SlideShare a Scribd company logo
What is the difference between sequential file access and random file access? Describe a unique
scenario (different than submitted by classmates) where each type of file access could be used
(no coding required).
Solution
the main differenece is we should have to incremenet the address to the reach the specified
loaction in sequenctial access but in random access we will get the address of the loaction and
can reach it directly.(it can implemeted using pointers)
sequential accesss: in this the data is accessed in a memory devices in sequencial or
predefined way or in an ordered sequence
example of sequencial access:
iam giving you the real world senario as a example:
a student named john is living in an hostel he want his friend named rock. in hostel there are 100
rooms
sequencially john is in 20th room and rock is in 90 th room .but john doesnt know which room
he is
so he started searching one by one room sequencially like(21 22 23..90). this is one of the
example for
sequential access
random access:
it is one type of process in which specified memory can access by using address of the
memory and can be accessed directly .
example of random access:
now if we use the above example if john known room number of the rock then he need not
to search all the room he just directly reach the 90 th where rock is situated.

More Related Content

More from kisgstin23

Canadian copyrights on music expire 50 years after the death of t.pdf
Canadian copyrights on music expire 50 years after the death of t.pdfCanadian copyrights on music expire 50 years after the death of t.pdf
Canadian copyrights on music expire 50 years after the death of t.pdf
kisgstin23
 
Below are common errors. State what was done incorrectly and correct.pdf
Below are common errors. State what was done incorrectly and correct.pdfBelow are common errors. State what was done incorrectly and correct.pdf
Below are common errors. State what was done incorrectly and correct.pdf
kisgstin23
 
A linked stack is implemented using a standard Node class as follows.pdf
A linked stack is implemented using a standard Node class as follows.pdfA linked stack is implemented using a standard Node class as follows.pdf
A linked stack is implemented using a standard Node class as follows.pdf
kisgstin23
 
A. Karl Marx B. Max Weber C. Erik Olin Wright D. Kingsley Davi.pdf
A. Karl Marx  B. Max Weber  C. Erik Olin Wright  D. Kingsley Davi.pdfA. Karl Marx  B. Max Weber  C. Erik Olin Wright  D. Kingsley Davi.pdf
A. Karl Marx B. Max Weber C. Erik Olin Wright D. Kingsley Davi.pdf
kisgstin23
 
3. Implement the UnsortedList class to store a list of numbers that .pdf
3. Implement the UnsortedList class to store a list of numbers that .pdf3. Implement the UnsortedList class to store a list of numbers that .pdf
3. Implement the UnsortedList class to store a list of numbers that .pdf
kisgstin23
 
4 (Opportunity Cost) You can either spend Spring Break working at hom.pdf
4 (Opportunity Cost) You can either spend Spring Break working at hom.pdf4 (Opportunity Cost) You can either spend Spring Break working at hom.pdf
4 (Opportunity Cost) You can either spend Spring Break working at hom.pdf
kisgstin23
 
You isolated an enveloped virus whose virions are able to hemadsorb .pdf
You isolated an enveloped virus whose virions are able to hemadsorb .pdfYou isolated an enveloped virus whose virions are able to hemadsorb .pdf
You isolated an enveloped virus whose virions are able to hemadsorb .pdf
kisgstin23
 
What professions were represented on the teamWhat role did each m.pdf
What professions were represented on the teamWhat role did each m.pdfWhat professions were represented on the teamWhat role did each m.pdf
What professions were represented on the teamWhat role did each m.pdf
kisgstin23
 
what is the threat and solution for when alice sends a password and .pdf
what is the threat and solution for when alice sends a password and .pdfwhat is the threat and solution for when alice sends a password and .pdf
what is the threat and solution for when alice sends a password and .pdf
kisgstin23
 
What is the mechanism of action of Staphylococcus alpha toxinSol.pdf
What is the mechanism of action of Staphylococcus alpha toxinSol.pdfWhat is the mechanism of action of Staphylococcus alpha toxinSol.pdf
What is the mechanism of action of Staphylococcus alpha toxinSol.pdf
kisgstin23
 
What is a charismatic leader What problems are charismatic leaders .pdf
What is a charismatic leader What problems are charismatic leaders .pdfWhat is a charismatic leader What problems are charismatic leaders .pdf
What is a charismatic leader What problems are charismatic leaders .pdf
kisgstin23
 
This theorem was conjectured by Legendre, Gauss, Dirichlet, Riemann, .pdf
This theorem was conjectured by Legendre, Gauss, Dirichlet, Riemann, .pdfThis theorem was conjectured by Legendre, Gauss, Dirichlet, Riemann, .pdf
This theorem was conjectured by Legendre, Gauss, Dirichlet, Riemann, .pdf
kisgstin23
 
This class will implement a hash table. The hash table will hold data.pdf
This class will implement a hash table. The hash table will hold data.pdfThis class will implement a hash table. The hash table will hold data.pdf
This class will implement a hash table. The hash table will hold data.pdf
kisgstin23
 
Topicswhat technology affect customers when purchasing a travel t.pdf
Topicswhat technology affect customers when purchasing a travel t.pdfTopicswhat technology affect customers when purchasing a travel t.pdf
Topicswhat technology affect customers when purchasing a travel t.pdf
kisgstin23
 
The Statement of Cash Flows for a proprietary fund must include whi.pdf
The Statement of Cash Flows for a proprietary fund must include whi.pdfThe Statement of Cash Flows for a proprietary fund must include whi.pdf
The Statement of Cash Flows for a proprietary fund must include whi.pdf
kisgstin23
 
The Miami Beach police department is sick and tired of the college a.pdf
The Miami Beach police department is sick and tired of the college a.pdfThe Miami Beach police department is sick and tired of the college a.pdf
The Miami Beach police department is sick and tired of the college a.pdf
kisgstin23
 
The magnitude, R, on the Richter scale of an earthquake of intensity .pdf
The magnitude, R, on the Richter scale of an earthquake of intensity .pdfThe magnitude, R, on the Richter scale of an earthquake of intensity .pdf
The magnitude, R, on the Richter scale of an earthquake of intensity .pdf
kisgstin23
 
The below test includes 10 questions, randomly selected from a large.pdf
The below test includes 10 questions, randomly selected from a large.pdfThe below test includes 10 questions, randomly selected from a large.pdf
The below test includes 10 questions, randomly selected from a large.pdf
kisgstin23
 
A quantity of 19.1 cm^3 of water at 12.4 degree C is placed in a Free.pdf
A quantity of 19.1 cm^3 of water at 12.4 degree C is placed in a Free.pdfA quantity of 19.1 cm^3 of water at 12.4 degree C is placed in a Free.pdf
A quantity of 19.1 cm^3 of water at 12.4 degree C is placed in a Free.pdf
kisgstin23
 
Six people apply for three identical jobs and all are qualified for .pdf
Six people apply for three identical jobs and all are qualified for .pdfSix people apply for three identical jobs and all are qualified for .pdf
Six people apply for three identical jobs and all are qualified for .pdf
kisgstin23
 

More from kisgstin23 (20)

Canadian copyrights on music expire 50 years after the death of t.pdf
Canadian copyrights on music expire 50 years after the death of t.pdfCanadian copyrights on music expire 50 years after the death of t.pdf
Canadian copyrights on music expire 50 years after the death of t.pdf
 
Below are common errors. State what was done incorrectly and correct.pdf
Below are common errors. State what was done incorrectly and correct.pdfBelow are common errors. State what was done incorrectly and correct.pdf
Below are common errors. State what was done incorrectly and correct.pdf
 
A linked stack is implemented using a standard Node class as follows.pdf
A linked stack is implemented using a standard Node class as follows.pdfA linked stack is implemented using a standard Node class as follows.pdf
A linked stack is implemented using a standard Node class as follows.pdf
 
A. Karl Marx B. Max Weber C. Erik Olin Wright D. Kingsley Davi.pdf
A. Karl Marx  B. Max Weber  C. Erik Olin Wright  D. Kingsley Davi.pdfA. Karl Marx  B. Max Weber  C. Erik Olin Wright  D. Kingsley Davi.pdf
A. Karl Marx B. Max Weber C. Erik Olin Wright D. Kingsley Davi.pdf
 
3. Implement the UnsortedList class to store a list of numbers that .pdf
3. Implement the UnsortedList class to store a list of numbers that .pdf3. Implement the UnsortedList class to store a list of numbers that .pdf
3. Implement the UnsortedList class to store a list of numbers that .pdf
 
4 (Opportunity Cost) You can either spend Spring Break working at hom.pdf
4 (Opportunity Cost) You can either spend Spring Break working at hom.pdf4 (Opportunity Cost) You can either spend Spring Break working at hom.pdf
4 (Opportunity Cost) You can either spend Spring Break working at hom.pdf
 
You isolated an enveloped virus whose virions are able to hemadsorb .pdf
You isolated an enveloped virus whose virions are able to hemadsorb .pdfYou isolated an enveloped virus whose virions are able to hemadsorb .pdf
You isolated an enveloped virus whose virions are able to hemadsorb .pdf
 
