PART II
Ans. 5(a)
The Difference between my computer and windows explorer is that my computer is an icon and can be created any where in the computer system. Windows Explorer is a menu which can not be converted into computer icon and it can only be accessed by right clicking on my computer icon or through the start button.
Whenever you open my computer it contains all the partitions of your hard disk, such as A: etc. Opposite to this when you explore the window explorer it contains all the partition of computer hard disk and the entire folders that contain all the files in that particular folder. Such as C: / all programs / yahoo messenger / yahoo / icons.exe. Windows explorer gives views of the folders and sub folders into one single window. In my computer all the folder and subfolder can be accessed through a step-by-step window opening process.
My computer is a single window whereas windows explorer is divided into two panes one on the left side an the other on the right. Left pane contains the drives in the form of a hiearachy and their folders and sub folders, whereas the right pane represents the closer view of files.
Ans. 5(b)
Disk Fragmentation: Disk fragmentation is an unfortunate problem with today’s mass storage mediums, which occurs as a result of the inability of storage media to repidly copy or move data relative to writing, or store data with precise granularity. The following section of this article discusses disk fragmentation in a general sense, as well as the types of file fragmentation that can occur on a file system.
Causes of disk fragmentation: Disk fragmentation, in all cases, is caused by one of two things. The first (and most degenerative to performance) is the inability of the storage medium to provide contiguous storage at that point in time as opposed to fragmented storage. This inability causes two types of disk fragmentation, external and data fragmentation. The other cause of fragmentation occurs when the file system is unable to store data with fine enough granularity such that all space is utilized. This type of disk fragmentation is less degenerative to performance, but instead results in wasted space.
Types of disk fragmentation:
External fragmentation: External fragmentation occurs to the free space on the hard drive, after data has been removed. Ideally, free space would be kept contiguously, so that data can be written to the medium contiguously and without fragmentation. However, if segments of data are removed at arbitrary places along the storage medium, then the free space is automatically fragmented. Ideally, a storage medium would be able to shouffle files into that free space and reallocate the free space back to a “heap” of it, however this is time consuming. This can be seen in defragmentation software. This can be seen in defragmentation software, which utilize significant amounts of time to defragment heavily fragmented disks.
Data fragmentation: Data fragmentation occurs due to external fragmentation. If a storage medium has enough free space to store data, but the drive is externally fragmented, this means that the data may be fragmented well. This is unfortunate also in that many of the caveats shared by external fragmentation are shared by data fragmentation, primarily that to prevent it’ in real-time is debilitating to performance more so than the fragmentation, and the correction of it is very time consuming.
Internal fragmentation: Internal fragmentation occurs as a failure of the file system to store the file with enough precise enough a granularity such that all available free space is utilized. This occurs because reduced granularity allows for increased performance or simplicity when implementing the file system. Internal fragmentation on most computer systems is not usually considered a problem, because optimizing it invokes only small performances benefits, and involves modifying the file system, which can lead to host of compatibility issues,
Ans. 5(c)
(i) DELTREE : Deletes a directory and all the subdirectories and files in it.
To delete one or more files and directories: DELTREE [/Y] drive:]path [[drive:]path[…]]]
| /Y Supresses promting to confirm you want to delete the subdirectory. |
| [drive:]path] Specifies the name of the directory you want to delete. |
| (ii) RMDIR: Removes empty directories in MS-DOS. RMDIR [/S] [/Q] [drive:] path RD [/S] [S] [/Q] [drive:] path |
| /S Removes all directories and files in the specified directory in addition to the directory |
| /Q Quiet mode, do not ask if ok to remove a directory tree with /S. |
(iii) VER: Display what version of MS-DOS Or Windows command prompt you’re using. Below is an example of what this may look like.
Open source software: OSS can be defined as computer software for which the human-readable source code is made available under a copyright license (or arrangement such as the public domain) that meets the Open Source Definition. This permits users to use, change, and improve the software and to redistribute it in modified or unmodified form. It is very often developed in a public, collaborative manner.
The main advantage for business is that open source is a good way for business to achieve greater penetration of the market. Companies that offer open source software are able to establish an industry standard and thus, gain competitive advantage. It has also helped build developer loyalty as developers feel empowered and have a sense of ownership of the end product. Moreover less costs of marketing and logistical services are needed for OSS. It also helps companies to keep abreast of all technology develpments. It is a good tool to promote a companies’ image, including its commercial products. The OSS development approach has helped produce reliable, high quality software quickly and inexpensively. Besides, it offers the protential for a more flexible technology and quicker innovation. It is said to be more reliable since it typically has thousands of independent programmers testing and fixing bugs of the software. It is flexible because modular systems allow programmers to build custom interfaces, or add new abilities to it and it is innovative since open source programs are the product of collaboration among a large number of different programmers. The mix of divergent perspectives, corporate objectives, and personal goals speeds up innovation. Moreover free software can be developed in accord with purely technical requirements. It does not require to think about commercial pressure that often degrades the quality of the software Commercial pressures make traditional software developers pay more attention to customers requirements than to security requirements since such Features are somewhat invisible to the customer.
It is sometimes said that the open source development process may not be well defined and the stage in the documentation may be ignored. However this is only true for small (mostly single programmer) projects. Larger, successful projects do define and enforce at least some rules as they need them to make the teamwork possible. In the most complex projects these rules may be as strict as reviewing even minor change by two independent developers.
Not all OSS initiatives have been successful, for example, Source X Change and Eazel. Software experts and researchers who are not convinced by open source’s ability to produce quality systems identify the unclear process, the late defect discovery and the lack of any empirical evidence as are most important problems (collected data concerning productivity and quality). Sound business model around the open source paradigm. Conscquently, only technical requirements may be satisfied and not the ones of the market. In terms of security, open source may allow hackers to know about the weaknesses or loopholes of the software more easily than closed-source software. It is depended of control mechanisms in order to create effective performance of autonomous agents who participate in virtual organizations.

