...File Management POS/355 05/13/2013 John Buono File Management The file managers function is to regulate all of the files on a system that is stored on the storage mediums. There are several tasks that the file manager must perform in order to manage these files. The file manager must be able to identify the unique naming conventions of the files in order to complete its tasks. The file manager must also be able to determine the location of the files, the sectors that make up the file on the storage medium, and the order of those sector that make up the file. It is important that the file manager work with the device manager and use effective algorithms for the read and write of files. The file manager also gives or denies access to files by users or programs. The file manager also is in cooperation with the process manager to allocate or de-allocate files to the processor. The last task is that the file manager provides easy commands that assist users and/or programs in file handling (Gallert, 2000) . Unix/Linux File Management UNIX/Linux uses the distinction of inodes to refer to files or segments of files on the system and uses pointers to indicate where the files are on the storage media. There are some slight differences between each version of Unix/Linux but we will not go into those differences in this paper and will only cover the basics of file management. No matter what version of Unix/Linux is being used the file structure and permissions do seem to be...
Words: 2096 - Pages: 9
...File Management Comparison for Operating Systems All computers and their subsequent operating systems use a means of digitally storing data within a file onto an allotted section of some type of storage media. The allotted section of storage can theoretically be read from, and written to as required. The data in the file is stored as bytes of binary code, and can be identified as belonging to a particular file by the file’s start or “address”. Though the storage section is linear in nature, it can be visualized as a cross grid of cells, with each cell containing one byte of data. The combined cells of data populate the allotted section of storage within a file. At this point, operating systems diverge from this commonality, particularly in the way the operating systems manage files through their respective “file management” programs. The following is a cursory look at three such operating system’s file management schemes. Mac OS file system Mac OS uses what is called the Hierarchical File System (plus). It comes from the original version of the Hierarchical File System (HFS), which comes from the Macintosh File System (MFS), used with older Mac systems. The HFS concept begins with a sole directory on a storage media (in this case a hard drive or hard disk). From this directory, sub-directories are created, and so on, down to the user and user access files. This is the most simplistic of file management system concepts, in theory. Mac OS is also proprietary. Linux...
Words: 829 - Pages: 4
...In this pack of POS 355 Entire Course you will find the next docs: POS-355 Week 1 DQ 1.doc POS-355 Week 1 DQ 2.doc POS-355 Week 1 Lectures Lecture 1.1 Computer Basics.doc POS-355 Week 1 Lectures Lecture 1.2 OS Basics.doc POS-355 Week 2 Assignments Individual Real-time Operating System.doc POS-355 Week 2 DQ 1.doc POS-355 Week 2 DQ 2.doc POS-355 Week 3 Assignments Individual IND.doc POS-355 Week 3 DQ 1.doc POS-355 Week 3 DQ 2.doc POS-355 Week 4 Assignments Individual IND.doc POS-355 Week 4 DQ 1.doc POS-355 Week 4 DQ 2.doc POS-355 Week 5 DQ 1.doc POS-355 Week 5 DQ 2.doc General Questions - General General Questions POS 355 Week 1 Individual Assignment Memory Management Paper For this assignment, you will choose one the following options: · Option 1: Write a 2-page paper that explains memory management requirements. · Option 2: Write a 2-page paper that explains the differences in memory management between Windows® and Linux®. Format your paper consistent with APA guidelines. UNIX/Linux Versus Mac Versus Windows Write an 8- to 10-page paper that compares and contrasts the basic system differences between UNIX®/Linux®, Mac®, and Microsoft ® Windows® operating systems. Include discussion and comparison of the following: · Memory management · Process management · File management · Security Format your paper consistent with APA guidelines....
Words: 367 - Pages: 2
...This work of POS 355 Week 2 Discussion Question 1 contains: Discuss something in week 2's textbook reading that you found interesting and/or which resonated with you. General Questions - General General Questions POS 355 Week 1 Individual Assignment Memory Management Paper For this assignment, you will choose one the following options: · Option 1: Write a 2-page paper that explains memory management requirements. · Option 2: Write a 2-page paper that explains the differences in memory management between Windows® and Linux®. Format your paper consistent with APA guidelines. UNIX/Linux Versus Mac Versus Windows Write an 8- to 10-page paper that compares and contrasts the basic system differences between UNIX®/Linux®, Mac®, and Microsoft ® Windows® operating systems. Include discussion and comparison of the following: · Memory management · Process management · File management · Security Format your paper consistent with APA guidelines. Create a 10- to 12-slide Microsoft® PowerPoint® presentation based on the paper. Discussion Question Main Memory Should DMA access to main memory be given higher priority than processor access to main memory? What is the purpose and technique of DMA logic? Note: Be prepared to discuss in class. Do not submit a written response. POS 355 Week 2 Individual Assignment File Management Paper For this assignment, you will choose one of...
Words: 355 - Pages: 2
...UNIX Protection Scheme Cedric Lee POS/355 Scott Stewart March 25, 2013 UNIX Protection Scheme There is an operation system that supports 5,000 users, and the company only wants to allow 4,990 users permission to access one file. In order to have a protection scheme in UNIX, a number of operations need to be performed first in order for this to work. UNIX file management hierarchy is very essential to know in order to understand and devise a plan that will allow this protection scheme to protect the files. Without knowledge of the hierarchy of the file management system within the UNIX operating system, there is no way that the 4,990 will have access to only one file. A file access control scheme will be the design of UNIX operating system. Therefore, user ids and passwords are needed in order to gain access to the system. All users of the UNIX operating system will each be given a user id and a user password. These user ids and passwords will be kept by the assigned users only. The protection of these ids and passwords depend on how well the user protects them. Encryptions and decryptions can also be used when the users are attempting to login. The administrator can put each user into different groups that allow access or deny access to certain files within the operating system. By doing this, there can be control on who can access what file due to the permission given to them by the administrator. The administrator is referred to as the super user because...
Words: 385 - Pages: 2
...Learning Team Outline POS 355, Outline of the UNIX/Linux Versus Mac versus Windows Paper I. Memory management a. UNIX®/Linux® i. Memory ii. Memory Management iii. Aging iv. Life Cycle b. Mac® v. Organization of memory vi. System Heap vii. System Global Variables viii. Temporary Memory ix. Pointers x. Invalid Handlers xi. Low-Memory Conditions xii. Virtual Memory c. Microsoft® Windows® Operating systems xiii. Paging in x86 processor xiv. Page Management xv. Memory Protection xvi. Logical Memory Layout II. Process management d. UNIX®/Linux® xvii. Process management within the UNIX OS is based of command prompts via Linux Terminal. xviii. Top ten commands that are helpful in process management * Top * Htop * Ps * Pstree * Kill * Pgrep * Pkill & killall * Renice * Xkill e. Mac® xix. Activity Monitor: process manager within the Mac OS. xx. User interaction and efficiency how does Activity Manager help. f. Microsoft® Windows® Operating systems xxi. Task Manager xxii. User interaction and efficiency how does Task Manager help and or is less effective than Activity Manager. III. File management xxiii. Compare and contrast how file management operates respectively...
Words: 307 - Pages: 2
...File Management (Option 1) POS 355 July 29, 2015 Peng File Management (Option 1) Access Rights is an accommodating tool that can be used to allow users on a network to file share (Stallings, 2015, p. 541). In most systems, users and groups of users have a certain granted access to files. There are many different access rights that can be assigned and are assigned based on the level of the user. Specifying which users can access one file in a system being supported by 5,000 users can be done by creating an access control list with the names of the 4,990 users who need access. Another way to allow the 4,990 users to access the files would be to put them all in one group and set the group access level accordingly. An access control list specifies which users are granted or denied access to certain files, and can be granted to individual users, or groups (Stallings, 2015, p. 525). In most multiuser systems, access control is enforced, and only certain users are allowed access and to perform certain actions on certain files. Access control information may include the owner, access information, and permitted actions. The owner is the individual who has control over the file, and who can grant or deny access to other users. Access information includes each of the user’s name and password. Some permitted actions that can be granted to users include reading, writing, executing, and transmission over a network (Stallings, 2015, p. 537). The owner of the file can grant all of these...
