Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
Internal fragmentation occurs during file storage. Explain two disadvantages of this type of fragmentation. (4 marks)DICT MOD 1 July 2020
Internal fragmentation occurs when a file is stored in a way that leaves gaps or unused space within the allocated block or blocks of memory. This can happen when the size of the file is not an exact multiple of the block size, or when the file is deleted and replaced by a smaller file. There are seRead more
Internal fragmentation occurs when a file is stored in a way that leaves gaps or unused space within the allocated block or blocks of memory. This can happen when the size of the file is not an exact multiple of the block size, or when the file is deleted and replaced by a smaller file.
There are several disadvantages to internal fragmentation:
Differentiate between automatic repeat request and forward error correction operating systems. (4 marks)DICT MOD 1 July 2020
Automatic Repeat Request (ARQ) is a method used in digital communications to ensure the reliable transmission of data. It works by sending a message and then waiting for an acknowledgement (ACK) from the receiver. If the ACK is not received within a certain time period, the sender will resend the meRead more
Automatic Repeat Request (ARQ) is a method used in digital communications to ensure the reliable transmission of data. It works by sending a message and then waiting for an acknowledgement (ACK) from the receiver. If the ACK is not received within a certain time period, the sender will resend the message. This process continues until the receiver sends an ACK or the sender gives up and declares the transmission a failure.
Forward Error Correction (FEC) is a method used to improve the reliability of data transmission over noisy communication channels. It works by adding redundant information to the data being transmitted. This redundant information can be used by the receiver to detect and correct errors that may have occurred during transmission.
See lessExplain two types of inter-process communication in operating systems. (4 marks)DICT MOD 1 July 2020
Shared memory: This type of IPC allows multiple processes to access a common area of memory in order to exchange data. This can be an efficient way for processes to communicate, as it avoids the overhead of other IPC mechanisms such as message passing. However, it can also be more difficult to impleRead more
Input/output device controllers are associated with computer peripheral devices.Explain three functions of these controllers. (6 marks)DICT MOD 1 July 2020
Managing data transfer: I/O device controllers are responsible for managing the transfer of data between the device and the computer. This involves receiving data from the device, buffering it if necessary, and sending it to the appropriate location in the computer's memory. Controlling device operaRead more
Define each of the following terms in respect to computers’ input/output devices: G) spooling; (1 mark) Gi) caching: (1 mark) (li) buffering. (1 mark) (iv) device controller. (1 mark)DICT MOD 1 July 2020
(i) Spooling is a process that allows a computer to store data temporarily in a buffer or queue while it is being transferred from one device to another. This can be used to improve the performance of the system by allowing the computer to handle multiple input and output tasks concurrently. (ii) CaRead more
(i) Spooling is a process that allows a computer to store data temporarily in a buffer or queue while it is being transferred from one device to another. This can be used to improve the performance of the system by allowing the computer to handle multiple input and output tasks concurrently.
(ii) Caching is the process of storing frequently accessed data in a high-speed memory location for quick retrieval. This can improve the performance of a computer by reducing the number of times it needs to access slower storage devices.
(iii) Buffering is the process of storing data temporarily in a buffer or queue while it is being transferred from one device to another. This can help to smooth out the flow of data and improve the performance of the system by allowing it to handle multiple input and output tasks concurrently.
(iv) A device controller is a hardware component or software program that manages the communication between a device and a computer. It is responsible for controlling the input and output of data to and from the device and ensuring that it operates correctly.
See lessJames intends to change attributes of computer files in a network so as to control their access. Explain two file access modes he would consider t apply. (4 marks)DICT MOD 1 July 2020
Read-only mode: This mode allows users to view and read the contents of a file, but they cannot make any changes to it. This can be useful for ensuring that important documents are not accidentally modified or deleted. Write mode: This mode allows users to read, write, and modify the contents of a fRead more
A group of students were discussing the following terms during an operating system lesson. Provide the possible explanation they would have provided for each of the following terms: (i) job; (2 marks) (ii) shell. (2 marks)DICT MOD 1 July 2020
(i) A job is a unit of work that is sent to a computer's operating system to be processed. It is typically a request to run a specific program or task. (ii) A shell is a command-line interface that allows users to interact with an operating system by entering commands. The shell receives these commaRead more
(i) A job is a unit of work that is sent to a computer’s operating system to be processed. It is typically a request to run a specific program or task.
(ii) A shell is a command-line interface that allows users to interact with an operating system by entering commands. The shell receives these commands and then executes them, either by calling the relevant program or by carrying out the command itself. The shell acts as an intermediary between the user and the operating system, providing a way for the user to access and control the various functions and resources of the system.
See lessExplain two advantages of Network Operating Systems. (4 marks)DICT MOD 1 July 2020
Resource Sharing: Network operating systems allow multiple users to access shared resources such as printers, scanners, and hard drives. This can be especially useful in an office setting, where multiple people may need to access the same resources. Centralized Management: Network operating systemsRead more
Outline four disk operating system commands that could be used to manage files in a computer. (4 marks)DICT MOD 1 July 2020
DIR: The DIR command is used to display a list of files and directories in a specified location. It can be used with various options, such as /P to display the list one page at a time, or /W to display the list in a wide format. COPY: The COPY command is used to copy files from one location to anothRead more
Ann, a secretary at Masomo Technical Institute, has been experiencing wrist pains due to prolonged use of the computer. Explain three precautions that she could take to minimise the pain. (6 marks)DICT MOD 1 July 2020
Use ergonomic equipment: Ann should consider using ergonomic equipment, such as a wrist rest or an ergonomic keyboard and mouse, to reduce strain on her wrists. Take breaks: Ann should take regular breaks from the computer to give her wrists a chance to rest and recover. She can also stretch and movRead more