Download as pdf or txt
Download as pdf or txt
You are on page 1of 33

Test Bank for Guide to Computer

Forensics and Investigations, 5th


Edition
Visit to download the full and correct content document: https://testbankbell.com/dow
nload/test-bank-for-guide-to-computer-forensics-and-investigations-5th-edition/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Solution Manual for Guide to Computer Forensics and


Investigations, 5th Edition

http://testbankbell.com/product/solution-manual-for-guide-to-
computer-forensics-and-investigations-5th-edition/

Test Bank for Computer Forensics and Cyber Crime An


Introduction 3rd Edition Marjie T Britz Download

http://testbankbell.com/product/test-bank-for-computer-forensics-
and-cyber-crime-an-introduction-3rd-edition-marjie-t-britz-
download/

Test Bank for Computer Literacy BASICS A Comprehensive


Guide to IC3, 2nd Edition

http://testbankbell.com/product/test-bank-for-computer-literacy-
basics-a-comprehensive-guide-to-ic3-2nd-edition/

Test Bank for Biology: Concepts and Investigations, 5th


Edition Mariëlle Hoefnagels

http://testbankbell.com/product/test-bank-for-biology-concepts-
and-investigations-5th-edition-marielle-hoefnagels/
Test Bank for Guide to Oracle 10g, 5th Edition:
Morrison

http://testbankbell.com/product/test-bank-for-guide-to-
oracle-10g-5th-edition-morrison/

A Guide to Crisis Intervention 5th edition Kanel Test


Bank

http://testbankbell.com/product/a-guide-to-crisis-
intervention-5th-edition-kanel-test-bank/

Test Bank for Linux+ and LPIC-1 Guide to Linux


Certification, 5th Edition Jason Eckert

http://testbankbell.com/product/test-bank-for-linux-and-
lpic-1-guide-to-linux-certification-5th-edition-jason-eckert/

Solution Manual for Linux+ and LPIC-1 Guide to Linux


Certification, 5th Edition Jason Eckert

http://testbankbell.com/product/solution-manual-for-linux-and-
lpic-1-guide-to-linux-certification-5th-edition-jason-eckert/

Test Bank for Guide to Firewalls and VPNs, 3rd Edition

http://testbankbell.com/product/test-bank-for-guide-to-firewalls-
and-vpns-3rd-edition/
Test Bank for Guide to Computer Forensics and Investigations, 5th Edition

Test Bank for Guide to Computer Forensics and


Investigations, 5th Edition

To download the complete and accurate content document, go to:


https://testbankbell.com/download/test-bank-for-guide-to-computer-forensics-and-inve
stigations-5th-edition/

Visit TestBankBell.com to get complete for all chapters


Chapter 6: Working with Windows and DOS Systems

TRUE/FALSE

1. The type of file system an OS uses determines how data is stored on the disk.

ANS: T PTS: 1 REF: 208

2. One way to examine a partition’s physical level is to use a disk editor, such as Norton DiskEdit,
WinHex, or Hex Workshop.

ANS: T PTS: 1 REF: 213

3. As data is added, the MFT can expand to take up 75% of the NTFS disk.

ANS: F PTS: 1 REF: 220

4. The first 5 bytes (characters) for all MFT records are MFTR0.

ANS: F PTS: 1 REF: 222

5. Data streams can obscure valuable evidentiary data, intentionally or by coincidence.

ANS: T PTS: 1 REF: 227

MULTIPLE CHOICE

1. A ____ is a column of tracks on two or more disk platters.


a. cylinder c. track
b. sector d. head
ANS: A PTS: 1 REF: 209

2. ____ is how most manufacturers deal with a platter’s inner tracks being shorter than its outer tracks.
a. Head skew c. ZBR
b. Cylinder skew d. Areal density
ANS: C PTS: 1 REF: 210|211

3. ____ refers to the number of bits in one square inch of a disk platter.
a. Head skew c. Cylinder skew
b. Areal density d. ZBR
ANS: B PTS: 1 REF: 212

4. ____ is the file structure database that Microsoft originally designed for floppy disks.
a. NTFS c. VFAT
b. FAT32 d. FAT
ANS: D PTS: 1 REF: 216

