File Management Essay

550 words - 3 pages

File Management
UNIX systems are based on the access control of files scheme which was introduced in the very early versions of UNIX. The way this works is that each UNIX user has an assigned unique user identification number which also puts this user ID into a primary group as well as other groups if the user ID needs it. These groups are identified, like the user’s ID, with a group ID. When a user creates a file, it is designated as owned solely by that user and marked with that user’s ID. This file can also be associated with a group with a unique group ID. This file is protected by a set of 12 protection bits. These bits along with the group and owner ID are part of the file’s index node or inode. This inode is a data structure that ...view middle of the document...

Whenever a file or program is set as owned by the superuser, the superuser potentially has unrestricted access to the system and to the users that are using the program.
This scheme is acceptable when file access requirements are the same with users and a large number of groups of users. In the example or the assignment where a company has 5,000 employees and the company wants to give access to a file to 4,990 employees, there would need to be at least two user groups. User group A would have access to this file while user group B would not have access to this file. This way the company would just have to add each user to the group instead of going in and granting access to each user. Now, if the company wanted to give access to another file to some of user group A, there would need to be another user group and the users that need access would be in both of these groups. UNIX allows many groups and many users in each group but UNIX does put a limit on the maximum number of groups the user may belong to. These groups are protected by a simple protection domain. The domain is related to a specific user ID in which changing the domain will change the user ID temporarily.
The UNIX protection scheme has a great way of creating and protecting files that have been created. It goes a lot further by granting superuser access to the creator of the file or program and can also grant access to specific users or groups of users. These users that have access can be given rights to just read or read, write and execute the program or file. This makes the protection of the file higher and more secure from being accidently deleted, changed or moved.

Stallings, W. (2012). Operating Systems: Internals and Design Principles (7th ed.). Upper Saddle River, NJ: Prentice Hall.

Other assignments on File Management


1619 words - 7 pages Module 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System Design and Implementation System Generation Common System Components Process Management Main Memory Management Secondary-Storage Management I/O System Management File Management Protection System Networking

Operating Systems In A Nutshell !

909 words - 4 pages commands. The resident commands are those commands the reside in memory in order to be accessed immediately. The nonresident commands, as you might expect, do not remain on memory and is loaded into memory as necessary. File management The OS also serves file management system. Because files are not always stored contiguously on the disk a file management system is needed in order to be able to keep track where files are stored on the disk

Production & Operation Management

1521 words - 7 pages the requested files were these “no hit” files requiring a search. Often these “no hit” files were eventually found stacked in the requester’s office. The primary “customers” of the file clerks were underwriters and claims attorneys. UNDERWRITING Company management and operations analysts were consistently told that the greatest problem in the company was the inability of file clerks to supply files in a speedy fashion. The entire company from top

Production & Operation Management

1445 words - 6 pages requested files were these “no hit” files requiring a search. Often these “no hit” files were eventually found stacked in the requester‟s office. The primary “customers” of the file clerks were underwriters and claims attorneys. Underwriting Company management and operations analysts were consistently told that the greatest problem in the company was the inability of file clerks to supply files in a speedy fashion. The entire company from top to bottom

Operating Systems Comparison Outline

700 words - 3 pages categories (CPU, System Memory, Disk Activity, Disk Usage, Network) IV. File Management a. Designed to manage files to reduce disk and hardware usage. 1. MAC OS uses user-friendly software b. Two different applications to manage files 1. Finder 2. Spotlight V. Security a. MAC OS is designed with technologies that work together to monitor, encrypt, and update 1. System security updates produced and transmitted frequently b. Gatekeeper

Unit 10 Final

1780 words - 8 pages Unit 10 Final Project IT 320 Justin Burse An operating system is the main management system which is loaded after the boot loader has finished. Its responsible has many core responsibilities which allows all the programs to work together as one system. In the layer structure on the right you can see it is the link between the core hardware and the applications that use these pieces of

U6 Rp 1

442 words - 2 pages What is an NAS devise? A Network Attached Storage device is file-level computer data storage connected to a computer network providing data access to a heterogeneous group of clients. NAS not only operates as a file server, but is specialized for this task either by its hardware, software, or configuration of those elements. NAS is often manufactured as a computer appliance – a specialized computer built from the ground up for storing and

Operating Systems

496 words - 2 pages LDW -Unit 1 Review Exercise 8 points each 1. Explain the difference between operating system software, application software, and utility software. • Operating system software is the programs that act as the central control program it is the gap between the system and the user. It acts as an intermediary between the applications and the hardware. Examples…..are task management, job management, memory management, and file management

Week 1 Hcs 405

421 words - 2 pages University of Phoenix Material Week One Health Care Financial Terms Worksheet Understanding health care financial terms is a prerequisite for both academic and professional success. This assignment is intended to ensure you understand some of the basic terms used in this course. Complete the worksheet below according to the following guidelines: In the space provided, write each term’s definition as used in health care management

Comm 315 Week 3 Individual Assignment Personal Action Plan

323 words - 2 pages This archive file of LDR 531 Week 2 Managerial Organization New Ver contains: Enron Business Failure Option 1: Examining a Business Failure Research a business failure that occurred at a large organization such as Tyco International Ltd., Chrysler LLC, Daewoo Motor America, WorldCom, or Enron. Write a paper of no more than 1,050 words, describing how specific organizational-behavior theories could have predicted or

Letter Of Interest

257 words - 2 pages includes processing service estimates as well as reciprocal estimates for active members, verifying service and salaries for reciprocal systems, reviewing applications for members who have applied to retire, to insure accuracy and that all supporting documents are on file, and sending correspondence to members to acknowledge receipt of their pension applications and/or to request additional information, if needed, as well as other things. I completed

Similar Documents

File Management Essay

705 words - 3 pages File Management POS/355 Brandon Elizaldi Steven Kernan File Management File management and file systems are a core part of the user experience for most users. They provide many essential and necessary functions for the user as well as almost anyone else working with a computer system. They provide anything from long term existence to the ability to create and delete stored data. Some of the benefits to the user are long term

File Management Essay

654 words - 3 pages Stephen Sylvester File Management POS:335 John Demory May 26th 2014 In this paper on file access I will be covering two different ways that a system that can support 5,000 users, specifically a protection scheme in UNIX. Please note that out of these 5,000 users, only 4,990 of those users will have access to a specific file. I will first begin with the explanation of one of the ways that a system can support 5,000 users and then move on

File Essay

4128 words - 17 pages the FASB's. * Other influential organizations (e.g. American Accounting Association, Institute of Management Accountants, Financial Executives Institute) House of GAAP | House of GAAP | Category (a) (Most authoritative) | FASB Standards and Interpretations | Accounting Principles Board (APB) Opinions | AICPA Accounting Research Bulletins (ARBs) | Category (b) | FASB Technical Bulletins | AICPA Industry Audit and Accounting Guides

Pt2520 Homework 1 Essay

305 words - 2 pages Unit 1 True/False Questions Indicate whether the following statements are true or false on the student answer sheet. 1) At its simplest, a database can be seen as a collection of related data. 2) A delimited file is a file where the length of the file is limited. 3) A delimited file is one in which the data is separated by a character such as a comma. 4) All fixed length files are of the same length. 5) In relational databases