SlideShare a Scribd company logo
1. It becomes essential to store information for long-
term so that it can be accessed at any time.
2. it is also essential to make data sharable among
various processes.
3. This information can be huge in size and therefore,
must be accommodated on the appropriate storage
devices.
1
What is File?
A file is sequence of logical records i.e. a
sequence of bits and bytes.
File Attributes:
A file has various attributes like name, type,
location, size, protection, time and data of
creation, user information etc.
2
File naming
File naming=File name + File
extension
Eg. Student.doc
In this example the Student is
the file name and doc is the file
extension
3
Some Common File extensions
4
File Attributes
A file has a name and data. Other than
this, it contains information like date
and time of file creation, file’s current
size etc. with a file. These are known as
attributes of a file.
5
Operations that can be performed on files
are:
1. CREATE: A blank file is created.
2. DELETE: The purpose of this system call is to delete
this file
3. OPEN: Open a file either for reading or writing.
4. CLOSE: When a file is no longer accessed.
6
 READ: When a file is only to be read.
 Write: To write some data on file.
 Append: To add some data to the end
of the file.
 Rename: To rename the file.
Note: A file can be made read-only, hidden,
system-file, and so-on by setting its read only flag
to 1, its hidden flag to 1, its system flag to 1 and so
on.
7
File Access Methods
 Sequential Access: in this access method, data
records are retrieved in the same order in which
they have been stored on the disk. E.g data stored
on magnetic disk.
 Random Access: In case of random access the
record is searched from the disk based on its direct
address information. The technique used is
Hashing. In hashing every record is associated
with a key number to preprocess the address
calculation. Hash function is used to obtain
absolute address of a particular record.
8
9
Sequential Access
Random Access
Index Access method: Indexed file
approach is helpful with multiple
attribute fields like in database files. In
these files, every field is associated with
an index key. While querying data the
index key is kept in the memory and
related records are fetched from the
disk.
10
11
Index Access Method
Directory Structure
A directory contains information about
files.
A directory is used as a means to group
the files owned by a user.
12
Hierarchical Directory Systems
13
Root
directory User
directory
files
(a) (b) ( c )
Access paths
Two possible methods for access path are:
1. Absolute path name: It is a listing of the directories
and files from the root directory to the intended file.
For example, the path ‘c:/windows/programs/spss.exe’
means that the root directory contains a subdirectory
‘windows’, which further contains a subdirectory
‘programs’, that contains an executable “spss.exe”.
14
2. Relative path name: This uses the concept of current
directory (also known as working directory). A user
can specify a particular directory as his current
working directory and all the path names instead of
being specified from the root directory are specified
relative to the working directory. For example, if the
current working directory is ‘usercurr’, then the file
whose absolute path is ‘usercurrstudent’ can be
referred simply as ‘student’.
15
Directory Operations
 CREATE: A directory is created.
 DELETE: A directory is deleted.
 OPENDIR: Directories can be opened for reading
it.
 CLOSEDIR: When a directory has been read, it
should be closed to free up internal table space in
main memory.
 RENAME: Directories can be renamed just like
files.
16
File Protection
 File systems often contain information that is highly
valuable to their users.
 Protecting this information against unauthorized
usage is therefore, a major concern of all the file
systems.
17
1. File protection through Access Control
 Following are the few file operations that can be
controlled:
 Read - Read a file
 Write - Write the file
 Append - Append a file
 Delete - Delete a file
 List - List the name and attributes of a file
 Rename - Rename a file
 Edit - Changing the contents of a file
 Copy - Make a copy of a file.
18
Access control list
 This list may contain the user name and the types of
access allowed for each user. The operating system
checks this access control list (associated with a file)
whenever a user requests an access to a particular file.
But one limitation of Access control list is
their length, so we create groups.
19
Classify the users of a file into three types:
1. Owner - The user who created the file.
2.Group - A set of users who are sharing the file and
need similar access.
3.Universe - All remaining users in the system
constitute universe
20
2. File protection through password
 Files can be protected by a password. The owner of a
file can control its access by assigning a password.
Thus, only those users who know the password, can
access a particular file.
21
File System Implementation
