SlideShare a Scribd company logo
Damian Gordon
 BELIEVE IT OR NOT…
 From the computer’s point of view, there is
no such thing as a file.
 It is only because the operating system is
creating the illusion of a file that they exist
 From the computer’s point of view, there is
only blocks of memory, either allocated or
unallocated.
Damian’s
 The File Manager (or File Management
System) is the manager in the Operating
System that creates the illusion that there are
files and folders being stored in computer
memory.
Operating System Files and
Folders
Memory
LocationsHardware
 The File Manager
◦ Keeps track of where files are stored
◦ Determines how the files are stored
◦ Follows operating system file allocation policies
◦ Uses available storage space efficiently for files
◦ Creates a record/log of all file usage
◦ Allocates a file to a user if is free, and if they are
permitted access to it.
◦ De-allocates file when user finished with it.
 The file manager ALLOCATES a file by reading
it from the hard disk and loading it into
memory while updating its record of who is
using what file.
 The file manager DEALLOCATES a file by
updating the file tables and rewriting the file
(if changed) to the hard disk. Any processes
waiting to access the file will be notified.
 Some definitions:
◦ A FIELD is a collection of bytes that can be
identified by a user, and has a type and size.
◦ A RECORD is a collection of related FIELDS.
◦ A FILE is a collection of records.
◦ A DIRECTORY (or FOLDER) is a special type of file
that which has lists of files and their attributes.
 Typical things you can do with a file are:
◦ CREATE
◦ OPEN
◦ DELETE
◦ RENAME
◦ COPY
◦ etc.
 The name of a file is usually in two parts:
 The name of a file is usually in two parts:
◦ MakeABackup.bat
 The name of a file is usually in two parts:
◦ MakeABackup.bat
Filename
 The name of a file is usually in two parts:
◦ MakeABackup.bat
Filename extension
.avi Microsoft Video for Windows movie
.dbf dbase II, III, IV data file
.doc(x) Microsoft Word for Windows
.gif Graphics Interchange Format
.htm Hypertext Markup Language (common web page file)
.html Hypertext Markup Language (common web page file)
.jpg JPEG graphic file
.mpg MPEG Video file
.mid MIDI music file
.mov QuickTime movie
.pdf Adobe Portable Document Format file
.ppt(x) PowerPoint file
.psd Photoshop file
.qxd QuarkXPress file
.rm Real Audio/Video streaming file
.rtf Rich Text Format
.tif TIFF graphic file
.txt ASCII text file
.wav Sound file
.xls(x) Excel spreadsheet
 The full filename includes path information:
 C:WINDOWSsystem32MakeABackup.bat
Filename extension
 The full filename includes path information:
 C:WINDOWSsystem32MakeABackup.bat
Filename extensionpath
 The full filename includes path information:
 C:WINDOWSsystem32MakeABackup.bat
Filename extensionpath
 If I am in the following folder:
 C:WINDOWSsystem32BackupFolder
 Then the address of the file is:
 ..MakeABackup.bat
 If I am in the following folder:
 C:WINDOWSsystem32BackupFolder
 Then the address of the file is:
 ..MakeABackup.bat
 The Operating System store files as records in
memory, where many records make up a
single file.
 There are three main ways a file is physically
stored in memory:
◦ Contiguous Storage
◦ Non-contiguous Storage
◦ Indexed Storage
 Contiguous Storage means that records of a
file are stored one after another.
 It is a very simple policy to implement, and
once you have found the start of the file, it’s
very easy to find the rest of it.
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
 The problem with is that if you have expand
the file, you either need to have free space
allocated at the end, or copy the whole file to
a different location on the disk that has
enough space.
 Non-contiguous Storage means that records
of a file are stored where ever there is free
space.
 The file manager will try to put as much of it
together as possible, but there will be other
part spread out over the disk.
 These extra bits are sometimes called extents
and these are linked together with pointers.
 This means there is no easy way to determine
the exact location of a record in a file.
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
 Indexed Storage means that as well as the
records in the file, an index block is created,
with pointers to each individual file.
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
Without an INDEX BLOCK,
how do I find file 2?
v w x y za b c d e f g h
Without an INDEX BLOCK,
how do I find file 2?
