...Week 2 File Management Paper POS/355 Joey Turner JR Professor Alicia Pearlman Most UNIX systems that you will come across are usually based on the control scheme of file access associate with early versions of the UNIX system. In UNIX, every individual user is assigned their own unique user ID that they may use to access files saved in memory. Users are identified by being a part of a private group or various groups which can be identified then by their group ID. When a file is created in LINUS it is identified as being owned by a particular user and marked with the user that created the file’s user id. The file also belongs to whatever group the user is associated with as well or else the group of its parent directory but only if that parent directory has SetGID permission configured. SetGID (SetGIUD) are access rights flags that allow users to run executable (.exe) files with the permission of user ids or group id. Protection bits in sets of twelve are associated with each file as well. The owner ID, group ID, and protection bits are part of the file’s index node-which are a data-structure used to represent a file-system object which can be a file or file directory. There are 9 of the 12 protection bits that are advocated to the user and group ids owners of the files which control reading, writing, and execute permissions. These nine protection bits then form a system of hierarchy of user id, group id, and all others. The hierarchy is also coupled with the...
Words: 884 - Pages: 4
...NAME: David Sauerbrei POS355 Week 5 Final Exam This is an open-book, open-notes exam. You may consult the textbook, lectures and PowerPoint slides, but no other source. This exam must be an individual effort. Each question is worth one-half point. The total point value of this exam is 20 points. Please post your completed exam in the Assignments area by 11:59 p.m. Monday, May 14. 1. The operating system serves as an intermediary between the user and the computer hardware. (True / False) ANSWER: True 2. The operating system serves as an intermediary between a process and the computer hardware. (True / False) ANSWER: False 3. This is the brain of a computer. a. smart card b. artificial intelligence c. logical address d. read-only memory e. central processing unit ANSWER: e 4. When a single user runs two copies of the same program concurrently (for example, two instances of NotePad), two processes are created. (True / False) ANSWER: True 5. The following operating systems were developed by Microsoft: a. Mac OS b. Linux c. Solaris d. all of the above e. b and c only f. none of the above ANSWER: f 6. A _______________ operating system supports a system that has rigid time requirements on the CPU and data flows. ANSWER: Real-time 7. Time-sharing requires the following. a. process scheduling b. process protection c. deadlock...
Words: 1596 - Pages: 7