There are 4 ways of File system
implementation. They are the following:
1. Contiguous allocation
2. Linked list allocation
3. Linked list allocation using an index
4. I-nodes
22
1. Contiguous allocation
 The simplest allocation scheme is to store each file as a
contiguous block of data on the disk. Thus, on a disk
having blocks size 1k, a 25k file would be allocated 25
consecutive blocks.
23
2. Linked list allocation
 The second method for storing files is to keep each one as
a linked list of disk blocks, as shown in Figure below. The
first word of each block is used as a pointer to the next
one. The rest of the block is used for storing data.
24
3. Linked list allocation using an index
In this technique instead of having a pointer, an index is
maintained.
25
4. I-nodes
 This method is used by UNIX operating system. In
this scheme, each file is associated with a little table
called an
i-node (index node).
26
Free Space Management
Free space management is used to reuse the disk
space created after deleting the files.
We have 4 techniques for Free space
management, Which are the following:
1. Bit map
2. Linked list
3. Grouping
4. Counting
27
1. Bit map
 The free space list is implemented as a bit map. Every
bit represents a block on the disk. The bit for a block is
1 if it is free and it is 0 if the block is allocated.
28
2. Linked list
 This approach maintains a linked list of all the free
disk blocks. The first free block in the list can be
pointed out by a head pointer, which is kept in a
special location on the disk.
29
3. Grouping
 Another approach is to store the addresses of n free
blocks in the first free block. The last block contains
the addresses of other n free blocks and so on.
30
4. Counting
 In this technique, instead of keeping a list of addresses
of n free blocks, it is more convenient to keep the
address of the first free blocks and the number n of
free contiguous blocks that follow the first block.
31
Security
Security violations (misuse) of the system can be either
accidental or intentional. It is easier to protect against
the accidental misuse than to protect against the
intentional misuse.
Security means Security from:
 Theft of information
 Unauthorized modification of data
 Unauthorized destruction of data
32
System can be protected from
such threats at two levels:
1. Physical
2. Human
33
Authentication
Authentication of a user is based on:
1. User identifier and password (Passwords)
2.Artifact-based Authentication: Badge card
possessed by a user (Artifacts)
3.Finger prints, retina pattern (Biometrics techniques)
34
Encryption
 Encryption is one such mechanism, which allows such data
to be scrambled so that even if some one intercepts it on
the network, it is not readable to him/her.
35
Encryption Schemes
These are two kinds of encryption:
1. ‘Symmetrical Encryption’ or secret key which uses a
single key to encrypt and decrypt the transmitted data.
2.‘Asymmetrical Encryption’ which uses ‘Private Key’, in
which one key is used to encrypt and another to
decrypt the transmitted data.
36
Viruses, Worms and Trojans
 A computer virus is a small program written to alter
the way a computer operates and it executes without
the permission or knowledge of the user.
 Worms are basically the programs that replicate
themselves from system to system without the use of a
host file.
 Trojan horses are impostors - files that claim to be
something desirable, but in fact, are malicious.
37
Threat Monitoring
The security of a system can be done by a
technique called Threat-monitoring.
The techniques that can be used for threat
monitoring are:
1. A time sharing system can keep the count of
the number of incorrect passwords given,
when a user is trying to log in. More than a few
incorrect attempts may signal an attempt to
guess a password.
38
2. Audit log is another common technique used for
threat monitoring. An audit log records the time of
use, the details of users etc.
3. The system can be scanned periodically for
security holes. Scanning can be done when the
system has less traffic.
4. In case we are using Internet use firewall and
antivirus programs.
39
Protection
Protection mechanisms deal with
Controlling the access of programs,
processes or users to the
resources of a computer system.
40
Methods for Enforcement of Protection
Mechanisms
There are 2 methods for Enforcement of
Protection Mechanisms, which are the
Following:
1. Access rights
2. Access matrix
41
1. Access rights
Access rights consists of domain. Thus, a
domain known as protection domain can be
defined for a process. Such a domain will
contain the set of objects and the types of
operations that can be invoked on each
object. This means that domain is a set of
<object, rights> pair.
For e.g. D = < data file F, {read, write} >; it
can perform only read and write operations
on the data file named ‘F’.
42
2. Access Matrix
It is used to describe which users have access to
what objects (resources). Thus, basically it checks
the access rights of users on system resources.
43
44