We do a sequential search.
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
So how does it work with
an INDEX BLOCK?
v w x y za b c d e f g h
File Address Size Next
File 1 1 4 9
File 1 9 4 -
File 2 15 5 -
INDEX BLOCK:
v w x y za b c d e f g h
File Address Size Next
File 1 1 4 9
File 1 9 4 -
File 2 15 5 -
INDEX BLOCK:
v w x y za b c d e f g h
File Address Size Next
File 1 1 4 9
File 1 9 4 -
File 2 15 5 -
INDEX BLOCK:
v w x y za b c d e f g h
File Address Size Next
File 1 1 4 9
File 1 9 4 -
File 2 15 5 -
INDEX BLOCK:
v w x y za b c d e f g h
File Address Size Next
File 1 1 4 9
File 1 9 4 -
File 2 15 5 -
INDEX BLOCK:
 This support both sequential and direct
access to records, and for larger files there
can be multiple indexes.
 The Access Control Matrix shows the access
that each user has for each file on the
system. The possible accesses are:
◦ R: Read
◦ W: Write
◦ E: Execute
◦ D:Delete
User
1
User
2
User
3
User
4
User
5
File 1 RWED --E- --E- RWED R---
File 2 ---- R-E- R-E- R--- RWE-
File 3 R-E- RW-- R-E- R-E- R--D
File 4 R--- RWE- R--- RWED --E-
Mary Anne Tom Bob Lyn
Word.
exe
RWED --E- --E- RWED R-E-
Lect1.
ppt
---- R-E- R-E- R--- RWE-
Scan.
Exe
R-E- RW-- R-E- R-E- R-ED
Chrome.
exe
R-E- RWE- R-E- RWED --E-
 In DOS the Access Controls are:
◦ R: Read
◦ W: Write
◦ C: Change
◦ F: Full Control
 In DOS access to a file can assigned to one of
two groups:
 User
 User Group
 In DOS if we want to grant permissions to
file, e.g. MakeABackup.bat, we do:
 cacls
 In DOS if we want to grant permissions to
file, e.g. MakeABackup.bat, we do:
 cacls filename arguments
 In DOS if we want to grant permissions to
file, e.g. MakeABackup.bat, we do:
 cacls filename [/T] [/M] [/L] [/S[:SDDL]] [/E]
[/C] [/G user:?] [/R user [...]] [/P user:? [...]]
[/D user [...]]
 In DOS cacls works as follows:
Argument Description
filename Display access control lists (ACLs) of file
/T Changes ACLs of specified files in the
current directory and all subdirectories.
/M Changes ACLs of volumes mounted to a
directory.
/L Work on the Symbolic Link itself versus the
target.
/S Displays the SDDL string for the DACL.
/S:SDDL Replaces the ACLs with those specified in
the SDDL string (not valid with /E, /G, /R,
/P, or /D).
 In DOS cacls works as follows:
Argument Description
/E Edit ACL instead of replacing it.
/C Continue on access denied errors.
/G user:? Grant specified user access rights.
? can be: R, W, C, or F
/R user Revoke specified user's access rights (only
valid with /E).
/P user:? Replace specified user's access rights.
? can be: R, W, C, or F
/D user Deny specified user access.
 Add Read-Only permission to a single file
CACLS MakeABackup.bat /E /G "Power Users":R
 Add Full Control permission to a second group of users
CACLS MakeABackup.bat /E /G "FinanceUsers":F
 Now revoke the Read permissions from the first group
CACLS MakeABackup.bat /E /R "Power Users"
 Now give the first group Full Control
CACLS MakeABackup.bat /E /G "Power Users":F
 Give Finance group Full Control of folder and all sub-folders
CACLS c:docswork /E /T /C /G "FinanceUsers":F
 In Linux/Unix the Access Controls are:
◦ R: Read
◦ W: Write
◦ X: Execute
 In Linux/Unix access to a file can assigned to
one of three groups:
 User
 User Group
 World
 In Linux/Unix access to a file can assigned to
one of three groups:
 User -you
 User Group – everyone in your group
 World – everyone with a login to the system
 In Linux/Unix access to a file can assigned to
one of three groups:
 -rwxrwxrwx
 User User Group World
 In Linux/Unix access to a file can assigned to
one of three groups:
 -rwxrwxrwx
-111111111
 In Linux/Unix access to a file can assigned to
one of three groups:
 -rwxr-xr-x
-111101101
 In Linux/Unix access to a file can assigned to
one of three groups:
 -rwx--x--x
-101001001
 In Linux/Unix access to a file can assigned to
one of three groups:
 -rwxrwxrwx
-111111111
- 7 7 7
 In Linux/Unix access to a file can assigned to
one of three groups:
 -rwxr-xr-x
-111101101
- 7 5 5
 In Linux/Unix access to a file can assigned to
one of three groups:
 -rwx--x--x
-111001001
- 7 1 1
 If we want to grant permissions to file, e.g.
MakeABackup.bat, we do:
 chmod 755 MakeABackup.sh
 chmod 777 MakeABackup.sh
 chmod 700 MakeABackup.sh
 In Linux/Unix, access to a file can assigned to
one of three groups:
 -rwxrwxrwx
 User User Group World
 In Linux/Unix, access to a folder/directory
can assigned to one of three groups:
 drwxrwxrwx
 User User Group World
Operating Systems -  File Management

