Question

List the information stored along with files, such as creation date, modification date, or file attributes....

List the information stored along with files, such as creation date, modification date, or file attributes.

Describe some of the more common networking devices used to provide connectivity and discuss the basic differences between the devices.

Discuss how to organize files and directory structures to provide efficient access and include for permission controls.

Determine how much space you have on the hard disk. What is the capacity? How much space is free? How much space is used?

Suppose you create a file and save it to the hard drive and delete it. Explain the steps you need to take to restore it from the Recycling Bin.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Sol:

1. Information stored along with files:

a.Type of file: example- .doc, .pdf, .txt etc

b.Location of the file: example- C:\Users\Desktop\

c.size of the file: Ex- 12MB

d.Size of file on disk: Ex-12.1MB

e.Created date- Ex:12 ?April ?2018, ??15:08:01

f.Modified date - ?Ex:12 ?April ?2018, ??15:08:01

g.Last Accesed date- Ex:23 ?June ?2018, ??07:26:25

h. File Attributes h.1: Read only

h.2:Hidden

2.Networking Devices:

Networking devices help to connect multiple networks including host, which contains hub,switch,router etc

Hub: A hub is a networking device that contains multiple ports. It just copies the data received by incoming host and forwards to its port.

Switch: A switch is a networking device which does filtering and forwarding data packets.

Router: A router is an important networking device which can connect multiple devices and forwards the data packets in dynamic way.

Differences:1. A hub doesn't contain any algorithm or memory it simply forwards packets to its ports.

2. A switch is intelligent than hub it perform filtering on packets and forward it. It contains Address tables and memory for storing them.

3. A router contains its own operating system which forwards packets in dynamic way and controlls the traffic according to the algorithm which is highly intelligent than switch and hub.

3. Organisation of Files and folders:

In order to efficiently access the folder keeps the folders in a structured manner. Like name Folder 1 and include subfolders namely Folder 1A ,2A etc. You can also search folders by changing the sort by setting and access the folder according to the setting. For example if you group by last access , you can get last accessed folder on top or you can sort by ascending or descending order.

You can also organize the folders efficiently according to its category. If your folder contains all movies and series of different languages, then make a folder for each language and include two subfolders for series and movies. If you are working on project make folders working, archieved and final or name according to your wish.

4.To determine the capacity of harddrive follow below steps:

step 1: open command prompt(Admin)

step 2:type "diskpart" press enter  

step 3:type "list disk" press enter

Now you can see the total capacity of your harddrive.If you want to see the free space and used space. Open My PC and right click on any local disk and enter properties. There you can see all details about free space and used space.

5. Steps for restoring files from recycle bin:

1. open recycle bin

2.Locate the file you want to restore and right click on it.

3.Click on restore option

4.your file is restored to its original location.

Please like my answer if you are satified with it. Thanks.

Add a comment
Know the answer?
Add Answer to:
List the information stored along with files, such as creation date, modification date, or file attributes....
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • do numbers 4-8 4. Given any directory, use the Is command to display: • all files...

    do numbers 4-8 4. Given any directory, use the Is command to display: • all files and sub-directories starting with the letter "D" (note do not list anything in any sub-directory) • its immediate sub-directories (sub-directories only, and no other ordinary files) its immediate hidden sub-directories only - take a screenshot (#3-3) that clearly shows the command and the result. 5. Assume that the following files are in the working directory: $ ls intro notesb ref2 section 1 section3 section4b...

  • Unix/Linux The purpose of this lab is to practice the commands to manage and organize files...

    Unix/Linux The purpose of this lab is to practice the commands to manage and organize files and directories: How would one go about this? Thanks. Task 1: Preliminaries: 1) If you have not already done so, create a directory called bin under your HOME directory. 2) If you have not already made a copy (using ftp) of the file called famous.dat from the Assignment#1, do that now. 3) Make bin the active/working directory. Task 2: Perform all of the following...

  • Cybersecurity Fundamentals Lab #9: Access ControlName: ____________________ If your Kali VM is already up and running,...

    Cybersecurity Fundamentals Lab #9: Access ControlName: ____________________ If your Kali VM is already up and running, login to the root account on the VM via ssh. It does not matter whether you use a command line or GUI sshclient. If your VM is not currently up, use the vSphere web client to start your VM before logging into it via ssh.1: Create an Unprivileged User For some labs, including this one, we will need a non-root user account on the...

  • Tokeniser in C++

    TokenisersBackgroundThe primary task of any language translator is to work out how the structure and meaning of an input in a given language so that an appropriate translation can be output in another language. If you think of this in terms of a natural language such as English. When you attempt to read a sentence you do not spend your time worrying about what characters there are, how much space is between the letters or where lines are broken. What...

  • the OOP project is needed to be coded in netbeans and store a information in file...

    the OOP project is needed to be coded in netbeans and store a information in file on local machine it could be stored with xml tags since its easier. OOP Project Description Requirements: You are to design and build software media rental system. The software will track each user’s account with its rentals. A user can rent multiple media of different type/genre and all that user’s rentals are managed under their account (single account per user). A user will be...

  • The following are screen grabs of the provided files Thanks so much for your help, and have a n...

    The following are screen grabs of the provided files Thanks so much for your help, and have a nice day! My Java Programming Teacher Gave me this for practice before the exam, butI can't get it to work, and I need a working version to discuss with my teacher ASAP, and I would like to sleep at some point before the exam. Please Help TEST QUESTION 5: Tamagotchi For this question, you will write a number of classes that you...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable...

    Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT