Professional Documents
Culture Documents
BIT ASSIGNMENT 1913556-CHIYANGI TheoryPracticle
BIT ASSIGNMENT 1913556-CHIYANGI TheoryPracticle
5/18/2019 INFORMATION
TECH
An Insight On
ZICT COLLEGE|
1
Table of Contents
DISCUSS FILE SYSTEM & FILE CONCEPT ....................................................................................................... 4
FILE CONCEPT ............................................................................................................................................... 4
HOW FILE SYSTEM WORK....................................................................................................... 5
ROLE OF METADATA IN FILE SYSTEM .............................................................................................. 5
FILE SYSTEM TYPES ....................................................................................................................................... 6
FAT FILE SYSTEM ............................................................................................................................... 6
a. Naming Convention ...................................................................................................................... 6
b. Security ......................................................................................................................................... 6
c. Quick Access To The Files ............................................................................................................. 6
FAT32 FILE SYSTEM........................................................................................................................... 7
Features ................................................................................................................................................ 7
Access Speed ........................................................................................................................................ 7
NTFS FILE SYSTEM............................................................................................................................. 7
Features ........................................................................................................................................ 7
Naming Conventions ............................................................................................................................ 7
Security ................................................................................................................................................. 7
High Reliability...................................................................................................................................... 7
File Compression .................................................................................................................................. 7
Bad Cluster Mapping ............................................................................................................................ 7
DATA PROCESSING AND DATA REPRESENTATION ...................................................................................... 8
NUMBERS ......................................................................................................................................... 8
IMAGE ............................................................................................................................................... 8
TEXT .................................................................................................................................................. 9
AUDIO ............................................................................................................................................... 9
VIDEO ................................................................................................................................................ 9
a. Video Refers To The Recording Or Broadcasting Of Picture Or Movie. Video Can Either Be
Produced ............................................................................................................................................... 9
DATA PROCESSING ....................................................................................................................................... 9
SIX STAGES OF DATA PROCESSING ........................................................................................................ 10
b. Data Collection ........................................................................................................................... 10
c. Data Preparation ........................................................................................................................ 10
d. Data Input ................................................................................................................................... 10
e. Processing ................................................................................................................................... 10
f. Data Output/Interpretation....................................................................................................... 10
g. Data Storage ............................................................................................................................... 10
CLOUD COMPUTING ................................................................................................................................... 11
DEFINITION ............................................................................................................................................ 11
BRIEF HISTORY ........................................................................................................................................ 11
ENABLING TECHNOLOGIES ..................................................................................................................... 11
Web technology ................................................................................................................................. 11
Data center technology ...................................................................................................................... 11
Service Technology ............................................................................................................................. 11
What Comprises Cloud Computing? .................................................................................................. 11
Service Models ................................................................................................................................... 12
Deployment Models .......................................................................................................................... 12
Cloud Platform As A Service (Paas) ............................................................................................... 12
Cloud Infrastructure As A Service (Iaas) ....................................................................................... 12
ADVANTAGES OF CLOUD COMPUTING .................................................................................... 12
ADVANTAGES..................................................................................................................................... 12
Cost Savings....................................................................................................................................... 12
Manageability .................................................................................................................................... 12
Reliability ........................................................................................................................................... 12
DISADVANTAGES .................................................................................................................................... 13
Downtime ........................................................................................................................................... 13
Security ............................................................................................................................................... 13
Limited Control ................................................................................................................................... 13
E-COMMERCE ............................................................................................................................................. 14
CLASSIFICATION OF E-COMMERCE ................................................................................................ 14
TYPES OF GOODS ............................................................................................................................ 14
NATURE OF PARTICIPANTS ............................................................................................................ 14
a. Business to consumer (b2c). ...................................................................................................... 15
b. Business to business (b2b). ........................................................................................................ 15
c. Consumer to business (c2b). ...................................................................................................... 15
d. Consumer to consumer (c2c). .................................................................................................... 15
QUESTION ONE
DISCUSS FILE SYSTEM & FILE CONCEPT
FILE CONCEPT
(padakuu, 2019) padakuu article states A file is a named collection of related information that is
recorded on secondary storage. Data cannot be written on a secondary storage unless they are
within a file, data can be either numeric, alphabet, alphanumeric, or binary. Files can be free
form, such as text files, or may be formatted rigidly. In general, a file is a sequence of bits, bytes,
lines or records. Many difference types of information may be store in a file-source program,
object grams, executable programs, numeric data, payroll etc.
File system is defined as a method of storing and organizing flies and the data they contain to
make it easy to find and access them. Digital file systems and file are named for and modeled
after paper based filling system using logic-based method of retrieving documents.
(Ed, 2019) As can be seen on RESEARCH STORAGE Ed Hannan as while previously referring
to physical, paper files, the term file system was used to refer to digital files in the early 1961s
and by 1964 it was generally used to refer to computerized file system. To date now the term has
evolved to refer to the hardware used for nonvolatile storage, the software application that
controls the hardware an architecture of both hardware and software.
(fisher.T, 2019) According to Fisher.t ” In a computer, file system is the way in which files are
named and where they are placed logically for storage and retrieval. He further goes on and
describes file system as they can be thought of as an index or data base containing the physical
location of every piece of data on the hard drive or another storage device.”
Without a file system stored, stored information wouldn’t be isolated into individual files and
would be difficulty to identify and retrieve. As data capacities increase, the organization and
accessibility of individual files are becoming even more important in data storage. The data is
usually organized in folders called directories, which can contain other folders and files. Any
place that s computer or other electronic device stores data is employing the use of some type of
file system
File systems can differ between operating systems (OS), such as Microsoft Windows, MacOS
and Linux-based systems. Some file systems include distributed file systems disk-based file
systems.
a. Naming Convention
FAT file system used by Micro Soft-DOS provides file name of only 8 characters along.
FAT file system used by Windows 2000 support long file name. The full path of file including
filename can be up to 255 characters long.
File names should begin with the alphanumeric characters
File names can contain spaces and multiple periods the characters after the last period are treated
as file extension
File name can contain any character except “/ [] = , ^ ? a””
b. Security
FAT does not support local and folder security. Security. A user logged on a computer locally
has access to the files folder in FAT partitions of the computer.
Features FAT32 increases the number of bits used to address cluster. A cluster is a set of
sectors. It reduces the size of each cluster. It supports larger disk up to 2TB are better storage
efficiency.
Access Speed
FAT32 provides good file access in partition sizes less than 500 MB or greater than 2GB. It
provides better disk space utilization.
Features
Naming Conventions
File names can be up to 255 characters.
File names can contain most characters except “/<>*|:
Security
NTFS provide the file and folder security. Files and folders are safer than FAT. Security is
maintained by assigning NTFS permissions to files and folders. Security id=s maintained at the
local level and the network level. The permission can be assigned to individual files and folders.
Each file or folder in this file system has an access list. It contains the user and group security
(SID) and the privileges granted to them
High Reliability
NTFS is highly reliable because of the recoverable file system and the automated transaction
logs used to update file and folders. The system also has great amount of fault tolerance. This
means that if transaction fails due to power or system failure, the logged transactions are used to
recover the data.
File Compression
NTFS provides file compression of as much as 50%.
PARTITION SIZE the NTFS partition file sizes are much bigger than FAT partitions and files.
The maximum size of an NTFS partition or file can be 16 Exabyte. But has a practical limitation
of two terabytes. This size can range from 4GB to 64GB.
QUESTION TWO
DATA PROCESSING AND DATA REPRESENTATION
DATA REPRESENTATION
(weebly, 2017)Data refers to information presented in whatever form is agreed upon by the
parties creating and using the data.
Weebly (2017) describes Data Representation as “methods used to represent information stored
in a computer. Information today comes in different forms such as text, numbers, images, audio,
and video. Computers can’t understand letters (or base 10 numbers) so any letter typed into a
computer need to converted into binary code this is usually done using the ASCII (American
Standard Code for Information Interchange. Below are some data representation categories.
(Forouzan, et al., 2007)
NUMBERS
Numbers are represented by bit patterns. However, a code such as ASCII is not used to represent
numbers; the number is directly converted to a binary number to simplify mathematical
operations.
IMAGE
Images are also represented by bit patterns. In its simplest form, an image is composed of a
matrix of pixels (picture elements), where each pixel is a small dot. The size of the pixel depends
on the resolution. For example, an image can be divided into 1000 pixels or 10,000 pixels. In the
second case, there is a better representation of the image (better resolution), but more memory is
needed to store the image. After an image is divided into pixels, each pixel is assigned a bit
pattern. The size and the value of the pattern depend on the image. For an image made of only
black and-white dots (e.g., a chessboard), a 1-bit pattern is enough to represent a pixel. If an
image is not made of pure white and pure black pixels, you can increase the size of the bit pattern
to include gray scale. For example, to show four levels of gray scale, you can use 2-bit patterns.
A black pixel can be represented by 00, a dark gray pixel by 01, a light gray pixel by 10, and a
white pixel by 11. There are several methods to represent color images. One method is called
RGB, so called because each color is made of a combination of three primary colors: red, green,
and blue. The intensity of each color is measured, and a bit pattern is assigned to it. Another
method is called YCM, in which a color is made of a combination of three other primary colors:
yellow, cyan, and magenta.
TEXT
In data communications, text is represented as a bit pattern, a sequence of bits (0s or 1s).
Different sets of bit patterns have been designed to represent text symbols. Each set is called a
code, and the process of representing symbols is called coding. Today, the prevalent coding
system is called Unicode, which uses 32 bits to represent a symbol or character used in any
language in the world. The American Standard Code for Information Interchange (ASCII),
developed some decades ago in the United States, now constitutes the first 127 characters in
Unicode and is also referred to as Basic Latin. Appendix A includes part of the Unicode.
AUDIO
Audio refers to the recording or broadcasting of sound or music. Audio is by nature different
from text, numbers, or images. It is continuous, not discrete. Even when we use a microphone to
change voice or music to an electric signal, we create a continuous signal. In Chapters 4 and 5,
we learn how to change sound or music to a digital or an analog signal.
VIDEO
a. Video Refers To The Recording Or Broadcasting Of Picture Or Movie. Video
Can Either Be Produced as a continuous entity (e.g., by a TV camera), or it can be a
combination of images, each a discrete entity, arranged to convey the idea of motion.
Again we can change video to a digital or an analog signal,
DATA PROCESSING
(Talend, 2017) This is the collecting and translating of data into usable
information. Data processing should be handled carefully in order not to negatively
affect the end product or data output.
c. Data Preparation
After the data is collected, it is enters the data preparation stage often referred as “pre-
processing” in this stage raw data is cleaned and organized for the following
stage. This raw data is diligently checked for any errors. This step ensures bad
data (redundant, incomplete, or incorrect data) is eliminated then begins to create
high-quality data for the best business intelligence.
d. Data Input
The clean data is enter into its destination and translated into a language than it can
understand data input is the first stage in which raw data begins to take form of usable
information
e. Processing
Data inputted into the computer is actually processed for interpretation. Processing is
done using machine learning algorithms.
f. Data Output/Interpretation
At this stage data is finally usable. It is translated, ridable and often in form of video,
images, text etc.
g. Data Storage
At this final stage, data is stored for future use, while some information may be out to use
immediately. It is important to store data properly as this enables quick and easy
accessibility when need later in future.
QUESTION THREE
CLOUD COMPUTING
DEFINITION
(E.Thomas, 2003)
(Cloud computing by Thomas Erl) 2003. defines cloud computing as “a type of computing in
which scalable and elastic IT-enable capabilities are delivered as service to external customer
using internet.”
Thomas Erl goes on to define cloud computing as “a specialized form of distributed computing
that introduces utilization models for remotely provisions scalable and measured resources.”
BRIEF HISTORY
(Cloud computing by Thomas Erl) 2003. “the idea of cloud computing traces back to the origin
of utility computing, a concept that the computer scientist McCarthy publicly proposed in 1961.
“If the computer of their kind I have advocate become the computer of the future, then
computing may someday be organized as a public utility just as telephone system is a public
utility…”
As the general public taking advantage of Internet-based computer utilities since the mid-1990s
through various incarnation search engines (Google, Yahoo!), email services (Hot mail, Gmail)
and so on. These services popularized and validates core concepts that form the basis of modern-
day cloud computing.
ENABLING TECHNOLOGIES
Some areas of technologies that have greatly contributed to the modern-day cloud based
platforms can be seen in chapter 5 of the same book. Are
Web technology
Data center technology
Service Technology
Only to mention a few of these clouding-enabling technology existed in some form prior to the
formal advent of cloud computing.