More Related Content

What's hot

File Management
File ManagementFile Management
File Management
spickul
 
Operating Systems: Device Management
Operating Systems: Device ManagementOperating Systems: Device Management
Operating Systems: Device Management
Damian T. Gordon
 
Backup & restore in windows
Backup & restore in windowsBackup & restore in windows
Backup & restore in windows
Jab Vtl
 
Managing Files
Managing FilesManaging Files
Managing Files
Mirea Mizushima
 
ITFT - DOS - Disk Operating System
ITFT - DOS - Disk Operating SystemITFT - DOS - Disk Operating System
ITFT - DOS - Disk Operating System
Blossom Sood
 
Disk Management.pdf
Disk Management.pdfDisk Management.pdf
Disk Management.pdf
RandyGaray
 
Disk partitioning
Disk partitioningDisk partitioning
Disk partitioning
AnuragNarula5
 
Disk management
Disk managementDisk management
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyTehmina Gulfam
 
Backup And Recovery
Backup And RecoveryBackup And Recovery
Backup And Recovery
Wynthorpe
 
File system Os
File system OsFile system Os
File system Os
Nehal Naik
 
Data backup and disaster recovery
Data backup and disaster recoveryData backup and disaster recovery
Data backup and disaster recovery
catacutanjcsantos
 
File system.
File system.File system.
File system.
elyza12
 
Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5
Muhammad Talha Zaroon
 
Storage management in operating system
Storage management in operating systemStorage management in operating system
Storage management in operating system
DeepikaT13
 
Backing Up and Recovery
Backing Up and RecoveryBacking Up and Recovery
Backing Up and Recovery
Maham Huda
 
File Management in Operating Systems
File Management in Operating SystemsFile Management in Operating Systems
File Management in Operating Systems
vampugani
 

What's hot (20)

File Management
File ManagementFile Management
File Management
 
Operating Systems: Device Management
Operating Systems: Device ManagementOperating Systems: Device Management
Operating Systems: Device Management
 
Backup & restore in windows
Backup & restore in windowsBackup & restore in windows
Backup & restore in windows
 