More Related Content

What's hot

File system Os
File system OsFile system Os
File system Os
Nehal Naik
 
Functions Of Operating System
Functions Of Operating SystemFunctions Of Operating System
Functions Of Operating System
Dr.Suresh Isave
 
Files
FilesFiles
CPU and its components
CPU and its componentsCPU and its components
CPU and its components
samina khan
 
Secondary storage devices
Secondary storage devicesSecondary storage devices
Secondary storage devices
Samiksha Pun
 
Memory management
Memory managementMemory management
Memory management
cpjcollege
 
Basic of Computer Introduction - World of Computers
Basic of Computer Introduction - World of Computers Basic of Computer Introduction - World of Computers
Functional units
Functional unitsFunctional units
Functional units
Jeeva Nanthini
 
Secondary memory
Secondary memorySecondary memory
Secondary memory
University of Potsdam
 
Memory management ppt
Memory management pptMemory management ppt
Memory management ppt
ManishaJha43
 
File management
File management File management
File management
Abenezer Abiti
 
Storage management in operating system
Storage management in operating systemStorage management in operating system
Storage management in operating system
DeepikaT13
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
Mukesh Chinta
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
vampugani
 
File management
File managementFile management
File management
Dr. Ahmed Al Zaidy
 
Operating system memory management
Operating system memory managementOperating system memory management
Operating system memory management
rprajat007
 
DOS commands
DOS commandsDOS commands
DOS commands
preetikapri1
 

What's hot (20)

File system Os
File system OsFile system Os
File system Os
 
Functions Of Operating System
Functions Of Operating SystemFunctions Of Operating System
Functions Of Operating System
 
Files
FilesFiles
Files
 
CPU and its components
CPU and its componentsCPU and its components
CPU and its components
 
Secondary storage devices
Secondary storage devicesSecondary storage devices
Secondary storage devices
 
Memory management
Memory managementMemory management
Memory management
 
Basic of Computer Introduction - World of Computers
Basic of Computer Introduction - World of Computers Basic of Computer Introduction - World of Computers
Basic of Computer Introduction - World of Computers
 
Functional units
Functional unitsFunctional units
Functional units
 
Secondary memory
Secondary memorySecondary memory
Secondary memory
 
Memory management ppt
Memory management pptMemory management ppt
Memory management ppt
 
File management
File management File management
File management
 
Storage management in operating system
Storage management in operating systemStorage management in operating system
Storage management in operating system
 
Files and Folders
Files and FoldersFiles and Folders
Files and Folders
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Memory management
Memory managementMemory management
Memory management
 
operating system structure
operating system structureoperating system structure
operating system structure
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
 
File management
File managementFile management
File management
 
Operating system memory management
Operating system memory managementOperating system memory management
Operating system memory management
 
DOS commands
DOS commandsDOS commands
DOS commands
 

Viewers also liked

100+ run commands for windows
100+ run commands for windows 100+ run commands for windows
100+ run commands for windows
Anand Garg
 
Pace IT - Admin Tools (Part 3)
Pace IT - Admin Tools (Part 3)Pace IT - Admin Tools (Part 3)
Pace IT - Admin Tools (Part 3)
Pace IT at Edmonds Community College
 
List Command at Run
List Command at RunList Command at Run
List Command at Run
Imam Dermawan
 
Information gathering using windows command line utility
Information gathering using windows command line utilityInformation gathering using windows command line utility
Information gathering using windows command line utility
Vishal Kumar
 