Service Models
Deployment Models
The service models comprise; cloud software as a service (SaaS), cloud platform as a service
(PaaS) and cloud infrastructure as a service (IaaS).
ADVANTAGES
Cost Savings
Being the most significant benefit of cloud computing. Business of all sizes exists to earn money
while keeping capital and operational expenses to a minimum. With cloud computing you can
save huge cost with zero in-house server storage and application requirements. This lack of
premises infrastructure removes many operation cost such as power, air conditioning and
administration cost. You pay for what is used an disengage whenever you like it also comes with
capital requirements this makes it extremely affordable even for smaller businesses
Manageability
It provides enhanced and administration management and maintenance capability through
centralized administration
Reliability
Cloud computing is much reliable than in-house infrastructure if servers fails, hosted
applications and services can easily be transited to any available servers as a business benefit
from massive pool of redundant resources.
DISADVANTAGES
Downtime
As cloud services providers take care of a number of clients each day, they can become
overwhelmed and may even come up against technical outages which lead to business being
temporally suspended. In addition if your internet connection is offline you will not be able to
access any of your application, servers or data from cloud.
Security
Regardless of providers implementing the best security standards and industry certifications, this
serves an open risk as important data and files are stored on external service providers, Hence no
confidentiality your business resources. For instance, in a multi-tenant cloud architecture where
multiple user are hosted o the same server, a hacker might try to break into the data of the other
users hosted and stored on the same server.
Limited Control
Since the cloud infrastructure is entirely owned, managed and monitored by the service provider,
it transfers minimum control over to the customer. The customer can only control and manage
the applications, data and services operated on top of that on the infrastructure itself.
QUESTION FOUR
E-COMMERCE
Rolf T. Wigand of university of Arkansas at Little Rock published in the articles (The
information Society) March 1997 writes about Electronic commerce and says “Electronic
Commerce refers to any economic activities that are conducted through electronic connections”
The first E-Commerce can be traced back in 1969 when the internet was first installed which
involved a network of four computers and was called the ARPANET in U.S.
In today’s world we look at E-Commerce revenue income making transaction made
electronically, an example of some of the companies that are specialized in E-Commerce are
Amazon(www.amazon.com) ,eBay (www.ebay.com), cisco (www.cisco.com) only to mention a
few.
CLASSIFICATION OF E-COMMERCE
Khurana. A (2019). Understanding the Different Type of e-Commerce Businesses.
[Online].2017. Available from: www.thebalancesmb.com/ecommerce [Accessed on
17/05/2019].
Khurana. A 2019 this classification can be done by parameters on the types of Goods being sold
and the nature of the participants.
TYPES OF GOODS
This type of classification is important because it gives the analyst an insight into the business
model and the financial model of the enterprise. In case of airline tickets, issues such as
availability, the location of seats, meal preference and refundable purveyors of digital goods can
only operate online. While those who sale physical goods can take online orders and process
online transactions but they must have a physical delivery system in place to transfer their
products to the buyers. These are closely related to the mail-order business of old.
NATURE OF PARTICIPANTS
Three most common participants are Business, Administration, and customer. The six primary
types are:
b. Chabot
This will be the future of customer service and will aid task automation. Chabot’s will be
powered by AI and designated for specific task such as voice-enabled orders. This will further
reduce the possibility to errors and give the consumer a satisfying shopping experience.
Above all there come disadvantages and advantages of E-Commerce.
(Gareth.R.T.White, 2017) From the Research gate.
ADVANTAGES DISADVANTAGES
It aids business development in Internal perception of security and reliability
developing countries
It helps reduce cost of business operation External and internal data integrity and protection
Minimizes issues associated with logistics External infrastructure: power supply security, internet,
funding
Reduces the cost of production
Easy online comparisons
Support economic development
References
byte-notes, 2019. byte-notes. [Online]
Available at: https://byte-notes.notes.com/types-of-file-systems/
[Accessed 16 05 2019].
Forouzan, B. A., College, D. & Fegan, S. C., 2007. data processing. In: R. Olson, ed. Data Communication
And Networking 4th Ed.. Forouzan. B (2007). Data processing and data representation . 4th Ed. Data
Com. And Networking chapter 1.1 Page 5 ed. new york: McGraw-Hill, p. 5.