Managing Files
Managing FilesManaging Files
Managing Files
 
ITFT - DOS - Disk Operating System
ITFT - DOS - Disk Operating SystemITFT - DOS - Disk Operating System
ITFT - DOS - Disk Operating System
 
Disk Management.pdf
Disk Management.pdfDisk Management.pdf
Disk Management.pdf
 
Disk partitioning
Disk partitioningDisk partitioning
Disk partitioning
 
Disk management
Disk managementDisk management
Disk management
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
 
Backup And Recovery
Backup And RecoveryBackup And Recovery
Backup And Recovery
 
Backup strategy
Backup strategyBackup strategy
Backup strategy
 
File system Os
File system OsFile system Os
File system Os
 
Data backup and disaster recovery
Data backup and disaster recoveryData backup and disaster recovery
Data backup and disaster recovery
 
File system.
File system.File system.
File system.
 
Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5
 
Storage management in operating system
Storage management in operating systemStorage management in operating system
Storage management in operating system
 
Backing Up and Recovery
Backing Up and RecoveryBacking Up and Recovery
Backing Up and Recovery
 
Ch03 system administration
Ch03 system administration Ch03 system administration
Ch03 system administration
 
File Management in Operating Systems
File Management in Operating SystemsFile Management in Operating Systems
File Management in Operating Systems
 
Files and Folders
Files and FoldersFiles and Folders
Files and Folders
 

Viewers also liked

IO Management
IO ManagementIO Management
IO Management
J.T.A.JONES
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicCTIN
 
Windows forensic artifacts
Windows forensic artifactsWindows forensic artifacts
Windows forensic artifacts
n|u - The Open Security Community
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
Aung Thu Rha Hein
 
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics PlatformAutopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Basis Technology
 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public InvestigationsCTIN
 
Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)
Shuvo Sarker
 
July132000
July132000July132000
July132000CTIN
 
Capturing forensics image
Capturing forensics imageCapturing forensics image
Capturing forensics image
Chris Harrington
 
NTFS vs FAT
NTFS vs FATNTFS vs FAT
NTFS vs FAT
Tanveer Ahmed
 
G Infomgnt
G InfomgntG Infomgnt
G InfomgntCTIN
 
Files and Folders in Windows 7
Files and Folders in Windows 7Files and Folders in Windows 7
Files and Folders in Windows 7
RIAH ENCARNACION
 
Social Media for Investigations Tools
Social Media for Investigations ToolsSocial Media for Investigations Tools
Social Media for Investigations ToolsMandy Jenkins
 
WinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage ToolWinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage Tool
Brent Muir
 
NTFS Forensics
NTFS Forensics NTFS Forensics
NTFS Forensics
nullowaspmumbai
 
Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...
Mark Matienzo
 
Digital forensic upload
Digital forensic uploadDigital forensic upload
Digital forensic upload
Setia Juli Irzal Ismail
 
Citrix
CitrixCitrix
Citrix
Yansi Keim
 

Viewers also liked (20)

IO Management
IO ManagementIO Management
IO Management
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
Windows forensic artifacts
Windows forensic artifactsWindows forensic artifacts
Windows forensic artifacts
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics PlatformAutopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public Investigations
 
Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)
 
July132000
July132000July132000
July132000
 
Capturing forensics image
Capturing forensics imageCapturing forensics image
Capturing forensics image
 
Windows 7-cheat-sheet
Windows 7-cheat-sheetWindows 7-cheat-sheet
Windows 7-cheat-sheet
 
NTFS vs FAT
NTFS vs FATNTFS vs FAT
NTFS vs FAT
 
G Infomgnt
G InfomgntG Infomgnt
G Infomgnt
 
Files and Folders in Windows 7
Files and Folders in Windows 7Files and Folders in Windows 7
Files and Folders in Windows 7
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
Social Media for Investigations Tools
Social Media for Investigations ToolsSocial Media for Investigations Tools
Social Media for Investigations Tools
 
WinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage ToolWinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage Tool
 
NTFS Forensics
NTFS Forensics NTFS Forensics
NTFS Forensics
 
Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...
 
