Com 214 File Management
Com 214 File Management
SCIENCES (DECCOMS)
IN AFFILIATION WITH
TEMPLE GATE POLYTECHNIC
ABA, ABIA STATE.
COURSE TITLE: FILE ORGANISATION AND MANAGEMENT
COURSE CODE: COM 214 DEPARTMENTS: COMPUTER SCIENCE
TIME ALLOWED: 2 HOURS INSTRUCTIONS: ANSWER FIVE QUESTIONS
QUESTION 1
1a. What is a file (2 marks)
1b. Define a file system (4 marks)
1c. State and explain the uses of file system (8
marks)
QUESTION 2
2a. Exhaustively explain the five various types of file system (10
marks)
2b. Enumerate the five basic terminologies in file system (5
marks)
QUESTION 3
3a. Files are usually classified into two ways. What are those two
ways (4 marks)
3b. List and explain three reasons why we study file system (6
marks)
3c. What do you understand by file system data management (4
marks)
QUESTION 4
4a. Define data redundancy, data anomalies and data consistency
(6
marks)
4b. state the three differences between physical and logical file (3
marks)
4c. what are the pros and cons of heap storage (5
marks)
QUESTION 5
5a. Briefly highlight three pros and cons of hash file organization
(6 marks)
5b. There are numerous types of files used for storing data needed
for processing, reference or back up. Explain the five main common
types of processing files (9
marks)
QUESTION 6
6a. Explain the two types of file storage (4 marks)
6b. Define the concept of buffer (4 marks)
MARKING SCHEME
1a. What is a file (2 marks)
WHAT IS A FILE? A file is a collection of data stored in one unit,
identified by a filename. It can be a document, picture, audio, video
stream, data library, application, or other collection of data.
3a. Files are usually classified into two ways. What are those
two ways (4
marks)
CLASIFICATION OF FILE
Files can be classified in two ways and two set of terms developed
for each as follows;
Physical file :This focuses on how data is stored and retrieved
from storage device, the set of terms developed for its
functions are :,
- Physical record
- Field
- Character
Logical files: this focuses on the relationship between data.
The set of terms developed for its description are
- Logical records of entity
- Data item “attributes of entity”
3b. List and explain three reasons why we study file system (6
marks)
REASONS WHY WE STUDY FILE SYSTEM
Although the problem created by file system approach tends to be
many, and it is now largely obsolete, there are several good reasons
for studying file systems.
Some of the problems that plague file system may be
duplicated in electronic file design and management as well as
in data software if the user of the new software is unaware of
the pitfalls of data management. A wise historian once pointed
out that those who do not learn the lessons of history are
doomed to repeat them.
5b. There are numerous types of files used for storing data needed
for processing, reference or back up. Explain the five main common
types of processing files (9
marks)
DIFFERENT TYPES OF FILES
There are numerous types of files used for storing data needed for
processing, reference or back up. Explain the common types of
processing files include
Master files,
Transaction,
Reference,
Backup, report
Sort file.
Master file
Reference file
Backup file
Report file
a. Permanent storage
b. Temporary storage
List
Stack
Output Input
A B C D B C
D
Stack A
C D
B
A
A
B C D
B D
C
A
A
(f) Pop C
(e) Push C
Backup
Encryption
Passwords
Firewall
(8 marks)
BACKUP
Storing backup copies of software and data or files and having
backup computer and communication capabilities are important
basic safeguards because the data can then be restored if it was
altered or destroyed by a computer crime or accident. Computer
data should be backed up frequently and should be stored nearby in
secured locations in case of damage at the primary site.
Transporting sensitive data to storage locations should also be done
securely.
ENCRYPTION
Another technique to protect confidential information is encryption.
Computer users can scramble information to prevent unauthorized
users from accessing it. Authorized users can unscramble the
information when needed by using a secret code called a key.
Without the key the scrambled information would be impossible or
very difficult to unscramble. A more complex form of encryption
uses two keys, called the public key and the private key, and a
system of double encryption. Each participant possesses a secret,
private key and a public key that is known to potential recipients.
Both keys are used to encrypt, and matching keys are used to
decrypt the message. However, the advantage over the single-key
method lies with the private keys, which are never shared and so
cannot be intercepted. The public key verifies that the sender is the
one who transmitted it. The keys are modified periodically, further
hampering unauthorized unscrambling and making the encrypted
information more difficult to decipher.
APPROVED USERS
Another technique to help prevent abuse and misuse of computer
data is to limit the use of computers and data files to approved
persons. Security software can verify the identity of computer users
and limit their privileges to use, view, and alter files. The software
also securely records their actions to establish accountability.
Military organizations give access rights to classified, confidential,
secret, or top-secret information according to the corresponding
security clearance level of the user. Other types of organizations
also classify information and specify different degrees of protection.
PASSWORDS
Passwords are confidential sequences of characters that allow
approved persons to make use of specified computers, software, or
information. To be effective, passwords must be difficult to guess
and should not be found in dictionaries. Effective passwords
contain a variety of characters and symbols that are not part of the
alphabet. To thwart imposters, computer systems usually limit the
number of attempts and restrict the time it takes to enter the
correct password.
A more secured method is to require possession and use of tamper-
resistant plastic cards with microprocessor chips, known as “smart
cards,” which contain a stored password that automatically
changes after each use. When a user logs on, the computer reads
the card's password, as well as another password entered by the
user, and matches these two respectively to an identical card
password generated by the computer and the user's password
stored in the computer in encrypted form. Use of passwords and
'smart cards' is beginning to be reinforced by biometrics,
identification methods that use unique personal characteristics,
such as fingerprints, retinal patterns, facial characteristics, or voice
recordings.
FIREWALLS
Computers connected to communication networks, such as the
Internet, are particularly vulnerable to electronic attack because so
many people have access to them. These computers can be
protected by using firewall computers or software placed between
the networked computers and the network. The firewall examines,
filters, and reports on all information passing through the network
to ensure its appropriateness. These functions help prevent
saturation of input capabilities that otherwise might deny usage to
legitimate users, and they ensure that information received from an
outside source is expected and does not contain computer viruses.