1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
m_a_m_a [10]
3 years ago
15

What’s the difference between the logical and physical structure of a file? What are the advantages of not having an application

program interact directly with the physical file structure?
Computers and Technology
1 answer:
vodka [1.7K]3 years ago
6 0

Answer:

In the computer storage memory, a logical file structure refers to a collection of files which are set-up in an organized way inside different directories, folders/sub-folders and storage volumes. While a physical file structure of a file refers to the physical storage place which are arranged linearly as an address space .

PART B:

It is important not to have application programs interacting directly with the physical file structure because they (Application programs) already have a logical view of the computer's secondary storage, so application programs can have faster maneuvering and access to stored data

You might be interested in
Describe three ways to protect the computer and all peripheral devices from damage
omeli [17]

Here are three ways:

Cleaning: as applied to most things in our lives, cleaning also applies to protecting peripheral devices. To ensure the smooth running of such devices one needs to clean the dust and dirt from these devices once in a while. Make sure you disconnect the device before you eject it from the system.<span>

Follow instructions: Most devices come with a safety guide and instructions manual, always use the recommended settings for the smooth running of your system. These recommendations usually come from the manufacturer and are reliable.

<span>Surge suppressor/protector: One of the major issues faced by the users is faults caused by power surges. One needs to make sure to use a Surge Suppressor/Protector connected with the system to make sure it will not damaged with power fluctuations. </span></span>

3 0
4 years ago
Gary frequently types his class assignment. His ring automatically types the letter O. What is Gary using when he types?
Solnce55 [7]
The answer would be C
8 0
4 years ago
Read 2 more answers
Why is stranded rather than solid cable used for patch cables? Why is it critical not to score the jacket too deeply when stripp
Serggg [28]

Answer:

The definition of the issues is listed throughout the section down.

Explanation:

  1. Stranded cables are somewhat more compact and can be mounted quickly. Strong cables become rigid in design, and they are not versatile for installation. In comparison with solid connectors, amplification is indeed high.
  2. Unless the innermost layer including its wire is broken as we attempt to connect the cable, it will not function. So, whenever stripping the cables through the walls, it's indeed important not to rank the jack too profoundly.
  3. It would be quick to untwist the cable and then will ensure that perhaps the connection is appropriate for the most widely encountered rj-45 connection whenever the wiring of 0.5 inches becomes coupled up.
  4. If we don't keep the right pin colors in order, the relation won't work. Afterward, when another connexon is broken due to many complications, it would be impossible to figure out the contacts unless the pins coloring are not always in sequence.
  5. The connection pairs can be cut off through 0.5 inches within about therefore the gap within the connector is narrower and the wire would not be correctly attached if we break the cable further. The link is lost and the cable does not run properly.
  6. It is necessary to ensure that perhaps the wires are forced to the end of the platform since the connexon will indeed be broken as well as the connector would not operate unless the wires aren't moved. The wires will fall out of another socket as well.
  7. Before even being incorporated into another crimping unit, it is good to carefully check the connection sequence to ensure that perhaps the wires are to the end since it is impossible to verify the sequence until the wires are attached to something like the connector. Unless the connections are not always in alignment, the link will also not be provided and indeed the wire would not operate correctly, even if the link is provided. Such wires can also be presented to use load barriers, and that it's the simplest operation.
  8. The Durability Tester has been used to determine the hardness between two stages, whereas the connection efficiency is tested using the qualification tester.

8 0
3 years ago
When you merge business letters, how many total documents will you have when you are finished with the merge process?
pychu [463]

Answer:

D. unable to determine – you will have one letter for each recipient on the list.

Explanation:

The reason because of this it depends on how many recipients there are to begin with.

Hope This Helps ;)

8 0
3 years ago
Read 2 more answers
This variable controls the number of times that the loop iterates. A. Counter variable B. Loop control variable C. Running total
Norma-Jean [14]

Answer:

B) Loop control Variable

Explanation:

When programming, A loop control variable is used to control the number of iterations for a program loop. By convention programmers love to call this variable counter, i, j, n etc. The control variable when defined will determine the number of times a loop will execute. See the example bellow in C++ where we use a for loop to print the word "Hello" 5 times

<em>#include <iostream></em>

<em>using namespace std;</em>

<em>int main()</em>

<em>{</em>

<em>  for(int counter = 0; counter<5; counter++){</em>

<em>    cout<<"Hello"<<endl;</em>

<em>  }</em>

<em>    return 0;</em>

<em>}</em>

In this code snippet, the control variable is called counter and the condition is that counter will run from 0 to 4. So we get the world Hello printed five times

8 0
3 years ago
Other questions:
  • What did you include in your response? Check all that
    15·1 answer
  • James wishes to access a certain software service via different computing systems over the Internet. What technology provides so
    13·2 answers
  • The OS that has a Dock is the<br> Linux<br> Mac<br> Windows<br> MS DOS
    10·1 answer
  • List at least five tasks a layer performs. Could one (or more) of these tasks could be performed by multiple layers?
    13·1 answer
  • Validation ensures that a website looks good.<br> True or False
    9·1 answer
  • If a user wants to add an expansion card to increase the memory of a computer, where should the user insert the card?
    12·2 answers
  • What was the first message ever sent in morse code?
    13·1 answer
  • Examples of the many different ways an app can be used are called use
    6·2 answers
  • ¿Qué algoritmos de encriptación utilizan una clave para cifrar los datos y una clave diferente para descifrarlos?
    13·1 answer
  • Write a class named Employee that has private data members for an employee's name, ID_number, salary, and email_address. It shou
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!