Digital forensic upload
Digital forensic uploadDigital forensic upload
Digital forensic upload
 
Citrix
CitrixCitrix
Citrix
 

Similar to Operating Systems - File Management

File Management System in Shell Script.pptx
File Management System in Shell Script.pptxFile Management System in Shell Script.pptx
File Management System in Shell Script.pptx
Green University of Bangladesh
 
Managing your data - Introduction to Linux for bioinformatics
Managing your data - Introduction to Linux for bioinformaticsManaging your data - Introduction to Linux for bioinformatics
Managing your data - Introduction to Linux for bioinformatics
BITS
 
Edubooktraining
EdubooktrainingEdubooktraining
Edubooktraining
norhloudspeaker
 
Unix Administration
Unix AdministrationUnix Administration
Unix Administration
Nishant Munjal
 
Management file and directory in linux
Management file and directory in linuxManagement file and directory in linux
Management file and directory in linux
Zkre Saleh
 
Devops for beginners
Devops for beginnersDevops for beginners
Devops for beginners
Vivek Parihar
 
Command Line Tools
Command Line ToolsCommand Line Tools
Command Line Tools
David Harris
 
Unix Basics 04sp
Unix Basics 04spUnix Basics 04sp
Unix Basics 04spDr.Ravi
 
BITS: Introduction to Linux - Software installation the graphical and the co...
BITS: Introduction to Linux -  Software installation the graphical and the co...BITS: Introduction to Linux -  Software installation the graphical and the co...
BITS: Introduction to Linux - Software installation the graphical and the co...
BITS
 
Root file system for embedded systems
Root file system for embedded systemsRoot file system for embedded systems
Root file system for embedded systems
alok pal
 
BITS: Introduction to Linux - Text manipulation tools for bioinformatics
BITS: Introduction to Linux - Text manipulation tools for bioinformaticsBITS: Introduction to Linux - Text manipulation tools for bioinformatics
BITS: Introduction to Linux - Text manipulation tools for bioinformatics
BITS
 
Information and Communications Technology (ICT) General Application Software
 Information and Communications Technology (ICT)  General Application Software Information and Communications Technology (ICT)  General Application Software
Information and Communications Technology (ICT) General Application Software
Love Steven
 
Unix Administration 4
Unix Administration 4Unix Administration 4
Unix Administration 4
Information Technology
 
Vista Forensics
Vista ForensicsVista Forensics
Vista ForensicsCTIN
 

Similar to Operating Systems - File Management (20)

File Management System in Shell Script.pptx
File Management System in Shell Script.pptxFile Management System in Shell Script.pptx
File Management System in Shell Script.pptx
 
00-Review of Linux Basics
00-Review of Linux Basics00-Review of Linux Basics
00-Review of Linux Basics
 
Managing your data - Introduction to Linux for bioinformatics
Managing your data - Introduction to Linux for bioinformaticsManaging your data - Introduction to Linux for bioinformatics
Managing your data - Introduction to Linux for bioinformatics
 
Divya
DivyaDivya
Divya
 
Divya
DivyaDivya
Divya
 
Edubooktraining
EdubooktrainingEdubooktraining
Edubooktraining
 
Unix Administration
Unix AdministrationUnix Administration
Unix Administration
 
Management file and directory in linux
Management file and directory in linuxManagement file and directory in linux
Management file and directory in linux
 
Devops for beginners
Devops for beginnersDevops for beginners
Devops for beginners
 
Command Line Tools
Command Line ToolsCommand Line Tools
Command Line Tools
 
Unix Basics 04sp
Unix Basics 04spUnix Basics 04sp
Unix Basics 04sp
 
BITS: Introduction to Linux - Software installation the graphical and the co...
BITS: Introduction to Linux -  Software installation the graphical and the co...BITS: Introduction to Linux -  Software installation the graphical and the co...
BITS: Introduction to Linux - Software installation the graphical and the co...
 