Words: 403 - Pages: 2
...Differences Between memory management Between Windows and Linux Gerard T Doris POS/355 03-21-14 New Orleans Differences Between memory management Between Windows and Linux In this paper I will discuss the difference between Windows and Linux memory management. Many business and homes use windows and Linux operating systems to conduct everyday duties. Most consumers never heard of Linux. Linux operating systems is not known for the flashness that Windows have. In my opinion if you want a stable system that you are not looking to do photo, video editing or things in that nature I would use Linux. Both operating systems use Ram and memory storage to help execute the functions of the computer. Windows uses a file system called New Technology File System ( NTFS). NTFS is a stable file system that Windows uses. It replaced the old FAT32 file system. According to Microsoft 2014 The capability to recover from some disk-related errors automatically, which FAT32 can not. Improved support for larger hard disks. Better security because you can use permissions and encryption to restrict access to specific files to approved users. The only thing I have a problem with, is have to defragment the OS. The reason you have to defrag is because NTFS tends to put files in random places. Windows management system is called Pagefile. Pagefile take objects that are less frequently used and put them in a allocated location on the hard drive. This frees up RAM and allows the computer...
Words: 442 - Pages: 2
...File Management Duane Borchick POS/355 December 24, 2012 Paul Rouk File Management Considering a system that is to support 5000 users, but is only to allow 4990 of the users to have access to one file can be accomplished in a variety of different ways. There are two different options of how to complete this task that will be discussed in this paper. The first and most popular way to accomplish this task is to have an access control list made up with the names of all 4990 user on it. With this list in place the system can access the list and find if the user is allowed to have access to the file. A second way to accomplish this for the 4990 users is to place all those uses in a specific group and then set a group access to the group and file. This way all those in the group are granted access to the file and there is not a chance of an unauthorized user gaining access. The file is linked to the specific group and only those in the group are allowed to access it. The paper will also look at another way to protect the system. It will identify a protection scheme that can be used efficiently than what is provided by the UNIX. First look at the Access Control Lists, which there are two different types, ACLs and default ACLs. With an access ACL it is a list for a specific file or directory. A default ACL can only be associated with directory. With a file that is in the directory and does not have a access ACL it will use the rule of a default ACL for the directory. There...
Words: 558 - Pages: 3
...Paper 1 POS/355 Option 2: The Differences in Memory Management between Windows® and Linux®. Linux and Windows are both operating systems for the common home PC. Each of them offers positive benefits and negative detriments. Some people try to claim that one is better than the other. But as an active user of Linux for over half a decade, I can honestly say that both are superior in their respective strengths. I would never attempt to do any type of visual work like video editing or photo editing that requires anything in depth on a Linux machine. The native programs are just not as good as anything that Adobe offers in the Windows world. However if I am surfing the net checking out random sites that might be questionable in nature, I would not dare so unless I was on my Linux partition. In reference to memory managements differences between Windows and Linux; We have to first start with the base. Memory can be viewed in both a RAM basis and memory as in storage and a base for operating system. Windows has been locked into a dated filesystem for the basis of their operating system. This file system is called NTFS. NTFS positive is that it is old and stable. Its positives are know and it’s negatives are so well know that they come as no surprise to end users. Sadly this outdated file system technology requires the end user to periodically defragment the operating system to combat NTFS’s gross lack of the ability to organize files. Over time NTFS moves files...
Words: 474 - Pages: 2
...File Management POS/355 Brandon Elizaldi Steven Kernan File Management File management and file systems are a core part of the user experience for most users. They provide many essential and necessary functions for the user as well as almost anyone else working with a computer system. They provide anything from long term existence to the ability to create and delete stored data. Some of the benefits to the user are long term existence, the ability to be shared between processes and structure. Long term existence is an important aspect because it can be stored and recalled in the future. Imagine being stuck in the days the original Nintendo for example. You could play a game and get deep into game play but if you didn’t have time to finish the game you had to start all over again. This was due to the fact that there was no file system built in due to the fact a storage device was not available for the system. This is one of the great things about current game systems that have file systems and storage capacity. Another benefit is the ability to share files between processes. This has streamlined new software creation because the program doesn’t have to be built as a standalone. This keeps programmers from having to reinvent the wheel every time they write a program making them cheaper and easier to write. This also saves disk space on the users system. The next benefit is structure which provides a hierarchy within a file system allowing for more complex structures...
