MOPHYTECH
COM 226 Past Question, Assignment questions and answer.
1a. Briefly describe (i) permanent storage (i) Temporary storage
1b. Explain the characteristics of the following storage devices.
(i) CD-ROM (ii) Hard Disk (iii) Flash Disk (iv) Floppy Disk
2a. Explain briefly four (4) different access methods of file organization
2b. Differentiate between manual filling system and computer filling
system
3a. Write short notes on any four (4) of the following
(i). File (ii). Bit (ii). Nibble (iv). Byte (v) Character (vi) Field (vii) Record (viii)
Database
3b. State any four (4) main objectives of database implementation
4a. What is file system manager?
4b. Outline any three (3) basic services of a file system
4c. Highlight any seven (7) services of a file system
5. Define arny six (6) of the following terms in queue system
(i) Queue (ii) service rate (iii) service channel (iv) service disciplfile (v)
waiting time (vi) rencging (vii) balking (viti) service station (ix) customer
6a. Explain brielly any four (4) of the following (0) Master file (ii)
Transactuon file (iii) work file (iv) reference file (v) archieve file(vi) data file
6b. State any four (4) functions of buffer
7a. Explain any four (4) various file security techniques you know.
7b. Highlight any two (2) qualities of file
Assignment
1. List and explain 5 file security method you know.
2. Define stack.
3. Briefly explain the characteristics of the following Devices:
i. Magnetic tape.
4. Explain the performance of a computer storage with respect to
throughput and latency.
5. What is data processing?
6. Identify 3 types of data processing.
7. List and explain any 10 file processing operation.
8. What is file system?
9. Describe the basic services of a file system.
10. List the qualities of a good file system.
11. State the main objective of database implementation.
12. With the aid of diagram, explain central database.
13. Explain the following:
I. Transfer Time
II. Seek Time
III. Rotational relay
IV. Queue
V. List
VI. Array
1a. What is file organization
1b. Identify any 4 types of file system.
2a. Highlight different access method of file organization
2b. State 4 functions of buffer.
3a. Highlight any 5 objectives of file management
3b. Explain the following in file organization: (I) Array (II) Table (III) Stack
3c. What is storage performance
3d. Explain Throughput and Latency.
4. State 5 reasons to make security a priority for file transfer.
Answer
1a.
(i) Permanent Storage: Long-term storage of data, even when power is
turned off. Examples: Hard disks, solid-state drives, flash drives.
(ii) Temporary Storage: Short-term storage of data, requiring power to
maintain. Examples: RAM, cache memory.
1b.
(i) CD ROM (Compact Disc-Read Only Memory):
1. High storage capacity: CD-ROMs can store up to 700 MB of data.
2. Read-only: Data cannot be written or modified on a CD-ROM.
3. Optical storage: Data is stored in the form of tiny pits and lands on the
disc.
4. Random access: Data can be accessed directly using a laser.
5. Low cost: CD-ROMs are relatively inexpensive to produce.
6. Durability: CD-ROMs are resistant to scratches and wear.
7. Portability: CD-ROMs are lightweight and easy to transport.
(ii) Hard Disks:
1. High storage capacity: Hard disks have a large storage capacity, ranging
from hundreds of GB to several TB.
2. Magnetic storage: Data is stored magnetically on a spinning disk.
3. Random access: Data can be accessed directly using a mechanical head.
4. Fast data transfer rate: Hard disks have a relatively fast data transfer
rate (up to 1000 MB/s).
5. Relatively low cost: Hard disks are cost-effective for large storage needs.
6. Mechanical parts: Hard disks have moving parts, making them prone to
mechanical failure.
7. Sensitive to shock and vibration: Hard disks can be damaged by physical
shock or vibration.
(iii) Flash Disks (USB Drives):
1. Small size and portability: Flash disks are compact and lightweight.
2. Solid-state storage: Data is stored electronically, with no moving parts.
3. Fast data transfer rate: Flash disks have a fast data transfer rate (up to
1000 MB/s).
4. Low power consumption: Flash disks use minimal power.
5. Durable and resistant to shock: Flash disks are rugged and resistant to
physical stress.
6. Relatively high cost per GB: Flash disks are more expensive per GB than
hard disks.
7. Limited storage capacity: Flash disks typically have smaller storage
capacities (up to 1 TB).
(iv) Floppy Disks:
1. Low storage capacity: Floppy disks have a small storage capacity (up to
1.44 MB).
2. Magnetic storage: Data is stored magnetically on a flexible disk.
3. Sequential access: Data is accessed sequentially, using a mechanical
head.
4. Slow data transfer rate: Floppy disks have a slow data transfer rate (up
to 100 KB/s).
5. Relatively low cost_: Floppy disks are inexpensive.
6. Mechanical parts: Floppy disks have moving parts, making them prone to
mechanical failure.
7. Sensitive to physical stress: Floppy disks are susceptible to damage
from bending, folding, or physical shock.
2a. Four different access methods of file organization:
(i) Sequential Access: Files are accessed in a linear sequence.
(ii) Direct Access: Files are accessed directly using a unique identifier.
(iii) Indexed Access: Files are accessed using an index or table.
(iv) Hierarchical Access: Files are organized in a tree-like structure.
2b.
Manual Filing System:
- Physical storage of paper documents
- Time-consuming and labor-intensive
- Prone to errors and losses
Computer Filing System:
- Electronic storage of digital files
- Fast and efficient
- Reduced errors and losses
3a. Short notes on:
(i) File: A collection of related data stored together.
(ii) Bit: A single binary digit (0 or 1).
(iii) Byte: A group of 8 bits representing a character or number.
(iv) Record: A collection of related fields representing a single entity.
3b. Four main objectives of database implementation:
(i) Data Integration: Combining data from multiple sources.
(ii) Data Security: Protecting data from unauthorized access.
(iii) Data Sharing: Allowing multiple users to access and share data.
(iv) Data Integrity: Ensuring data accuracy and consistency.
4a. File System Manager:
A software component responsible for managing and organizing files on a
computer system, including file creation, deletion, naming, storage, retrieval,
security, and access control.
4b. Three basic services of a file system:
1. File Creation and Deletion
2. File Storage and Retrieval
3. File Security and Access Control
4c. Seven services of a file system:
1. File Naming and Renaming
2. File Organization and Structuring
3. File Search and Retrieval
4. File Security and Access Control
5. File Backup and Recovery
6. File Sharing and Collaboration
7. File Compression and Encryption
5. Definitions:
(i) Queue: A sequence of customers or requests waiting for service.
(ii) Service Rate: The rate at which customers are served.
(iii) Service Channel: A pathway for customers to receive service.
(iv) Service Discipline: The order in which customers are served (e.g., FIFO,
LIFO).
(v) Waiting Time: The time spent waiting for service.
(vi) Reneging: When a customer leaves the queue before being served.
(vii) Balking: When a customer refuses to join a queue.
(viii) Service Station: The location where service is provided.
(ix) Customer: The entity receiving service (e.g., person, request).
6a. Brief explanations:
(i) Master File: A permanent file containing core data, updated periodically.
(ii) Transaction File: A temporary file containing data to be processed.
(iii) Work File: A temporary file used for processing and storage.
(iv) Reference File: A file containing static data for reference purposes.
(v) Archive File: A file containing historical data, no longer in regular use,
but stored for future reference or auditing purposes.
(vi) Data File: A file containing raw data, used as input for processing or
analysis, often used to update master files or transaction files.
6b. Four functions of a buffer:
1. Temporary storage: Holding data temporarily while it is being processed.
2. Data synchronization: Coordinating data transfer between devices or
processes.
3. Error detection and correction: Identifying and correcting errors in data
transmission.
4. Data transformation: Converting data formats for compatibility.
7a. Four file security techniques:
1. Encryption: Protecting data by converting it into an unreadable format.
2. Access control: Restricting file access to authorized users or processes.
3. Authentication: Verifying user identities before granting file access.
4. Backup and recovery: Creating copies of files to prevent data loss.
7b. Two qualities of file assignment:
1. Efficient use of storage space: Allocating files to optimize storage
capacity.
2. Fast file retrieval: Assigning files to facilitate quick access.
ASSIGNMENTS
1. Five file security methods:
1. Encryption
2. Access control
3. Authentication
4. Backup and recovery
5. Intrusion detection and prevention
2. Stack:
A Last-In-First-Out (LIFO) data structure, where elements are added and
removed from the top.
3. Characteristics of Magnetic Tape:
- Sequential access: Data is accessed in a linear sequence.
- High storage capacity: Large amounts of data can be stored.
- Low cost: Relatively inexpensive compared to other storage media.
- Portability: Tapes can be easily transported.
4. Performance of computer storage:
- Throughput: The rate at which data is transferred (e.g., MB/s).
- Latency: The time delay between data request and access (e.g., ms).
5. Data processing:
The conversion of raw data into meaningful information.
6. Three types of data processing:
1. Batch processing: Processing large datasets in batches.
2. Real-time processing: Processing data immediately as it is generated.
3. Interactive processing: Processing data in response to user input.
7. Ten file processing operations:
1. Create: Creating a new file.
2. Delete: Deleting a file.
3. Read: Reading data from a file.
4. Write: Writing data to a file.
5. Update: Modifying existing file data.
6. Search: Finding specific data within a file.
7. Sort: Arranging file data in a specific order.
8. Merge: Combining data from multiple files.
9. Split: Dividing a file into smaller files.
10. Backup: Creating a copy of a file for recovery purposes.
8. File System:
A file system is a software component that manages and organizes files on
a computer system, providing a hierarchical structure for storing and
retrieving data.
9. The basic services of a file system include:
1. File Creation: The ability to create new files and store them on the
system.
2. File Deletion: The ability to remove files from the system.
3. File Naming: The ability to assign names to files and manage file naming
conventions.
4. File Retrieval: The ability to access and read files from the system.
5. File Storage: The ability to store files on the system, including
management of storage space and file organization.
6. File Security: The ability to control access to files, including setting
permissions, access rights, and encryption.
7. File Backup and Recovery: The ability to create backups of files and
restore them in case of data loss or corruption.
8. File Organization: The ability to manage file directories, folders, and
hierarchies to facilitate efficient file access and management.
10. Qualities of a Good File System:
- Efficiency
- Reliability
- Security
- Scalability
- Flexibility
11. Main Objective of Database Implementation:
To provide a structured and controlled environment for storing, managing,
and retrieving data.
12. Central Database Diagram:
13. Explanations:
I. Transfer Time: The time taken to transfer data between devices or
processes.
II. Seek Time: The time taken to locate data on a storage device.
III. Rotational Latency: The time taken for a disk to rotate to the desired
location.
IV. Queue: A sequence of requests or data waiting to be processed.
V. List: A collection of data elements, often in a specific order.
VI. Array: A collection of data elements of the same type, stored in
contiguous memory locations.
1a. File Organization:
File organization refers to the way files are structured and stored on a
computer system, including the use of directories, folders, and file names.
1b. Types of File Systems:
- Hierarchical File System (HFS)
- Network File System (NFS)
- File Allocation Table (FAT)
- New Technology File System (NTFS)
2a. Access Methods of File Organization:
- Sequential Access: Files are accessed in a linear sequence.
- Direct Access: Files are accessed directly using a unique identifier.
- Indexed Access: Files are accessed using an index or table.
- Hierarchical Access: Files are organized in a tree-like structure.
2b. Functions of Buffer:
- Temporary storage
- Data synchronization
- Error detection and correction
- Data transformation
3a. Objectives of File Management:
- Efficiency: Optimize file storage and retrieval.
- Reliability: Ensure file integrity and availability.
- Security: Protect files from unauthorized access.
- Scalability: Support growing storage needs.
- Flexibility: Accommodate different file types and structures.
3b. File Organization:
(I) Array: A collection of data elements of the same type, stored in
contiguous memory locations.
(II) Table: A collection of data elements, organized into rows and columns.
(III) Stack: A Last-In-First-Out (LIFO) data structure, where elements are
added and removed from the top.
3c. Storage Performance:
Storage performance refers to the efficiency and effectiveness of a storage
system in handling data transfer, retrieval, and management.
3d. Throughput and Latency:
- Throughput: The rate at which data is transferred (e.g., MB/s).
- Latency: The time delay between data request and access (e.g., ms).
4. Reasons to Prioritize Security for File Transfer:
- Protect sensitive data from unauthorized access
- Prevent data breaches and cyber attacks
- Ensure compliance with data protection regulations
- Maintain data integrity and accuracy
- Build trust with users and stakeholders
MophyTech
09021132661