Root file system for embedded systems
Root file system for embedded systemsRoot file system for embedded systems
Root file system for embedded systems
 
File system discovery
File system discovery File system discovery
File system discovery
 
BITS: Introduction to Linux - Text manipulation tools for bioinformatics
BITS: Introduction to Linux - Text manipulation tools for bioinformaticsBITS: Introduction to Linux - Text manipulation tools for bioinformatics
BITS: Introduction to Linux - Text manipulation tools for bioinformatics
 
Information and Communications Technology (ICT) General Application Software
 Information and Communications Technology (ICT)  General Application Software Information and Communications Technology (ICT)  General Application Software
Information and Communications Technology (ICT) General Application Software
 
Sahul
SahulSahul
Sahul
 
Sahul
SahulSahul
Sahul
 
Unix Administration 4
Unix Administration 4Unix Administration 4
Unix Administration 4
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 

More from Damian T. Gordon

Universal Design for Learning, Co-Designing with Students.
Universal Design for Learning, Co-Designing with Students.Universal Design for Learning, Co-Designing with Students.
Universal Design for Learning, Co-Designing with Students.
Damian T. Gordon
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to Microservices
Damian T. Gordon
 
REST and RESTful Services
REST and RESTful ServicesREST and RESTful Services
REST and RESTful Services
Damian T. Gordon
 
Serverless Computing
Serverless ComputingServerless Computing
Serverless Computing
Damian T. Gordon
 
Cloud Identity Management
Cloud Identity ManagementCloud Identity Management
Cloud Identity Management
Damian T. Gordon
 
Containers and Docker
Containers and DockerContainers and Docker
Containers and Docker
Damian T. Gordon
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
Damian T. Gordon
 
Introduction to ChatGPT
Introduction to ChatGPTIntroduction to ChatGPT
Introduction to ChatGPT
Damian T. Gordon
 
How to Argue Logically
How to Argue LogicallyHow to Argue Logically
How to Argue Logically
Damian T. Gordon
 
Evaluating Teaching: SECTIONS
Evaluating Teaching: SECTIONSEvaluating Teaching: SECTIONS
Evaluating Teaching: SECTIONS
Damian T. Gordon
 
Evaluating Teaching: MERLOT
Evaluating Teaching: MERLOTEvaluating Teaching: MERLOT
Evaluating Teaching: MERLOT
Damian T. Gordon
 
Evaluating Teaching: Anstey and Watson Rubric
Evaluating Teaching: Anstey and Watson RubricEvaluating Teaching: Anstey and Watson Rubric
Evaluating Teaching: Anstey and Watson Rubric
Damian T. Gordon
 
Evaluating Teaching: LORI
Evaluating Teaching: LORIEvaluating Teaching: LORI
Evaluating Teaching: LORI
Damian T. Gordon
 
Designing Teaching: Pause Procedure
Designing Teaching: Pause ProcedureDesigning Teaching: Pause Procedure
Designing Teaching: Pause Procedure
Damian T. Gordon
 
Designing Teaching: ADDIE
Designing Teaching: ADDIEDesigning Teaching: ADDIE
Designing Teaching: ADDIE
Damian T. Gordon
 
Designing Teaching: ASSURE
Designing Teaching: ASSUREDesigning Teaching: ASSURE
Designing Teaching: ASSURE
Damian T. Gordon
 
Designing Teaching: Laurilliard's Learning Types
Designing Teaching: Laurilliard's Learning TypesDesigning Teaching: Laurilliard's Learning Types
Designing Teaching: Laurilliard's Learning Types
Damian T. Gordon
 
Designing Teaching: Gagne's Nine Events of Instruction
Designing Teaching: Gagne's Nine Events of InstructionDesigning Teaching: Gagne's Nine Events of Instruction
Designing Teaching: Gagne's Nine Events of Instruction
Damian T. Gordon
 
