. Don't forget it's a Windows machine with FAT 32.'

1. 16,384 cylinders

2. 80 heads

3. 63 sectors per track

(c) Briefly explain the different types of file systems that you as forensic expert would be experiencing


Related Discussions:- Where data could be hidden

Modeling historical data, Given the scenario below, construct a conceptual ...

Given the scenario below, construct a conceptual model. The Seville, Spain soccer association is renovating their soccer arena. They are adding luxury boxes that will be offered to

Binary, Ask quwhat is binary estion #Minimum 100 words accepted#

Ask quwhat is binary estion #Minimum 100 words accepted#

Optical mark recognition, Optical Mark Recognition (OMR): OMR is the s...

Optical Mark Recognition (OMR): OMR is the scanning of paper to detect the presence or absence of a mark in a predetermined position. Now days, it is used as an input device f

Program planning (preparation of a flow chart), Program Planning (Preparati...

Program Planning (Preparation of a Flow Chart) A flow chart is a graphic method for indicating a proposed or actual solution to the problem. A flow chart shows the steps a comp

Diffrence Between FAT 32 And NTFS.., Dear sir please define what is the dif...

Dear sir please define what is the difference between FAT 32 and NTFS .

What are the computational factors, Question 1: (a) Initially, human ...

Question 1: (a) Initially, human information processing was believed to occur in 4 distinct stages. State and describe each of those stages. (b) What are the 3 types of

What help with this Assembly language Subroutine, Write an ARM subroutine w...

Write an ARM subroutine which will extract a substring from a string. You will need to use the library routine malloc to allocate memory for the new string. The subroutine signatu

CAI, explain CAI pitfalls

explain CAI pitfalls

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd