I will assume this is a windows computer
Answer:
- Disk (Letter)\Users\<"Answer">\Folder\Documents\SuspiciousFile.exe
- You can use Windows Security Logs to try and find out from what IP address the user you just found logged in from.
Explanation:
The windows user folder has folders that contain each users data, Using the file path of the suspicious file you can figure out which user is associated with the file.
Windows Security Logs collect data on logon attempts so when the user logs in their IP address should be collected in these log files.
The frame work for storing records in database is a report. (b)
Answer:
b) 01564 37928
e) 26 8 75 32 901
Explanation:
Pushes and pulls are the computer operations which enable the user to perform numerical tasks. The input commands are interpreted by the computer software and these tasks are converted into numeric values to generate output.
Window is a vary popular operating system because of its runtime and compatible environment .
hope it help
Answer:
The answer is below
Explanation:
a)
If the blocks of a file are not put together, that is for nonadjacent block of files to each other, the time (t) taken to read a 100 block file is:
t = (average seek + rotational latency + transfer time) * 100 block
Average seek = 5 msec, rotational latency = 10 msec and transfer time = 20 microsec = 0.02 msec
t = (5 + 10 + 0.02) * 100 = 1502 msec
b)
If the blocks of a file are put together, that is for adjacent block of files to each other, the time (t) taken to read a 100 block file is:
t = (seek time * mean interblock distance + rotational latency + transfer time) * 100 block
seek time = 100 microsec = 0.1 msec, rotational latency = 10 msec and transfer time = 20 microsec = 0.02 msec, mean interblock distance = 2 cylinders
t = (0.1*2 + 10 + 0.02) * 100 = 1022 msec