Software Testing
Software TestingSoftware Testing
Software Testing
Vishal Singh
 
Software engineering introduction
Software engineering introductionSoftware engineering introduction
Software engineering introduction
Vishal Singh
 
Coding
CodingCoding
Coding
Vishal Singh
 
Knowledge Representation in Artificial intelligence
Knowledge Representation in Artificial intelligence Knowledge Representation in Artificial intelligence
Knowledge Representation in Artificial intelligence
Yasir Khan
 
Knowledge representation in AI
Knowledge representation in AIKnowledge representation in AI
Knowledge representation in AIVishal Singh
 
Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement Specification
Vishal Singh
 
Issues in knowledge representation
Issues in knowledge representationIssues in knowledge representation
Issues in knowledge representationSravanthi Emani
 
The electronic payment systems
The electronic payment systemsThe electronic payment systems
The electronic payment systemsVishal Singh
 
Memory management
Memory managementMemory management
Memory management
Vishal Singh
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3CTIN
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
Digital forensic upload
Digital forensic uploadDigital forensic upload
Digital forensic upload
Setia Juli Irzal Ismail
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicCTIN
 
Disk forensics
Disk forensicsDisk forensics
Disk forensics
Chiawei Wang
 

Viewers also liked (20)

100+ run commands for windows
100+ run commands for windows 100+ run commands for windows
100+ run commands for windows
 
ITE - Chapter 5
ITE - Chapter 5ITE - Chapter 5
ITE - Chapter 5
 
Pace IT - Admin Tools (Part 3)
Pace IT - Admin Tools (Part 3)Pace IT - Admin Tools (Part 3)
Pace IT - Admin Tools (Part 3)
 
List Command at Run
List Command at RunList Command at Run
List Command at Run
 
Information gathering using windows command line utility
Information gathering using windows command line utilityInformation gathering using windows command line utility
Information gathering using windows command line utility
 
Software Testing
Software TestingSoftware Testing
Software Testing
 
Software engineering introduction
Software engineering introductionSoftware engineering introduction
Software engineering introduction
 
Coding
CodingCoding
Coding
 
Knowledge Representation in Artificial intelligence
Knowledge Representation in Artificial intelligence Knowledge Representation in Artificial intelligence
Knowledge Representation in Artificial intelligence
 
Knowledge representation in AI
Knowledge representation in AIKnowledge representation in AI
Knowledge representation in AI
 
Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement Specification
 
Issues in knowledge representation
Issues in knowledge representationIssues in knowledge representation
Issues in knowledge representation
 
The electronic payment systems
The electronic payment systemsThe electronic payment systems
The electronic payment systems
 
Memory management
Memory managementMemory management
Memory management
 
Research report
Research reportResearch report
Research report
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Digital forensic upload
Digital forensic uploadDigital forensic upload
Digital forensic upload
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
Disk forensics
Disk forensicsDisk forensics
Disk forensics
 

Similar to File management

File Protection in Operating System
File Protection in Operating SystemFile Protection in Operating System
File Protection in Operating System
Meghaj Mallick
 
Report blocking ,management of files in secondry memory , static vs dynamic a...
Report blocking ,management of files in secondry memory , static vs dynamic a...Report blocking ,management of files in secondry memory , static vs dynamic a...
Report blocking ,management of files in secondry memory , static vs dynamic a...
NoorMustafaSoomro
 
Chapter 3 part 2
Chapter 3 part 2Chapter 3 part 2
Chapter 3 part 2rohassanie
 
Protection, directory implementation
Protection, directory implementationProtection, directory implementation
Protection, directory implementation
rajshreemuthiah
 
File System operating system operating system
File System  operating system operating systemFile System  operating system operating system
File System operating system operating system
Ethiopia Satlliet television
 
File Systems
File SystemsFile Systems
File Systems
Shipra Swati
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
Ankit Dubey
 