5. ____ was introduced when Microsoft created Windows NT and is the primary file system for
Windows Vista.
a. FAT32 c. NTFS
b. VFAT d. HPFS
ANS: C PTS: 1 REF: 220

6. On an NTFS disk, immediately after the Partition Boot Sector is the ____.
a. FAT c. MBR
b. HPFS d. MFT
ANS: D PTS: 1 REF: 220

7. Records in the MFT are referred to as ____.


a. hyperdata c. inodes
b. metadata d. infodata
ANS: B PTS: 1 REF: 221

8. In the NTFS MFT, all files and folders are stored in separate records of ____ bytes each.
a. 1024 c. 2048
b. 1512 d. 2512
ANS: A PTS: 1 REF: 222

9. The file or folder’s MFT record provides cluster addresses where the file is stored on the drive’s
partition. These cluster addresses are referred to as ____.
a. virtual runs c. metaruns
b. metada d. data runs
ANS: D PTS: 1 REF: 222

10. When Microsoft introduced Windows 2000, it added built-in encryption to NTFS called ____.
a. EFS c. LZH
b. VFAT d. RAR
ANS: A PTS: 1 REF: 228

11. The purpose of the ____ is to provide a mechanism for recovering encrypted files under EFS if there’s
a problem with the user’s original private key.
a. certificate escrow c. administrator certificate
b. recovery certificate d. root certificate
ANS: B PTS: 1 REF: 228

12. When Microsoft created Windows 95, it consolidated initialization (.ini) files into the ____.
a. IniRecord c. Registry
b. Inidata d. Metadata
ANS: C PTS: 1 REF: 232

13. ____, located in the root folder of the system partition, specifies the Windows XP path installation and
contains options for selecting the Windows version.
a. Boot.ini c. NTDetect.com
b. BootSec.dos d. NTBootdd.sys
ANS: A PTS: 1 REF: 241
14. ____ is a 16-bit real-mode program that queries the system for device and configuration data, and then
passes its findings to NTLDR.
a. Hal.dll c. NTDetect.com
b. Boot.ini d. BootSect.dos
ANS: C PTS: 1 REF: 241

15. ____, located in the root folder of the system partition, is the device driver that allows the OS to
communicate with SCSI or ATA drives that aren’t related to the BIOS.
a. Hal.dll c. Boot.ini
b. NTBootdd.sys d. Ntoskrnl.exe
ANS: B PTS: 1 REF: 242

16. ____ contain instructions for the OS for hardware devices, such as the keyboard, mouse, and video
card, and are stored in the %system-root%\Windows\System32\Drivers folder.
a. Hal.dll c. Ntoskrnl.exe
b. Pagefile.sys d. Device drivers
ANS: D PTS: 1 REF: 242

17. ____ is a hidden text file containing startup options for Windows 9x.
a. Pagefile.sys c. Msdos.sys
b. Hal.dll d. Ntoskrnl.exe
ANS: C PTS: 1 REF: 244

18. The ____ file provides a command prompt when booting to MS-DOS mode (DPMI).
a. Io.sys c. Config.sys
b. Autoexec.bat d. Command.com
ANS: D PTS: 1 REF: 244

19. ____ is a text file containing commands that typically run only at system startup to enhance the
computer’s DOS configuration.
a. Autoexec.bat c. BootSect.dos
b. Config.sys d. Io.sys
ANS: B PTS: 1 REF: 245

20. ____ is a batch file containing customized settings for MS-DOS that runs automatically.
a. Autoexec.bat c. Io.sys
b. Config.sys d. Command.com
ANS: A PTS: 1 REF: 245

21. A ____ allows you to create a representation of another computer on an existing physical computer.
a. virtual file c. logic machine
b. logic drive d. virtual machine
ANS: D PTS: 1 REF: 246

COMPLETION

1. ____________________ refers to a disk’s structure of platters, tracks, and sectors.


ANS: Geometry

PTS: 1 REF: 209

2. In Microsoft file structures, sectors are grouped to form ____________________, which are storage
allocation units of one or more sectors.

ANS: clusters

PTS: 1 REF: 212

3. On Windows and DOS computer systems, the ____________________ stores information about
partitions on a disk and their locations, size, and other important items.

ANS:
Master Boot Record (MBR)
Master Boot Record
MBR
MBR (Master Boot Record)

PTS: 1 REF: 216

4. Drive slack includes RAM slack (found primarily in older Microsoft OSs) and
____________________ slack.

ANS: file

PTS: 1 REF: 217

5. On an NTFS disk, the first data set is the ____________________, which starts at sector [0] of the
disk.

ANS: Partition Boot Sector

PTS: 1 REF: 220

MATCHING

Match each item with a statement below:


a. File system f. NTFS
b. Tracks g. Unicode
c. Track density h. Data streams
d. Partition gap i. BitLocker
e. Drive slack
1. Microsoft’s move toward a journaling file system
2. the space between each track
3. ways data can be appended to existing files
4. the unused space between partitions
5. an international data format
6. Microsoft’s utility for protecting drive data
7. gives an OS a road map to data on a disk
8. unused space in a cluster between the end of an active file and the end of the cluster
9. concentric circles on a disk platter where data is located

1. ANS: F PTS: 1 REF: 220


2. ANS: C PTS: 1 REF: 211
3. ANS: H PTS: 1 REF: 227
4. ANS: D PTS: 1 REF: 212
5. ANS: G PTS: 1 REF: 221
6. ANS: I PTS: 1 REF: 231
7. ANS: A PTS: 1 REF: 208
8. ANS: E PTS: 1 REF: 217
9. ANS: B PTS: 1 REF: 209

SHORT ANSWER

1. How can you make sure a subject’s computer boots to a forensic floppy disk or CD?

ANS:
When a subject’s computer starts, you must make sure it boots to a forensic floppy disk or CD,
because booting to the hard disk overwrites and changes evidentiary data. To do this, you access the
CMOS setup by monitoring the subject’s computer during the initial bootstrap process to identify the
correct key or keys to use. The bootstrap process is contained in ROM and tells the computer how to
proceed. As the computer starts, the screen usually displays the key or keys, such as the Delete key,
you press to open the CMOS setup screen. You can also try unhooking the keyboard to force the
system to tell you what keys to use. The key you press to access CMOS depends on the computer’s
BIOS.

If necessary, you can change the boot sequence so that the OS accesses the CD/DVD drive or a floppy
drive (if available) before any other boot device. Each BIOS vendor’s screen is different, but you can
refer to the vendor’s documentation or Web site for instructions on changing the boot sequence.

PTS: 1 REF: 208|209 TOP: Critical Thinking

2. What are some of the components of a disk drive?

ANS:
Following is a list of disk drive components:
* Geometry—Geometry refers to a disk’s structure of platters, tracks, and sectors.
* Head—The head is the device that reads and writes data to a drive. There’s one head per platter.
* Tracks—Tracks are concentric circles on a disk platter where data is located.
* Cylinders—A cylinder is a column of tracks on two or more disk platters. Typically, each platter has
two surfaces: top and bottom.
* Sectors—A sector is a section on a track, usually made up of 512 bytes.

PTS: 1 REF: 209 TOP: Critical Thinking

3. How are disk clusters numbered by Microsoft file structures?

ANS:
Clusters are numbered sequentially starting at 2 because the first sector of all disks contains a system
area, the boot record, and a file structure database. The OS assigns these cluster numbers, which are
referred to as logical addresses. These addresses point to relative cluster positions; for example, cluster
address 100 is 98 clusters from cluster address 2. Sector numbers,however, are referred to as physical
addresses because they reside at the hardware or firmware level and go from address 0 to the last
sector on the disk. Clusters and their addresses are specific to a logical disk drive, which is a disk
partition.

PTS: 1 REF: 212 TOP: Critical Thinking

4. Summarize the evolution of FAT versions.

ANS:
The following list summarizes the evolution of FAT versions:
* FAT12—This version is used specifically for floppy disks, so it has a limited amount of storage
space. It was originally designed for MS-DOS 1.0, the first Microsoft OS, used for floppy disk drives
and drives up to 16 MB.
* FAT16—To handle large disks, Microsoft developed FAT16, which is still used on older Microsoft
OSs, such as MS-DOS 3.0 through 6.22, Windows 95 (first release), and Windows NT 3.5 and 4.0.
FAT16 supports disk partitions with a maximum storage capacity of 2 GB.
* FAT32—When disk technology improved and disks larger than 2 GB were created, Microsoft
developed FAT32, which is used on Microsoft OSs such as Windows 95 (second release), 98,Me,
2000, and XP. FAT32 can access up to 2TB of disk storage.One disk can have multiple partitions in
FAT16, FAT32, or NTFS.

PTS: 1 REF: 217 TOP: Critical Thinking

5. Briefly describe how to delete FAT files.

ANS:
When a file is deleted in Windows Explorer or with the MS-DOS Delete command,the OS inserts a
HEX E5 (0xE5), which many hex-editing programs reflect as the lowercase Greek letter sigma () in
the filename’s first letter position in the FAT database. The sigma symbol tells the OS that the file is
no longer available and a new file can be written to the same cluster location.

In Microsoft OSs, when a file is deleted, the only modifications made are that the directory entry is
marked as a deleted file, with the HEX E5 character replacing the first letter of the filename, and the
FAT chain for that file is set to 0. The data in the file remains on the disk drive. The area of the disk
where the deleted file resides becomes unallocated disk space (also called “free disk space”). The
unallocated disk space is now available to receive new data from newly created files or other files
needing more space as they grow. Most forensics tools recover any data still residing in this area.

PTS: 1 REF: 219 TOP: Critical Thinking

6. What are logical cluster numbers (LCNs)?

ANS:
To understand how data runs are assigned for nonresident MFT records, you should know that when a
disk is created as an NTFS file structure, the OS assigns logical clusters to the entire disk partition.
These assigned clusters are called logical cluster numbers (LCNs). LCNs become the addresses that
allow the MFT to link to nonresident files (files outside the MFT) on the disk’s partition.

PTS: 1 REF: 226


7. Briefly explain NTFS compressed files.

ANS:
To improve data storage on disk drives, NTFS provides compression similar to FAT DriveSpace 3, a
Windows 98 compression utility. Under NTFS, files, folders, or entire volumes can be
compressed.With FAT16, you can compress only a volume.On a Windows Vista, XP, 2000, or NT
system, compressed data is displayed normally when you view it in Windows Explorer or applications
such as Microsoft Word.

During an investigation, typically you work from an image of a compressed disk, folder, or file. Most
computer forensics tools can uncompress and analyze compressed Windows data, including data
compressed with the Lempel-Ziv-Huffman (LZH) algorithm and in formats such as PKZip,WinZip,
and GNU gzip. Forensics tools might have difficulty with third-party compression utilities, such as the
RAR format. If you identify third-party compressed data, you need to uncompress it with the utility
that created it.

PTS: 1 REF: 227 TOP: Critical Thinking

8. What are some of the features offered by current whole disk encryption tools?

ANS:
Current whole disk encryption tools offer the following features that computer forensics examiners
should be aware of:
* Preboot authentication, such as a single sign-on password, fingerprint scan, or token (USB thumb
drive device)
* Full or partial disk encryption with secure hibernation, such as activating a password-protected
screen saver
* Advanced encryption algorithms, such as AES and IDEA
* Key management function that uses a challenge-and-response method to reset passwords or
passphrases
* A Trusted Platform Module (TPM) microchip to generate encryption keys and authenticate logins

PTS: 1 REF: 230 TOP: Critical Thinking

9. What are BitLocker’s current hardware and software requirements?

ANS:
BitLocker’s current hardware and software requirements are as follows:
* A computer capable of running Windows Vista
* The TPM microchip, version 1.2 or newer
* A computer BIOS compliant with Trusted Computing Group (TCG)
* Two NTFS partitions for the OS and an active system volume with 1.5 GB of available space
* The BIOS configured so that the hard drive boots first before checking the CD/DVD drive or other
bootable peripherals

PTS: 1 REF: 231 TOP: Critical Thinking

10. Describe some of the open source whole disk encryption tools.

ANS:
The following list describes some available open-source encryption tools:
* TrueCrypt (www.truecrypt.org) creates a virtual encrypted volume—a file mounted as though it were
a disk drive. Data is encrypted automatically and in real time.
Test Bank for Guide to Computer Forensics and Investigations, 5th Edition

* CrossCrypt (www.scherrer.cc/crypt/) also creates a virtual encrypted volume and provides filedisk, a
command-line utility with options for creating, mounting, dismounting, and encrypting volumes.
* FreeOTFE (on-the-fly encryption, www.freeotfe.org), like other open-source encryption tools,
creates a virtual disk that can encrypt data with several popular algorithms. FreeOTFE can be used in
Windows 2000 and XP as well as with PDAs.

PTS: 1 REF: 232 TOP: Critical Thinking

Visit TestBankBell.com to get complete for all chapters


Another random document with
no related content on Scribd:
A swing, so durable that it has become a virtual landmark, was
made from a long, straight hickory sapling suspended from the limb
of a tree. The sapling was split part of its length, as shown in the
illustration, and a bolt put through it to prevent the upper portion from
cracking. The lower end was smoothed off, so as not to injure the
hands, and mortised through a slab of wood, as shown in the
detailed sketch. A safe hook from which to suspend the swing is
suggested. It is made from a bolt fixed through the limb and curled at
the hook end so that the swing may be taken down in bad weather.
—Hubert Kann, Pittsburgh, Pa.
Match Safe of Miniature Cannon Shell

The match safe shown in the sketch was made by a worker in a


munitions plant. The container was shaped like a small cannon shell
and was set into a bracket supported on a prettily grained board,
stained and varnished, and supported by a chain.—J. H. Moore,
Hamilton, Can.
Washing Bromide Enlargements

The Cork Clips Hold the Bromide Print in the Water in a Vertical Position

The difficulty of washing bromide enlargements of the larger sizes


has always made the amateur hesitate to undertake much of this
kind of work. The developing and fixing can be done with
comparative ease, because of the facility with which the print can be
kept moving in a tray that is smaller in size than the print itself, but
washing is such a long process that one’s patience is exhausted
before the hypo is completely eliminated. Continuous handling of a
print for 30 minutes is tedious work. This objection can be overcome
in the simplest and most efficacious manner, as follows:
Procure some large corks of the best quality and in each cut a
groove completely around it, near one end, to serve as a retainer for
a rubber band; then cut the cork lengthwise through the center, and
cut a wedge-shaped piece from the center toward the end opposite
the one where the groove was cut for the rubber band. After placing
a band in the groove of the proper size the combination will work
similarly to an old-fashioned spring clothespin.
If two of these are snapped on the edge of a bromide print, this
can be dropped into a bathtub or laundry tub for washing. The corks
will cause the print to float vertically in the running water. By this
means a number of prints can be washed at a time without any
danger of their sticking together or becoming wrinkled or cracked in
the bath.—Contributed by T. B. Lambert, Chicago.
Bench Support for a Miter Box
To make the most effective use of a miter box, it must be fastened
solidly to a base, but if fastened to the workbench top it is in the way
when not in use, and it is a nuisance to fasten and unfasten the box
every time it is used. To avoid the changing, I mounted the miter box
on two pieces of 1 by 3-in. stock, about 2 ft. long. These pieces were
placed on the bench top, at right angles to the front edge and with
their centers as far apart as the two pairs of legs on the box. The box
was placed on the front end of the pieces, with the back parallel to
the front of the bench, at right angles to the pieces, and was
fastened to them with screws. The other end of each piece was
fastened to the bench top with a hinge.
This fastened the miter box firmly to the bench top, but in such a
way that I could tip it up and back against the wall, or other support,
where it was out of the way but ready for use immediately. To stiffen
the frame, I placed a cross brace between the two pieces, making it
in the form of the letter H.—Contributed by L. C. Burke, Madison,
Wisconsin.
A Blowpipe for Gas

Blowpipe Connection to the Ordinary Illuminating-Gas Main for Hard and


Soft Soldering

Every experimenter who has a gas connection within convenient


distance of the workbench should provide a 4 or 5-ft. length of ¹⁄₄-in.
rubber tubing, terminating in a brass tube through which air may be
blown in order that a clear blue flame may be available for either
hard or soft soldering. The brass tube should be 4 or 5 in. long and
fitted at one end with a removable nozzle having a ¹⁄₁₆-in. hole in it. A
hole is then drilled in the side and a piece of smaller brass tubing,
bent as shown in the sketch, is soldered in place for the air supply. A
piece of soft-rubber tubing about 1 ft. long is then provided and one
end slipped over the projecting end of the air pipe and the other fitted
to a hard-rubber, or amber, mouthpiece. By regulating the gas supply
and blowing to the proper degree, a pencil of blue flame may be
produced, anywhere from 1 to 4 in. long. For heating large surfaces,
the nozzle tip should be removed.
This method of soldering not only makes a better connection than
the usual copper, but is instantly available and does not disarrange
the several pieces where, as is often the case, it is not practicable to
pin or hold them in place.
Scraper for Dishes

A Dish Scraper Made of a Piece of Rubber Inserted in a Wood Handle

Housekeepers will find the scraper shown to be silent and more


rapid than a knife for cleaning dishes. It consists of a handle cut from
a piece of straight-grained wood, with a kerf sawed in the wide end
to a depth of ³⁄₄ in., into which a piece of sheet rubber is inserted.
The rubber may be cut from an old bicycle-tire casing and is
fastened with two or three brads driven through the handle. The
ends of the brads are bent over or riveted. The edge of the rubber
should be made straight.—Contributed by H. S. Craig, Rushford,
Minn.
Protecting Lights in a Gymnasium
A public-school auditorium was used for playing basket ball, and
the lights were protected as shown. Wire waste-baskets were
fastened to pieces of board, which in turn were nailed to the ceiling
around each lamp. As it was desired to provide a way to ventilate the
room, an opening was cut in each board around the lamp base,
providing fan-shaped cut-outs covered with galvanized metal of the
same design, to make a way to open and shut the ventilator. The air
passed up into an attic.

Wire Wastebasket Fastened around a Light to Protect It for Basket-Ball


Games
The goals, which were old blackboards, were fastened between
the posts that supported the ceiling. Two iron rods, one above the
other, were clamped with bolts to the posts, and the boards were
bolted to the rods.—Contributed by Frank C. Svacha, McKees
Rocks, Pa.
Shortening a Pasteboard Box

Shortening a Box by Bending Up the Bottom after Removing the End and
Cutting Down the Sides

If a pasteboard box happens to be too long for a special purpose it


can be shortened as shown. The sides are cut down to the bottom
and the end removed. The bottom is then bent up on a line between
the places where the sides were cut down, to form a new end for the
box. The joining parts are then held with a thread or wire fasteners.
Repairing Shade-Roller Springs

Fig. 1
Fig. 2

Fix the Loosened Spring into Place and the Roller Is in Working Order

Springs of window-shade rollers, which usually break at the tin cap


by which they are fastened inside the rod, can be quickly repaired in
the following manner:
Remove the ferrule and dogs from the end of the roller and pull out
the stick to which the spring is attached. Measure the length of the
stick A, Fig. 1, on the roller, and at C cut a small square hole through
to the hollow center. Remove the metal cap thus exposed. Fix the
cap on the end of the stick at B and fasten the spring around one
point of the metal cap, Fig. 2. Insert the stick into the roller and tap it
gently, driving the cap points in; then replace the ferrule and dogs,
and the roller is in condition for use.
Drying Photo Films Rapidly

The Current of the Fan Dries the Films Rapidly

Waiting for photographic films to dry is often tedious, particularly


when the photographer is in haste to see the results of his efforts at
picture taking. The method of drying the films shown in the sketch
will aid materially in the process. The films are held by small spring
clips attached to the wire frame surrounding the fan, and when the
current is turned on, the films are blown away from the fan and held
suspended in a diagonal position.—Contributed by W. J. Clausius,
Chicago, Ill.
Applying and Drying Bronze Powders
Surfaces may be coated readily with bronze powder by applying a
thin coat of shellac and quickly dusting the powder over it. Speed is
important in dusting on the powder, as if the shellac hardens it will
not hold the bronze. Surfaces which have been bronzed in this way
may be polished if additional coats of shellac or varnish are applied
over them.
Forceps for Weeding Garden

Difficulty in removing small weeds around plants in the garden


may be overcome by the use of a forceps made of a piece of wire,
as shown in the illustration. The wire is formed into two loops by
which the weeds are grasped, and the portion held in the hand is
bent to form a circular spring. Its tension may be regulated so that
the hand will not be tired in using the device.—Contributed by Irving
McEwen, New Westminster, B. C., Canada.
Shielding Pictures from Damp Walls
Injury to pictures from dampness of walls may be prevented by
fixing small disks of cork to the lower edge of the frame so as to form
a contact with the wall only at the cork. This permits a current of air
to pass between the wall and frame.
New Method of Developing Roll Films
By T. B. LAMBERT

Many devices have been made for developing and fixing roll films.
There is the simple wholesale method of the professional who
hangs a weight on one end of the film and lets it down in a deep tank
of developing fluid where it hangs submerged from an upper support
until the development is complete. Then the support, the film, and
attached weight are removed, dipped into a similar tank of running
water, then to another tank of fixing solution, and subsequently
washed and dried.
This is the only practical plan where there are many such films to
be handled simultaneously, but the amateur who has only one or two
rolls a week cannot afford the tanks, the space, nor the expense
incident to such a method. The film is usually drawn back and forth
through a developing solution placed in a tray, and after the
development has proceeded far enough, the same process used in
washing, then the hypo solution, and finally through the last washing
for about 20 minutes, all making a tedious process.
Some amateurs and a few professionals who but occasionally
develop roll film use a mechanical device that rolls the film into a
light-proof package which is inserted in a metal tank for development
and subsequent fixation. This is a standard process, the apparatus
being on sale at all supply houses, but it has its drawbacks.

An Ordinary Drinking Glass Used for Developing Roll Films

The following method is not only simple but perfect in its operation
and requires no special apparatus, only a tumbler or lemonade
glass, and an ordinary lead pencil for its operation. A glass rod is
preferable to the lead pencil, and it is also convenient to have a deep
tin cup, or similar device, to cover up the lemonade glass and make
it light-proof, should it be desirable to turn on the white light in the
dark room.
Pour enough developing solution into the glass tumbler to cover
completely the roll of film when it is standing on end. In the dark
room open the film roll, remove the backing paper and the paper
ends on the film, run it through clear water until it is thoroughly and
uniformly wetted from end to end, and drop it endwise into the
tumbler of developer. Immediately insert the pencil or glass rod into
the center of the roll, and with a rather quick circular motion, move
the rod around so that it will quickly pass between the several
convolutions of the film and thus distribute the developer all over its
surface. Repeat this operation at once, then again in a few seconds,
then in 15 or 20 seconds, then in 30 seconds, then in 1 minute, and
so on, with greater intervals of time. If a 20-minute developer is
used, it will only be necessary, at the latter part of the development,
to separate the layers every 2 or 3 minutes.
When the development is complete, pour off the solution and rinse
in the same glass by letting water run through it while passing the
pencil or glass rod between the layers several times. The water may
then be drained off, and the glass filled with the fixing solution. While
the film is fixing, the glass rod should be passed between the layers
several times to renew the solution in contact with the film.
It will be seen that at no time after the first washing is it necessary
to handle the film, so that damage to the film and staining the fingers
are entirely eliminated. Further than that, no apparatus is tied up in
the operation, and if a light-proof cup is at hand, the developing
tumbler may be covered between the operations of separating the
layers of film, and the white light of the dark room can be turned on
for further operations.
Swinging Bags on the Arms of a Scarecrow

Scarecrow with Swinging Paper Bags on the Arms in the Place of Hands

The ordinary ragman used as a scarecrow can be made more


effective by adding to it something to make it move, or some part
that flutters in the wind. This can be accomplished in one way by
blowing up paper bags to expand them to their full extent, tying the
openings as if they were filled with some commodity for the
household, and fastening them to the arms of the dummy as shown.
These will swing and flutter about in a way that will materially aid in
scaring away the birds that damage the crops.

You might also like