Designing Teaching: Elaboration Theory
Designing Teaching: Elaboration TheoryDesigning Teaching: Elaboration Theory
Designing Teaching: Elaboration Theory
Damian T. Gordon
 
Universally Designed Learning Spaces: Some Considerations
Universally Designed Learning Spaces: Some ConsiderationsUniversally Designed Learning Spaces: Some Considerations
Universally Designed Learning Spaces: Some Considerations
Damian T. Gordon
 

More from Damian T. Gordon (20)

Universal Design for Learning, Co-Designing with Students.
Universal Design for Learning, Co-Designing with Students.Universal Design for Learning, Co-Designing with Students.
Universal Design for Learning, Co-Designing with Students.
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to Microservices
 
REST and RESTful Services
REST and RESTful ServicesREST and RESTful Services
REST and RESTful Services
 
Serverless Computing
Serverless ComputingServerless Computing
Serverless Computing
 
Cloud Identity Management
Cloud Identity ManagementCloud Identity Management
Cloud Identity Management
 
Containers and Docker
Containers and DockerContainers and Docker
Containers and Docker
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Introduction to ChatGPT
Introduction to ChatGPTIntroduction to ChatGPT
Introduction to ChatGPT
 
How to Argue Logically
How to Argue LogicallyHow to Argue Logically
How to Argue Logically
 
Evaluating Teaching: SECTIONS
Evaluating Teaching: SECTIONSEvaluating Teaching: SECTIONS
Evaluating Teaching: SECTIONS
 
Evaluating Teaching: MERLOT
Evaluating Teaching: MERLOTEvaluating Teaching: MERLOT
Evaluating Teaching: MERLOT
 
Evaluating Teaching: Anstey and Watson Rubric
Evaluating Teaching: Anstey and Watson RubricEvaluating Teaching: Anstey and Watson Rubric
Evaluating Teaching: Anstey and Watson Rubric
 
Evaluating Teaching: LORI
Evaluating Teaching: LORIEvaluating Teaching: LORI
Evaluating Teaching: LORI
 
Designing Teaching: Pause Procedure
Designing Teaching: Pause ProcedureDesigning Teaching: Pause Procedure
Designing Teaching: Pause Procedure
 
Designing Teaching: ADDIE
Designing Teaching: ADDIEDesigning Teaching: ADDIE
Designing Teaching: ADDIE
 
Designing Teaching: ASSURE
Designing Teaching: ASSUREDesigning Teaching: ASSURE
Designing Teaching: ASSURE
 
Designing Teaching: Laurilliard's Learning Types
Designing Teaching: Laurilliard's Learning TypesDesigning Teaching: Laurilliard's Learning Types
Designing Teaching: Laurilliard's Learning Types
 
Designing Teaching: Gagne's Nine Events of Instruction
Designing Teaching: Gagne's Nine Events of InstructionDesigning Teaching: Gagne's Nine Events of Instruction
Designing Teaching: Gagne's Nine Events of Instruction
 
Designing Teaching: Elaboration Theory
Designing Teaching: Elaboration TheoryDesigning Teaching: Elaboration Theory
Designing Teaching: Elaboration Theory
 
Universally Designed Learning Spaces: Some Considerations
Universally Designed Learning Spaces: Some ConsiderationsUniversally Designed Learning Spaces: Some Considerations
Universally Designed Learning Spaces: Some Considerations
 