File management
File managementFile management
File management
sangrampatil81
 
File structure
File structureFile structure
File structure
A. S. M. Shafi
 
OS Unit 4.pptx
OS Unit 4.pptxOS Unit 4.pptx
OS Unit 4.pptx
GautamBorana
 
Unit 3 file management
Unit 3 file managementUnit 3 file management
Unit 3 file management
Kalai Selvi
 
Learn about the File Concept in operating systems ppt
Learn about the File Concept in operating systems pptLearn about the File Concept in operating systems ppt
Learn about the File Concept in operating systems ppt
geethasenthil2706
 
Poking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And ProfitPoking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And Profit
ssusera432ea1
 
Chapter 12.pptx
Chapter 12.pptxChapter 12.pptx
Chapter 12.pptx
AsmaaFaried1
 
CH11.pdf
CH11.pdfCH11.pdf
CH11.pdf
ImranKhan880955
 
Unit 3 chapter 1-file management
Unit 3 chapter 1-file managementUnit 3 chapter 1-file management
Unit 3 chapter 1-file management
Kalai Selvi
 
Chapter 10 - File System Interface
Chapter 10 - File System InterfaceChapter 10 - File System Interface
Chapter 10 - File System Interface
Wayne Jones Jnr
 
file management
 file management file management
file management
Sweta Kumari Barnwal
 
Cyber security
Cyber securityCyber security
Cyber security
Shreya Acharya
 
Unit ivos - file systems
Unit ivos - file systemsUnit ivos - file systems
Unit ivos - file systems
donny101
 

Similar to File management (20)

File Protection in Operating System
File Protection in Operating SystemFile Protection in Operating System
File Protection in Operating System
 
Report blocking ,management of files in secondry memory , static vs dynamic a...
Report blocking ,management of files in secondry memory , static vs dynamic a...Report blocking ,management of files in secondry memory , static vs dynamic a...
Report blocking ,management of files in secondry memory , static vs dynamic a...
 
Chapter 3 part 2
Chapter 3 part 2Chapter 3 part 2
Chapter 3 part 2
 
Protection, directory implementation
Protection, directory implementationProtection, directory implementation
Protection, directory implementation
 
File System operating system operating system
File System  operating system operating systemFile System  operating system operating system
File System operating system operating system
 
File Systems
File SystemsFile Systems
File Systems
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
File management
File managementFile management
File management
 
File structure
File structureFile structure
File structure
 
OS Unit 4.pptx
OS Unit 4.pptxOS Unit 4.pptx
OS Unit 4.pptx
 
Unit 3 file management
Unit 3 file managementUnit 3 file management
Unit 3 file management
 
Learn about the File Concept in operating systems ppt
Learn about the File Concept in operating systems pptLearn about the File Concept in operating systems ppt
Learn about the File Concept in operating systems ppt
 
Poking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And ProfitPoking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And Profit
 
Chapter 12.pptx
Chapter 12.pptxChapter 12.pptx
Chapter 12.pptx
 
CH11.pdf
CH11.pdfCH11.pdf
CH11.pdf
 
Unit 3 chapter 1-file management
Unit 3 chapter 1-file managementUnit 3 chapter 1-file management
Unit 3 chapter 1-file management
 
Chapter 10 - File System Interface
Chapter 10 - File System InterfaceChapter 10 - File System Interface
Chapter 10 - File System Interface
 
file management
 file management file management
file management
 
Cyber security
Cyber securityCyber security
Cyber security
 
Unit ivos - file systems
Unit ivos - file systemsUnit ivos - file systems
Unit ivos - file systems
 

Recently uploaded

Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 

Recently uploaded (20)

Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 

File management

  • 1. 1. It becomes essential to store information for long- term so that it can be accessed at any time. 2. it is also essential to make data sharable among various processes. 3. This information can be huge in size and therefore, must be accommodated on the appropriate storage devices. 1
  • 2. What is File? A file is sequence of logical records i.e. a sequence of bits and bytes. File Attributes: A file has various attributes like name, type, location, size, protection, time and data of creation, user information etc. 2
  • 3. File naming File naming=File name + File extension Eg. Student.doc In this example the Student is the file name and doc is the file extension 3
  • 4. Some Common File extensions 4
  • 5. File Attributes A file has a name and data. Other than this, it contains information like date and time of file creation, file’s current size etc. with a file. These are known as attributes of a file. 5
  • 6. Operations that can be performed on files are: 1. CREATE: A blank file is created. 2. DELETE: The purpose of this system call is to delete this file 3. OPEN: Open a file either for reading or writing. 4. CLOSE: When a file is no longer accessed. 6
  • 7.  READ: When a file is only to be read.  Write: To write some data on file.  Append: To add some data to the end of the file.  Rename: To rename the file. Note: A file can be made read-only, hidden, system-file, and so-on by setting its read only flag to 1, its hidden flag to 1, its system flag to 1 and so on. 7
  • 8. File Access Methods  Sequential Access: in this access method, data records are retrieved in the same order in which they have been stored on the disk. E.g data stored on magnetic disk.  Random Access: In case of random access the record is searched from the disk based on its direct address information. The technique used is Hashing. In hashing every record is associated with a key number to preprocess the address calculation. Hash function is used to obtain absolute address of a particular record. 8
  • 10. Index Access method: Indexed file approach is helpful with multiple attribute fields like in database files. In these files, every field is associated with an index key. While querying data the index key is kept in the memory and related records are fetched from the disk. 10
  • 12. Directory Structure A directory contains information about files. A directory is used as a means to group the files owned by a user. 12
  • 13. Hierarchical Directory Systems 13 Root directory User directory files (a) (b) ( c )
  • 14. Access paths Two possible methods for access path are: 1. Absolute path name: It is a listing of the directories and files from the root directory to the intended file. For example, the path ‘c:/windows/programs/spss.exe’ means that the root directory contains a subdirectory ‘windows’, which further contains a subdirectory ‘programs’, that contains an executable “spss.exe”. 14
  • 15. 2. Relative path name: This uses the concept of current directory (also known as working directory). A user can specify a particular directory as his current working directory and all the path names instead of being specified from the root directory are specified relative to the working directory. For example, if the current working directory is ‘usercurr’, then the file whose absolute path is ‘usercurrstudent’ can be referred simply as ‘student’. 15
  • 16. Directory Operations  CREATE: A directory is created.  DELETE: A directory is deleted.  OPENDIR: Directories can be opened for reading it.  CLOSEDIR: When a directory has been read, it should be closed to free up internal table space in main memory.  RENAME: Directories can be renamed just like files. 16
  • 17. File Protection  File systems often contain information that is highly valuable to their users.  Protecting this information against unauthorized usage is therefore, a major concern of all the file systems. 17
  • 18. 1. File protection through Access Control  Following are the few file operations that can be controlled:  Read - Read a file  Write - Write the file  Append - Append a file  Delete - Delete a file  List - List the name and attributes of a file  Rename - Rename a file  Edit - Changing the contents of a file  Copy - Make a copy of a file. 18
  • 19. Access control list  This list may contain the user name and the types of access allowed for each user. The operating system checks this access control list (associated with a file) whenever a user requests an access to a particular file. But one limitation of Access control list is their length, so we create groups. 19
  • 20. Classify the users of a file into three types: 1. Owner - The user who created the file. 2.Group - A set of users who are sharing the file and need similar access. 3.Universe - All remaining users in the system constitute universe 20
  • 21. 2. File protection through password  Files can be protected by a password. The owner of a file can control its access by assigning a password. Thus, only those users who know the password, can access a particular file. 21
