Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Assignment : LASA 1: Recovering Data

In this assignment, you will attempt to recover data that was deleted from your laptop or desktop computer.

Scenario:

You are a technician in the information technology (IT) department of an Internet startup. One of your colleagues recently downloaded three files onto his laptop-a .doc file, a .jpg file, and an .mp4 file-which he accidentally deleted. He now urgently needs these files to complete a time-sensitive task and has asked you to help him recover the lost data.

Tasks:

Visit http://download.cnet.com and search for "data recovery" software, indicating whether you are using a Windows or Mac computer.

Review the list of data recovery software. Select the two programs you feel are the best; base your decision on any criteria of your choice, but consider those programs that have the largest number of downloads or the highest user reviews. Install both software programs onto your desktop or laptop computer. Make sure to not install additional software or add-ons packaged with the program. Delete all three of the files you downloaded to your desktop in the first step (AU_IST344_M3A2L1.doc, AU_IST344_M3A2L1.jpg, AU_IST344_M3A2L1.mp4); ensure that your Recycle Bin is empty and the files no longer exist on your computer. Open and run the first of the two data-recovery software programs; check to see which of the three files from this syllabus were recoverable. Open and run the second of the two data-recovery software programs; check to see which of the three files from this syllabus were recoverable. Write a 3- to 4-page reflection in which you address each of the tasks below:

Define and describe the digital forensics practices that you used to complete this exercise.

Describe your methods of handling the digital forensics evidence that you used in this exercise.

Explain why you chose the two data-recovery programs you selected.

Illustrate how you used the digital forensics tools you downloaded to locate, recover, and identify the three digital files.

Critique your success (or failure) when attempting to recover the three digital files.

Provide solutions for data recovery techniques and suggest tools to use.

Explain how you can apply this skill in the future.

Note: Your final product should be a 3- to 4-page Microsoft Word document, using four to six scholarly sources beyond your course textbook. Write in a clear, concise, and organized manner; demonstrate ethical scholarship in the accurate representation and attribution of sources (APA); and display accurate spelling, grammar, and punctuation.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M91980394

Have any Question?


Related Questions in Management Information System

Please answer the following questions1 suppose we have the

Please answer the following questions: 1. Suppose we have the following market supply and demand schedules for bicycles: Price       Quantity Demanded    Quantity Supplied $100            70                             3 ...

Yre a member of the human resources department of a

You are a member of the Human Resources Department of a medium-sized organization that is implementing a new inter-organizational system that will impact employees, customers, and suppliers. Your manager has requested th ...

Discussfor this assignment research a company large or

Discuss For this assignment, research a company, large or small, that has taken advantage of the recent technological advances developed in information systems to grow the E-commerce-side of the business. In what ways ha ...

The head of the it security department expressed her

The head of the IT security department expressed her concerns about series of data breaches that occurred in the company and mentioned that many employees ignored their system security warnings. You have been asked to pr ...

Outlinesubmit a one page outline with your proposed term

Outline: Submit a one page outline with your proposed term paper title, thesis statement, and an outline of the subtopics you will cover in your paper. Term paper on a computer related crime which can be solved by using ...

Your sister owns a small clothing store during a

Your sister owns a small clothing store. During a conversation at a family dinner, she mentions her frustration with having to manually track and reorder high demand items. She would like an automated system but has a ve ...

Question provide an explanation of ifwherehow does active

Question : Provide an explanation of if/where/how does Active Directory support network security,14 pages (2,000-2,500) in APA format. Include abstract and conclusion. Do not include wikis, message boards, support forums ...

Assignmentorganizational risk management policy does not

Assignment Organizational risk management policy does not occur in a vacuum; rather it is the result of perception, experiences, and governmental mandates, which all comprise the risk environment of the organization. Thu ...

Considering the locations employees and the consulting

Considering the locations, employees, and the consulting nature of this company, prepare a 1- to 2-page paper explaining how CloudCrushers operates, the types of connectivity required to support the business, and the cos ...

Defining risk management threats mitigation policythreats

Defining Risk Management: Threats, Mitigation, Policy Threats to company IT assets come from both external and internal sources. Based on the resources and discussions you have completed in the first two units, write a p ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As