File organization, Basic Computer Science

File Organization

There are three types of file organization used in practice. Let us consider the example of a dictionary. The dictionary contains listing of English words sorted alphabetically. The top left and right hand corners provide the starting and the ending of each page. Let us assume that the information of the dictionary is stored on a disk. Now suppose, we want to find a word, say, “Computer”. This can be done in the following ways:

    Sequential Access: We start from the first word and check whether or not it is the desired word. We continue checking till the required word is found. This method implies searching the whole file from beginning to end and is known as sequential processing. Time required to locate a specific word will obviously depend on its location from the starting point.

    Indexed Sequential Access: To locate “Computer”, we can also search only the top corner words to first identify which particular page the word belongs to. After knowing the specific page, we can then search sequential till the required word is found. In this method, firstly an index has been searched followed by a complete sequential search. This method is known as indexed sequential method and is much faster compared to sequential method and is very commonly used in practice.

    Random Access: Suppose each word is assigned a specific sequence number and “Computer” was 25th from the beginning. Then we could go directly to the 25th location on the disk without any searching. This type of processing is known as Random Access and the response in this method will be very fast. However, the concept of allocating a unique number, to each data item, becomes difficult as the complexity increases.

Posted Date: 9/14/2012 6:19:22 AM | Location : United States







Related Discussions:- File organization, Assignment Help, Ask Question on File organization, Get Answer, Expert's Help, File organization Discussions

Write discussion on File organization
Your posts are moderated
Related Questions
QUESTION (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Explain how s

QUESTION 1 We need to write Z specifications to record the information about passengers on board an aircraft. Here you are required to produce the specifications using appropr


QUESTION (a) Consider the graph below, use the Flow Decomposition technique to list the cycles and paths produced.                                                (b) Pr

Question 1 Explain with an example the three kinds of relationships that are most important in object oriented modeling Question 2 Describe the Common Modeling techniques in

What is methods For handling Deadlocks?

External interruptions are produced by peripheral devices, for example keyboards, printers, communication cards, etc. They are also produced by coprocessors. It is not achievable t

The operating system is the layer among the hardware and the programs you run. It provides programs a standard interface to the hardware; or else every program would need to includ

Magnetic Memory:  In the above section we have seen various types of semiconductor RAMs. These high speed semiconductor storage devices (i.e. RAMs) are expensive. So we need s

note on high level language and low level language