Describe the access control methods and explain the advantages and disadvantages of each method.
Explain the differences between dedicated, shared, and virtual devices.
Explain which of these access control methods you would select for a highly secure system with several files and several users. Provide justification for your choice.
Explain how blocking and buffering can improve I/O performance.