Where data could be hidden, Basic Computer Science

Assignment Help:

QUESTION

(a) Being just employed as junior forensic examiner at SAI computer forensic Ltd, your supervisor told you, ‘hey Moona Tambi, we have received a hard disk for examination, I would like you to analyze the areas on this hard disk where we can get hidden information and document your findings'. Stunned I looked at his face. I said to myself, ‘how the hell will i do it'
Surprisingly the supervisor starts asking-

i. Where data could be hidden? Give two places and explain them in detailed

ii. What command would you use to take a backup and restore the first sector of the hard disk in Linux?

(b) After that your supervisor has asked the above questions, he realized that you have just been recruited and hence he himself did the analysis. When retrieving ‘a.ii' he could only get the below information about the hard disk. ‘Moona Tambi, I have already retrieved the required information, we need the hard disk size to finalize our report, please calculate the size of it and let me know', instructed my supervisor with a smile on his face and again added, ‘hope this time I will not have to come and do it. Don't forget it's a Windows machine with FAT 32.'

1. 16,384 cylinders

2. 80 heads

3. 63 sectors per track

(c) Briefly explain the different types of file systems that you as forensic expert would be experiencing


Related Discussions:- Where data could be hidden

Algorithm, solve three given number in ascending order through algorithm

solve three given number in ascending order through algorithm

Database design, Build a database application for a sports league. Assume y...

Build a database application for a sports league. Assume your application is to keep track of teams and equipment that is checked out to teams. Explain the steps that is needed and

Discuss about the descriptor classes, Question 1 List down any six feature...

Question 1 List down any six features of a Smartphone Question 2 Give a brief note on a) Internal Flash Disk. b) Use of C++ in Symbian OS Question 3 What are the naming

Magnetic core memory, MAGNETIC CORE MEMORY: This type of memory is used...

MAGNETIC CORE MEMORY: This type of memory is used extensively in airborne digital systems, although integrated circuits are being developed with most modern aircraft systems.

Coal Computer organization and assembly language, Code for Program to find ...

Code for Program to find the second highest number from a given array in Assembly Language by using NASM

Copmurer, Classify computer systems according to capacity. How they are dif...

Classify computer systems according to capacity. How they are different from computers according to the classification of technology. Provide comparative study also.

Electronic educational resources, ELECTRONIC EDUCATIONAL RESOURCES: In...

ELECTRONIC EDUCATIONAL RESOURCES: In the present era, you can get access to a large number of electronic educational resources through the web. These resources may be on diffe

Definition of resource sharing , Resource sharing is a concept which has de...

Resource sharing is a concept which has developed to contain many cooperative activities among libraries and other stakeholders. Interlibrary loan continues to be the basis of reso

Pep8, Write an Assembly program that reads an integer (-32,768 through 32,7...

Write an Assembly program that reads an integer (-32,768 through 32,767) in decimal and prints its equivalent in binary. The output must show all 16 bits. And you must use a loop

Cai, What is CAI? Explain its pitfalls.

What is CAI? Explain its pitfalls.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd