SlideShare a Scribd company logo
1 of 1
Download to read offline
What is the difference between sequential file access and random file access? Describe a unique
scenario (different than submitted by classmates) where each type of file access could be used
(no coding required).
Solution
the main differenece is we should have to incremenet the address to the reach the specified
loaction in sequenctial access but in random access we will get the address of the loaction and
can reach it directly.(it can implemeted using pointers)
sequential accesss: in this the data is accessed in a memory devices in sequencial or
predefined way or in an ordered sequence
example of sequencial access:
iam giving you the real world senario as a example:
a student named john is living in an hostel he want his friend named rock. in hostel there are 100
rooms
sequencially john is in 20th room and rock is in 90 th room .but john doesnt know which room
he is
so he started searching one by one room sequencially like(21 22 23..90). this is one of the
example for
sequential access
random access:
it is one type of process in which specified memory can access by using address of the
memory and can be accessed directly .
example of random access:
now if we use the above example if john known room number of the rock then he need not
to search all the room he just directly reach the 90 th where rock is situated.

More Related Content

More from kisgstin23

Canadian copyrights on music expire 50 years after the death of t.pdf
Canadian copyrights on music expire 50 years after the death of t.pdfCanadian copyrights on music expire 50 years after the death of t.pdf
Canadian copyrights on music expire 50 years after the death of t.pdf
kisgstin23
 
A linked stack is implemented using a standard Node class as follows.pdf
A linked stack is implemented using a standard Node class as follows.pdfA linked stack is implemented using a standard Node class as follows.pdf
A linked stack is implemented using a standard Node class as follows.pdf
kisgstin23
 
3. Implement the UnsortedList class to store a list of numbers that .pdf
3. Implement the UnsortedList class to store a list of numbers that .pdf3. Implement the UnsortedList class to store a list of numbers that .pdf
3. Implement the UnsortedList class to store a list of numbers that .pdf
kisgstin23
 
What professions were represented on the teamWhat role did each m.pdf
What professions were represented on the teamWhat role did each m.pdfWhat professions were represented on the teamWhat role did each m.pdf
What professions were represented on the teamWhat role did each m.pdf
kisgstin23
 
This class will implement a hash table. The hash table will hold data.pdf
This class will implement a hash table. The hash table will hold data.pdfThis class will implement a hash table. The hash table will hold data.pdf
This class will implement a hash table. The hash table will hold data.pdf
kisgstin23
 
Topicswhat technology affect customers when purchasing a travel t.pdf
Topicswhat technology affect customers when purchasing a travel t.pdfTopicswhat technology affect customers when purchasing a travel t.pdf
Topicswhat technology affect customers when purchasing a travel t.pdf
kisgstin23
 
The Miami Beach police department is sick and tired of the college a.pdf
The Miami Beach police department is sick and tired of the college a.pdfThe Miami Beach police department is sick and tired of the college a.pdf
The Miami Beach police department is sick and tired of the college a.pdf
kisgstin23
 
The below test includes 10 questions, randomly selected from a large.pdf
The below test includes 10 questions, randomly selected from a large.pdfThe below test includes 10 questions, randomly selected from a large.pdf
The below test includes 10 questions, randomly selected from a large.pdf
kisgstin23
 

More from kisgstin23 (20)

Canadian copyrights on music expire 50 years after the death of t.pdf
Canadian copyrights on music expire 50 years after the death of t.pdfCanadian copyrights on music expire 50 years after the death of t.pdf
Canadian copyrights on music expire 50 years after the death of t.pdf
 
Below are common errors. State what was done incorrectly and correct.pdf
Below are common errors. State what was done incorrectly and correct.pdfBelow are common errors. State what was done incorrectly and correct.pdf
Below are common errors. State what was done incorrectly and correct.pdf
 
A linked stack is implemented using a standard Node class as follows.pdf
A linked stack is implemented using a standard Node class as follows.pdfA linked stack is implemented using a standard Node class as follows.pdf
A linked stack is implemented using a standard Node class as follows.pdf
 
A. Karl Marx B. Max Weber C. Erik Olin Wright D. Kingsley Davi.pdf
A. Karl Marx  B. Max Weber  C. Erik Olin Wright  D. Kingsley Davi.pdfA. Karl Marx  B. Max Weber  C. Erik Olin Wright  D. Kingsley Davi.pdf
A. Karl Marx B. Max Weber C. Erik Olin Wright D. Kingsley Davi.pdf
 
3. Implement the UnsortedList class to store a list of numbers that .pdf
3. Implement the UnsortedList class to store a list of numbers that .pdf3. Implement the UnsortedList class to store a list of numbers that .pdf
3. Implement the UnsortedList class to store a list of numbers that .pdf
 
4 (Opportunity Cost) You can either spend Spring Break working at hom.pdf
4 (Opportunity Cost) You can either spend Spring Break working at hom.pdf4 (Opportunity Cost) You can either spend Spring Break working at hom.pdf
4 (Opportunity Cost) You can either spend Spring Break working at hom.pdf
 
