Question: Solve the following problems or answer the following questions, supplying detailed steps wherever required. Thorough answers to solutions and questions required using complete sentences for

Solve the following problems or answer the following questions, supplying detailed steps wherever required. Thorough answers to solutions and questions required using complete sentences for answers to the questions (short incomplete sentences not acceptable).
Exercise Instructions
Optical Discs Pits and LandsThere is a common misperception that the pits and lands in optical discs represent zeros and ones. Research the function performed by the pits and lands in CD, DVD, and Blu-ray discs, and explain how they are interpreted. Recordable discs do not use pits and lands. Research these discs and describe how they convey zeros and ones. Be sure to thoroughly cite the sources of your research.
StorageName four examples of secondary storage media other than hard disks.
Briefly explain the difference between buffering and blocking.
Briefly explain the differences between seek time and search time.
Describe how secondary storage differs from primary storage and give an example of each.
Indexed sequential files were widely adopted in business applications because of their versatility. However, as records are added to the file, and blocks are filled to capacity, they have to be stored in an overflow area. How does this affect performance?
Files and FilenamesUsing a computing device, identify four files each stored in a different directory. For each file, list both the relative filename and its complete filename, showing all paths to that file from the root directory. Identify the device and the software or tool you used to discover the complete filename.
Using your own computer, give the name of the operating system that runs it and give examples of five legal file names. Then create examples of five illegal file names, attempt to use them on your system to save a file, and describe what error message you received.
File Retrieval / AccessSome operating systems support both menus and command-line interfaces. Do you think file retrieval is different on a menu-driven system than on a command-driven system? Why?
The following is an access verification technique, listing several files and the access allowed for a single user. Identify the control technique used here and, for each, explain the type of access allowed.
a.File_1R-ED
b.File_12 RWE-
c.File_13 RW-D
d.File_14--E-

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!