  • 22. File System Implementation There are 4 ways of File system implementation. They are the following: 1. Contiguous allocation 2. Linked list allocation 3. Linked list allocation using an index 4. I-nodes 22
  • 23. 1. Contiguous allocation  The simplest allocation scheme is to store each file as a contiguous block of data on the disk. Thus, on a disk having blocks size 1k, a 25k file would be allocated 25 consecutive blocks. 23
  • 24. 2. Linked list allocation  The second method for storing files is to keep each one as a linked list of disk blocks, as shown in Figure below. The first word of each block is used as a pointer to the next one. The rest of the block is used for storing data. 24
  • 25. 3. Linked list allocation using an index In this technique instead of having a pointer, an index is maintained. 25
  • 26. 4. I-nodes  This method is used by UNIX operating system. In this scheme, each file is associated with a little table called an i-node (index node). 26
  • 27. Free Space Management Free space management is used to reuse the disk space created after deleting the files. We have 4 techniques for Free space management, Which are the following: 1. Bit map 2. Linked list 3. Grouping 4. Counting 27
  • 28. 1. Bit map  The free space list is implemented as a bit map. Every bit represents a block on the disk. The bit for a block is 1 if it is free and it is 0 if the block is allocated. 28
  • 29. 2. Linked list  This approach maintains a linked list of all the free disk blocks. The first free block in the list can be pointed out by a head pointer, which is kept in a special location on the disk. 29
  • 30. 3. Grouping  Another approach is to store the addresses of n free blocks in the first free block. The last block contains the addresses of other n free blocks and so on. 30
  • 31. 4. Counting  In this technique, instead of keeping a list of addresses of n free blocks, it is more convenient to keep the address of the first free blocks and the number n of free contiguous blocks that follow the first block. 31
  • 32. Security Security violations (misuse) of the system can be either accidental or intentional. It is easier to protect against the accidental misuse than to protect against the intentional misuse. Security means Security from:  Theft of information  Unauthorized modification of data  Unauthorized destruction of data 32
  • 33. System can be protected from such threats at two levels: 1. Physical 2. Human 33
  • 34. Authentication Authentication of a user is based on: 1. User identifier and password (Passwords) 2.Artifact-based Authentication: Badge card possessed by a user (Artifacts) 3.Finger prints, retina pattern (Biometrics techniques) 34
  • 35. Encryption  Encryption is one such mechanism, which allows such data to be scrambled so that even if some one intercepts it on the network, it is not readable to him/her. 35
  • 36. Encryption Schemes These are two kinds of encryption: 1. ‘Symmetrical Encryption’ or secret key which uses a single key to encrypt and decrypt the transmitted data. 2.‘Asymmetrical Encryption’ which uses ‘Private Key’, in which one key is used to encrypt and another to decrypt the transmitted data. 36
  • 37. Viruses, Worms and Trojans  A computer virus is a small program written to alter the way a computer operates and it executes without the permission or knowledge of the user.  Worms are basically the programs that replicate themselves from system to system without the use of a host file.  Trojan horses are impostors - files that claim to be something desirable, but in fact, are malicious. 37
  • 38. Threat Monitoring The security of a system can be done by a technique called Threat-monitoring. The techniques that can be used for threat monitoring are: 1. A time sharing system can keep the count of the number of incorrect passwords given, when a user is trying to log in. More than a few incorrect attempts may signal an attempt to guess a password. 38
  • 39. 2. Audit log is another common technique used for threat monitoring. An audit log records the time of use, the details of users etc. 3. The system can be scanned periodically for security holes. Scanning can be done when the system has less traffic. 4. In case we are using Internet use firewall and antivirus programs. 39
  • 40. Protection Protection mechanisms deal with Controlling the access of programs, processes or users to the resources of a computer system. 40
  • 41. Methods for Enforcement of Protection Mechanisms There are 2 methods for Enforcement of Protection Mechanisms, which are the Following: 1. Access rights 2. Access matrix 41
  • 42. 1. Access rights Access rights consists of domain. Thus, a domain known as protection domain can be defined for a process. Such a domain will contain the set of objects and the types of operations that can be invoked on each object. This means that domain is a set of <object, rights> pair. For e.g. D = < data file F, {read, write} >; it can perform only read and write operations on the data file named ‘F’. 42
  • 43. 2. Access Matrix It is used to describe which users have access to what objects (resources). Thus, basically it checks the access rights of users on system resources. 43
  • 44. 44