Virtual Computing Lab
Questions to answer:
1. What is the operating system (be specific – include the distribution) of this disk image? What is the file system?
2. This particular file system has what are called inodes. What is an inode? What information do inodes store?
3. What is the inode number of the home directory?
4. List two websites that the user had bookmarked on 1–7–2009.
5. What mail client does the user have?
6. Did the user have any mail in their inbox? If yes, what is the subject line of the email?
7. Find a document from Karen S. Evans about the planning guidance for Trusted Internet Connections (TIC). Who is the memorandum for? How many pages is the document?
8. Based on all of the documents and data on the user’s computer, what can you surmise the user was trying to do?
9. Do you think this person was acting honestly or committing a crime? How did you come to this conclusion?