Words: 705 - Pages: 3
...File Management Requirements Alan McKinney POS/355 May, 19 2014 Ellis Hodgdon This paper will discuss the protection that is within the UNIX operating system in regards to naming, file sharing and the importance of allowing permissions to users for accessing files. One topic in particular will be discussed in this paper and that will be the ability to allow access of one file to multiple end users while other users will be restricted from gaining access to the same file. Having the ability to control who has access and who doesn’t is very important to a company. The reason for this is that it allows a company to protect data from users who should not have access or data being released to the public from users that shouldn’t have access. This is important as this can ruin a company’s image. The following scenario will help to provide a way to maintain proper file management up to 4,990end users. When giving permissions to end users it is important to know who will need access and who does not, this could mean specific people or groups. Having an open access scheme for end users could mean loss of data, data being access and misused by those who are not knowledgeable or properly trained. The Unix file system provides sharing and protection of files by using a protection scheme that is made up of file, owner and group access rights (Silberschatz, Galvin, & Gagne, 2012, ). This means that the person that created or that has...
Words: 733 - Pages: 3
...File Management By: Amy Gonzales POS/355 File Management The data we work with on a computer is kept in a hierarchical file system, the way an operating system has there file management set up effects the user’s ability in accessing and using those folders. According to "Webopedia" (2015), "File management system is the system that an operating system or program uses to organize and keep track of files. For example, a hierarchical file system is one that uses directories to organize files into a tree structure.” If you have ever downloaded a software on your computer you may have noticed how you can find it in the C drive under Program files. The root of this file is the C:\ portion which then stems off into one folder after another to form a tree like structure. For businesses this can be a huge impact on them; without even realizing it they are impacted by the operating system file management they use from storage to security to network. The following paragraphs will say how UNIX file management is set up, along with how it would work in a large company, and also an alternative to the UNIX file management for a large company. First we will start off with how UNIX uses their file management system with another operating system such as Windows. Unlike Windows UNIX has a unique directory structure. In Windows the user will be seeing common file names such as Program File or Users, but in UNIX stuff like a particular application would be scattered into multiple folders....
Words: 836 - Pages: 4
...File Management Paper When dealing with the file management concept of computers and operating systems there are always multiple options and preferences that are available. One method of file storing is when an operating system detects the type of file; the type of program used to access it and saves it as such with pathways and locations filled out. A second method is to allow the pathways and file types to be set by the user, allowing for any program or file extension that is available to be used. A third method is for the operating system to not allow the saving of file type or file extensions, but to assign a specific code related to that operating system that allows it to determine the file type. These three methods all have their benefits and drawbacks referring to ease of access, ease of storage, and the structure of the file system. As each of these methods provides a specific purpose the use of one method over another will depend on how a computer filing system is designed and also how it is utilized by frequent and authorized users. In an operating system that detects the file type when it is being stored the system is recognizing what application is being used to access that file and saving it in storage under a file directory that will open the file with that type or certain program. For example if a user is accessing a text document and saves it, the operating system will detect the word processing application and save the file in a directory or pathway that will...
Words: 885 - Pages: 4
...File Management Nina N. Rountree POS 355 Terrence Carlson June 10, 2013 Operating systems that have numerous users with various security level clearances will require file protection. A UNIX operating system with 5,000 users could implement conventional UNIX file access controls if 4,990 of those users share the same level of security clearance. By means of a file access control structure on the UNIX operating system, each individual user is given a user ID (special user identification number). Users on a UNIX operating system will be allocated to a main class and possibly a variety of classes that will be associated with a unique class ID. Whenever a user creates a file, it is indicated by the individual’s unique user ID along with the user’s main class ID. Each individual user's accessibility is managed by the administrator with a file access control security type structure. The administrator can manage the permissions of all three main classes; read, write, and execute. Access is permitted to three types of users: the creator or owner of the file, the class the file belongs to, and various users with access to the system despite their class. The access control policy affects the level of access that is permitted by whom and under what conditions. Discretionary Access Control (DAC) manages permissions based on the requester’s identity and the regulations linked to access and permissions. Mandatory Access Control (MAC) manages permissions based on assessing protection...
Words: 526 - Pages: 3