You isolated an enveloped virus whose virions are able to hemadsorb .pdf
You isolated an enveloped virus whose virions are able to hemadsorb .pdfYou isolated an enveloped virus whose virions are able to hemadsorb .pdf
You isolated an enveloped virus whose virions are able to hemadsorb .pdf
 
What professions were represented on the teamWhat role did each m.pdf
What professions were represented on the teamWhat role did each m.pdfWhat professions were represented on the teamWhat role did each m.pdf
What professions were represented on the teamWhat role did each m.pdf
 
what is the threat and solution for when alice sends a password and .pdf
what is the threat and solution for when alice sends a password and .pdfwhat is the threat and solution for when alice sends a password and .pdf
what is the threat and solution for when alice sends a password and .pdf
 
What is the mechanism of action of Staphylococcus alpha toxinSol.pdf
What is the mechanism of action of Staphylococcus alpha toxinSol.pdfWhat is the mechanism of action of Staphylococcus alpha toxinSol.pdf
What is the mechanism of action of Staphylococcus alpha toxinSol.pdf
 
What is a charismatic leader What problems are charismatic leaders .pdf
What is a charismatic leader What problems are charismatic leaders .pdfWhat is a charismatic leader What problems are charismatic leaders .pdf
What is a charismatic leader What problems are charismatic leaders .pdf
 
This theorem was conjectured by Legendre, Gauss, Dirichlet, Riemann, .pdf
This theorem was conjectured by Legendre, Gauss, Dirichlet, Riemann, .pdfThis theorem was conjectured by Legendre, Gauss, Dirichlet, Riemann, .pdf
This theorem was conjectured by Legendre, Gauss, Dirichlet, Riemann, .pdf
 
This class will implement a hash table. The hash table will hold data.pdf
This class will implement a hash table. The hash table will hold data.pdfThis class will implement a hash table. The hash table will hold data.pdf
This class will implement a hash table. The hash table will hold data.pdf
 
Topicswhat technology affect customers when purchasing a travel t.pdf
Topicswhat technology affect customers when purchasing a travel t.pdfTopicswhat technology affect customers when purchasing a travel t.pdf
Topicswhat technology affect customers when purchasing a travel t.pdf
 
The Statement of Cash Flows for a proprietary fund must include whi.pdf
The Statement of Cash Flows for a proprietary fund must include whi.pdfThe Statement of Cash Flows for a proprietary fund must include whi.pdf
The Statement of Cash Flows for a proprietary fund must include whi.pdf
 
The Miami Beach police department is sick and tired of the college a.pdf
The Miami Beach police department is sick and tired of the college a.pdfThe Miami Beach police department is sick and tired of the college a.pdf
The Miami Beach police department is sick and tired of the college a.pdf
 
The magnitude, R, on the Richter scale of an earthquake of intensity .pdf
The magnitude, R, on the Richter scale of an earthquake of intensity .pdfThe magnitude, R, on the Richter scale of an earthquake of intensity .pdf
The magnitude, R, on the Richter scale of an earthquake of intensity .pdf
 
The below test includes 10 questions, randomly selected from a large.pdf
The below test includes 10 questions, randomly selected from a large.pdfThe below test includes 10 questions, randomly selected from a large.pdf
The below test includes 10 questions, randomly selected from a large.pdf
 
A quantity of 19.1 cm^3 of water at 12.4 degree C is placed in a Free.pdf
A quantity of 19.1 cm^3 of water at 12.4 degree C is placed in a Free.pdfA quantity of 19.1 cm^3 of water at 12.4 degree C is placed in a Free.pdf
A quantity of 19.1 cm^3 of water at 12.4 degree C is placed in a Free.pdf
 
Six people apply for three identical jobs and all are qualified for .pdf
Six people apply for three identical jobs and all are qualified for .pdfSix people apply for three identical jobs and all are qualified for .pdf
Six people apply for three identical jobs and all are qualified for .pdf
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 

Recently uploaded (20)

UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Ernest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell TollsErnest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell Tolls
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptxMichaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 

What is the difference between sequential file access and random fil.pdf

  • 1. What is the difference between sequential file access and random file access? Describe a unique scenario (different than submitted by classmates) where each type of file access could be used (no coding required). Solution the main differenece is we should have to incremenet the address to the reach the specified loaction in sequenctial access but in random access we will get the address of the loaction and can reach it directly.(it can implemeted using pointers) sequential accesss: in this the data is accessed in a memory devices in sequencial or predefined way or in an ordered sequence example of sequencial access: iam giving you the real world senario as a example: a student named john is living in an hostel he want his friend named rock. in hostel there are 100 rooms sequencially john is in 20th room and rock is in 90 th room .but john doesnt know which room he is so he started searching one by one room sequencially like(21 22 23..90). this is one of the example for sequential access random access: it is one type of process in which specified memory can access by using address of the memory and can be accessed directly . example of random access: now if we use the above example if john known room number of the rock then he need not to search all the room he just directly reach the 90 th where rock is situated.