Additionally, risks associated with outage or lock-in of a single CSP are reduced. This provides a high level of availability and reliability for the service. Observation_2: CSUs can use different types of devices, for example, a laptop or a mobile device to access the storage service. A CSP uses notification servers to synchronise the CSUs’ files between the devices. Observation_3: As seen in the model, each CSP uses a database server to store and manage metadata.
Folders can contain files. It is important to give files and folders sensible names so we know what it is about. This is very good as it enables us to keep track of all our work. These images shows the number of folders you can have inside, by having these folders it keeps track and organises your folder. Device Drivers A device driver is a group of software files which enables one or more hardware devices to communicate with the computer’s operating system.
Some of the kernel’s tasks are resource allocation, process management, memory management, input/output device management, and security management. It basically mediates access to system resources. The kernel is the vital center of a computer operating system. The service layer acts as a source to resources for application programs such as folder manipulation, input/output device access, starting/stopping programs, and creating, moving, and resizing GUI windows.
Nowadays, technology is changing rapidly around the world. Technology is also making a simple matter of difficulty. For example, in the management of their own records. Records management repositories, archives or organization, there are a number of difficulties to manage it in a better way. But, nowadays, electronic records have been created and used to manage it in a good way.
The native audit trails are extracted on a regular basis and transferred to a designated security system where the database administrators do/should not have access. This ensures a certain level of segregation of duties that may provide evidence the native audit trails were not modified by authenticated administrators, and should be conducted by a security-oriented senior DBA group with read rights into production. Turning on native impacts the performance of the server. Generally, the native audit trails of databases do not provide sufficient controls to enforce separation of duties; therefore, the network and/or kernel module level host based monitoring capabilities provides a higher degree of confidence for forensics and preservation of
- The database also contains data fields which labels each file within the database allowing you to understand which data is contained in which file. - It also consists of records which allow you to retrieve data about a particular individual in the database. Advantages: - You don’t need to change multiple records as the files in the database are relationally linked to each other. This also makes it simple to edit and update as the data within each record will automatically be changed as you change one record. - Reduces the risk of human error or duplication meaning that you don’t have to worry of about the risk records not being showed up.
Data security: In a relational database management system the data access is privileged which means that the database administrator has the authority of giving access of data to some particular users which makes the data secure. 3. Easy to use: This type of database uses tables which is better and easy to create and use. Disadvantages of RDBMS: 1. Slow: As compared to other databases this database has a slow extraction of results thus making it a slower database.
object relational database management system. It has the data security and less data physical storage but because of the use of both databases the object relational database becomes complex. But it gives many features and user friendly usage to its users and therefore it is more preferable. However it becomes complex for the database developers. Other than these three databases there is XML database which is written in the most easiest and flexible language which is self-describing so the developers prefer using it.
Automatic memory management Automatic memory management is a service, either as a part of the language or as an extension, that automatically recycles memory that a program would not otherwise use again. Automatic memory managers (often known as garbage collectors, or simply collectors) usually do their job by recycling blocks that are unreachable from the program variables (that is, blocks that cannot be reached by following pointers). The disadvantages of automatic memory management are: • memory may be retained because it is reachable, but won’t be used
And this is time consuming as LINQ are required to process the whole query and thus the performance is reduced. Another disadvantages of LINQ is that there is an impact to the performance whenever there is presence of complex queries as LINQ needed to process the whole queries in order to run. Therefore, it will be very ineffective of using LINQ when the queries are very complex. Last but not least, another disadvantage is that by using LINQ, we have no good way for viewing permission. As most of the LINQ method are applying static into it, so we cannot really look into the permission of the method.