This website uses cookies to ensure you have the best experience. Learn more

File Management Essay

654 words - 3 pages

Stephen Sylvester
File Management
POS:335
John Demory
May 26th 2014

In this paper on file access I will be covering two different ways that a system that can support 5,000 users, specifically a protection scheme in UNIX. Please note that out of these 5,000 users, only 4,990 of those users will have access to a specific file. I will first begin with the explanation of one of the ways that a system can support 5,000 users and then move on to the second way that a system can support 5,000 users.
The first way that a system can support 5,000 users is for the administrator or facilitator to set up an access control list of all 4,990 users that he or she wants to have access to the specific file. A great real world example of controlled access would be at my current place of employment at the Department of Veteran’s Affairs. Every employee within the company is assigned user roles. These user roles reflect their job ...view middle of the document...

Only four people within our department including myself have access to these files on a daily basis. This is due to security and confidentiality of all the patients. All the files within the network shared drive deal with protected health information for many veterans of the Armed Forces. It is essential to have their personal information protected at all times. Users (full time employees or contract companies whose user roles directly relate to the job functions within the organization) can request for access to our network shared drive with supervisor approval if needed. If their request is authorized, that user can then call the help desk and submit a trouble ticket to request access to that specific folder. Their access is valid until the contract is complete and can request for renewal if the contract is extended.
The second way that a system can support 5,000 users would be for the administrator or facilitator to create an access control list. This access control list would have the list of names of the 4,990 users that will have access to a specific file. You would then put these 4,990 users into one specific group and set up the group access. The group access would have specific parameters dependent on the individual needs of the specific file. Unfortunately, this scheme cannot always be implemented due to user groups being restricted by the system.
In conclusion, in this paper on file access I have covered two different ways that a system can support 5,000 users, specifically a protection scheme in UNIX. The first method that I had covered was to set up an access control list with access to a specific file. The second method that I had covered was to set up an access control list with access to a specific group. I have also provided a real world example for you to visualize and possibly apply to your own life and experiences. I hope that this paper gave you more of an insight on how a system can support 5,000 users using a protection scheme in UNIX.

Citation:
Operating systems Internals and Design Principles (). (2012). Operating Systems. : William Stallings.

Other assignments on File Management

Essays

1619 words - 7 pages Module 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System Design and Implementation System Generation Common System Components Process Management Main Memory Management Secondary-Storage Management I/O System Management File Management Protection System Networking

Operating Systems In A Nutshell !

909 words - 4 pages commands. The resident commands are those commands the reside in memory in order to be accessed immediately. The nonresident commands, as you might expect, do not remain on memory and is loaded into memory as necessary. File management The OS also serves file management system. Because files are not always stored contiguously on the disk a file management system is needed in order to be able to keep track where files are stored on the disk

Production & Operation Management

1521 words - 7 pages the requested files were these “no hit” files requiring a search. Often these “no hit” files were eventually found stacked in the requester’s office. The primary “customers” of the file clerks were underwriters and claims attorneys. UNDERWRITING Company management and operations analysts were consistently told that the greatest problem in the company was the inability of file clerks to supply files in a speedy fashion. The entire company from top

Production & Operation Management

1445 words - 6 pages requested files were these “no hit” files requiring a search. Often these “no hit” files were eventually found stacked in the requester‟s office. The primary “customers” of the file clerks were underwriters and claims attorneys. Underwriting Company management and operations analysts were consistently told that the greatest problem in the company was the inability of file clerks to supply files in a speedy fashion. The entire company from top to bottom

Operating Systems Comparison Outline

700 words - 3 pages categories (CPU, System Memory, Disk Activity, Disk Usage, Network) IV. File Management a. Designed to manage files to reduce disk and hardware usage. 1. MAC OS uses user-friendly software b. Two different applications to manage files 1. Finder 2. Spotlight V. Security a. MAC OS is designed with technologies that work together to monitor, encrypt, and update 1. System security updates produced and transmitted frequently b. Gatekeeper

Unit 10 Final

1780 words - 8 pages Unit 10 Final Project IT 320 Justin Burse An operating system is the main management system which is loaded after the boot loader has finished. Its responsible has many core responsibilities which allows all the programs to work together as one system. In the layer structure on the right you can see it is the link between the core hardware and the applications that use these pieces of

U6 Rp 1

442 words - 2 pages What is an NAS devise? A Network Attached Storage device is file-level computer data storage connected to a computer network providing data access to a heterogeneous group of clients. NAS not only operates as a file server, but is specialized for this task either by its hardware, software, or configuration of those elements. NAS is often manufactured as a computer appliance – a specialized computer built from the ground up for storing and

Operating Systems

496 words - 2 pages LDW -Unit 1 Review Exercise 8 points each 1. Explain the difference between operating system software, application software, and utility software. • Operating system software is the programs that act as the central control program it is the gap between the system and the user. It acts as an intermediary between the applications and the hardware. Examples…..are task management, job management, memory management, and file management

Week 1 Hcs 405

421 words - 2 pages University of Phoenix Material Week One Health Care Financial Terms Worksheet Understanding health care financial terms is a prerequisite for both academic and professional success. This assignment is intended to ensure you understand some of the basic terms used in this course. Complete the worksheet below according to the following guidelines: In the space provided, write each term’s definition as used in health care management

Comm 315 Week 3 Individual Assignment Personal Action Plan

323 words - 2 pages This archive file of LDR 531 Week 2 Managerial Organization New Ver contains: Enron Business Failure Option 1: Examining a Business Failure Research a business failure that occurred at a large organization such as Tyco International Ltd., Chrysler LLC, Daewoo Motor America, WorldCom, or Enron. Write a paper of no more than 1,050 words, describing how specific organizational-behavior theories could have predicted or

Letter Of Interest

257 words - 2 pages includes processing service estimates as well as reciprocal estimates for active members, verifying service and salaries for reciprocal systems, reviewing applications for members who have applied to retire, to insure accuracy and that all supporting documents are on file, and sending correspondence to members to acknowledge receipt of their pension applications and/or to request additional information, if needed, as well as other things. I completed

Similar Documents

File Management Essay

550 words - 3 pages File Management UNIX systems are based on the access control of files scheme which was introduced in the very early versions of UNIX. The way this works is that each UNIX user has an assigned unique user identification number which also puts this user ID into a primary group as well as other groups if the user ID needs it. These groups are identified, like the user’s ID, with a group ID. When a user creates a file, it is designated as owned

File Management Essay

705 words - 3 pages File Management POS/355 Brandon Elizaldi Steven Kernan File Management File management and file systems are a core part of the user experience for most users. They provide many essential and necessary functions for the user as well as almost anyone else working with a computer system. They provide anything from long term existence to the ability to create and delete stored data. Some of the benefits to the user are long term

File Essay

4128 words - 17 pages the FASB's. * Other influential organizations (e.g. American Accounting Association, Institute of Management Accountants, Financial Executives Institute) House of GAAP | House of GAAP | Category (a) (Most authoritative) | FASB Standards and Interpretations | Accounting Principles Board (APB) Opinions | AICPA Accounting Research Bulletins (ARBs) | Category (b) | FASB Technical Bulletins | AICPA Industry Audit and Accounting Guides

Pt2520 Homework 1 Essay

305 words - 2 pages Unit 1 True/False Questions Indicate whether the following statements are true or false on the student answer sheet. 1) At its simplest, a database can be seen as a collection of related data. 2) A delimited file is a file where the length of the file is limited. 3) A delimited file is one in which the data is separated by a character such as a comma. 4) All fixed length files are of the same length. 5) In relational databases