What professions were represented on the teamWhat role did each m.pdf
What professions were represented on the teamWhat role did each m.pdfWhat professions were represented on the teamWhat role did each m.pdf
What professions were represented on the teamWhat role did each m.pdf
 
what is the threat and solution for when alice sends a password and .pdf
what is the threat and solution for when alice sends a password and .pdfwhat is the threat and solution for when alice sends a password and .pdf
what is the threat and solution for when alice sends a password and .pdf
 
What is the mechanism of action of Staphylococcus alpha toxinSol.pdf
What is the mechanism of action of Staphylococcus alpha toxinSol.pdfWhat is the mechanism of action of Staphylococcus alpha toxinSol.pdf
What is the mechanism of action of Staphylococcus alpha toxinSol.pdf
 
What is a charismatic leader What problems are charismatic leaders .pdf
What is a charismatic leader What problems are charismatic leaders .pdfWhat is a charismatic leader What problems are charismatic leaders .pdf
What is a charismatic leader What problems are charismatic leaders .pdf
 
This theorem was conjectured by Legendre, Gauss, Dirichlet, Riemann, .pdf
This theorem was conjectured by Legendre, Gauss, Dirichlet, Riemann, .pdfThis theorem was conjectured by Legendre, Gauss, Dirichlet, Riemann, .pdf
This theorem was conjectured by Legendre, Gauss, Dirichlet, Riemann, .pdf
 
This class will implement a hash table. The hash table will hold data.pdf
This class will implement a hash table. The hash table will hold data.pdfThis class will implement a hash table. The hash table will hold data.pdf
This class will implement a hash table. The hash table will hold data.pdf
 
Topicswhat technology affect customers when purchasing a travel t.pdf
Topicswhat technology affect customers when purchasing a travel t.pdfTopicswhat technology affect customers when purchasing a travel t.pdf
Topicswhat technology affect customers when purchasing a travel t.pdf
 
The Statement of Cash Flows for a proprietary fund must include whi.pdf
The Statement of Cash Flows for a proprietary fund must include whi.pdfThe Statement of Cash Flows for a proprietary fund must include whi.pdf
The Statement of Cash Flows for a proprietary fund must include whi.pdf
 
The Miami Beach police department is sick and tired of the college a.pdf
The Miami Beach police department is sick and tired of the college a.pdfThe Miami Beach police department is sick and tired of the college a.pdf
The Miami Beach police department is sick and tired of the college a.pdf
 
The magnitude, R, on the Richter scale of an earthquake of intensity .pdf
The magnitude, R, on the Richter scale of an earthquake of intensity .pdfThe magnitude, R, on the Richter scale of an earthquake of intensity .pdf
The magnitude, R, on the Richter scale of an earthquake of intensity .pdf
 
The below test includes 10 questions, randomly selected from a large.pdf
The below test includes 10 questions, randomly selected from a large.pdfThe below test includes 10 questions, randomly selected from a large.pdf
The below test includes 10 questions, randomly selected from a large.pdf
 
A quantity of 19.1 cm^3 of water at 12.4 degree C is placed in a Free.pdf
A quantity of 19.1 cm^3 of water at 12.4 degree C is placed in a Free.pdfA quantity of 19.1 cm^3 of water at 12.4 degree C is placed in a Free.pdf
A quantity of 19.1 cm^3 of water at 12.4 degree C is placed in a Free.pdf
 
Six people apply for three identical jobs and all are qualified for .pdf
Six people apply for three identical jobs and all are qualified for .pdfSix people apply for three identical jobs and all are qualified for .pdf
Six people apply for three identical jobs and all are qualified for .pdf
 

Recently uploaded

678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 

Recently uploaded (20)

678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 

What is the difference between sequential file access and random fil.pdf

  • 1. What is the difference between sequential file access and random file access? Describe a unique scenario (different than submitted by classmates) where each type of file access could be used (no coding required). Solution the main differenece is we should have to incremenet the address to the reach the specified loaction in sequenctial access but in random access we will get the address of the loaction and can reach it directly.(it can implemeted using pointers) sequential accesss: in this the data is accessed in a memory devices in sequencial or predefined way or in an ordered sequence example of sequencial access: iam giving you the real world senario as a example: a student named john is living in an hostel he want his friend named rock. in hostel there are 100 rooms sequencially john is in 20th room and rock is in 90 th room .but john doesnt know which room he is so he started searching one by one room sequencially like(21 22 23..90). this is one of the example for sequential access random access: it is one type of process in which specified memory can access by using address of the memory and can be accessed directly . example of random access: now if we use the above example if john known room number of the rock then he need not to search all the room he just directly reach the 90 th where rock is situated.