Recently uploaded

Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 

Operating Systems - File Management

  • 2.
  • 3.  BELIEVE IT OR NOT…  From the computer’s point of view, there is no such thing as a file.  It is only because the operating system is creating the illusion of a file that they exist  From the computer’s point of view, there is only blocks of memory, either allocated or unallocated. Damian’s
  • 4.  The File Manager (or File Management System) is the manager in the Operating System that creates the illusion that there are files and folders being stored in computer memory. Operating System Files and Folders Memory LocationsHardware
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.  The File Manager ◦ Keeps track of where files are stored ◦ Determines how the files are stored ◦ Follows operating system file allocation policies ◦ Uses available storage space efficiently for files ◦ Creates a record/log of all file usage ◦ Allocates a file to a user if is free, and if they are permitted access to it. ◦ De-allocates file when user finished with it.
  • 17.  The file manager ALLOCATES a file by reading it from the hard disk and loading it into memory while updating its record of who is using what file.  The file manager DEALLOCATES a file by updating the file tables and rewriting the file (if changed) to the hard disk. Any processes waiting to access the file will be notified.
  • 18.  Some definitions: ◦ A FIELD is a collection of bytes that can be identified by a user, and has a type and size. ◦ A RECORD is a collection of related FIELDS. ◦ A FILE is a collection of records. ◦ A DIRECTORY (or FOLDER) is a special type of file that which has lists of files and their attributes.
  • 19.  Typical things you can do with a file are: ◦ CREATE ◦ OPEN ◦ DELETE ◦ RENAME ◦ COPY ◦ etc.
  • 20.  The name of a file is usually in two parts:
  • 21.  The name of a file is usually in two parts: ◦ MakeABackup.bat
  • 22.  The name of a file is usually in two parts: ◦ MakeABackup.bat Filename
  • 23.  The name of a file is usually in two parts: ◦ MakeABackup.bat Filename extension
  • 24. .avi Microsoft Video for Windows movie .dbf dbase II, III, IV data file .doc(x) Microsoft Word for Windows .gif Graphics Interchange Format .htm Hypertext Markup Language (common web page file) .html Hypertext Markup Language (common web page file) .jpg JPEG graphic file .mpg MPEG Video file .mid MIDI music file .mov QuickTime movie
  • 25. .pdf Adobe Portable Document Format file .ppt(x) PowerPoint file .psd Photoshop file .qxd QuarkXPress file .rm Real Audio/Video streaming file .rtf Rich Text Format .tif TIFF graphic file .txt ASCII text file .wav Sound file .xls(x) Excel spreadsheet
  • 26.  The full filename includes path information:  C:WINDOWSsystem32MakeABackup.bat Filename extension
  • 27.  The full filename includes path information:  C:WINDOWSsystem32MakeABackup.bat Filename extensionpath
  • 28.  The full filename includes path information:  C:WINDOWSsystem32MakeABackup.bat Filename extensionpath
  • 29.  If I am in the following folder:  C:WINDOWSsystem32BackupFolder  Then the address of the file is:  ..MakeABackup.bat
  • 30.  If I am in the following folder:  C:WINDOWSsystem32BackupFolder  Then the address of the file is:  ..MakeABackup.bat
  • 31.  The Operating System store files as records in memory, where many records make up a single file.  There are three main ways a file is physically stored in memory: ◦ Contiguous Storage ◦ Non-contiguous Storage ◦ Indexed Storage
  • 32.
  • 33.  Contiguous Storage means that records of a file are stored one after another.  It is a very simple policy to implement, and once you have found the start of the file, it’s very easy to find the rest of it.
  • 34.
  • 35. a b c d e f g h
  • 36. a b c d e f g h
  • 37. a b c d e f g h
  • 38. a b c d e f g h
  • 39. a b c d e f g h
  • 40. a b c d e f g h
  • 41. a b c d e f g h
  • 42. a b c d e f g h
  • 43. a b c d e f g h
  • 44. a b c d e f g h
  • 45. a b c d e f g h
  • 46. a b c d e f g h
  • 47.  The problem with is that if you have expand the file, you either need to have free space allocated at the end, or copy the whole file to a different location on the disk that has enough space.
  • 48.  Non-contiguous Storage means that records of a file are stored where ever there is free space.  The file manager will try to put as much of it together as possible, but there will be other part spread out over the disk.  These extra bits are sometimes called extents and these are linked together with pointers.  This means there is no easy way to determine the exact location of a record in a file.
  • 49. a b c d e f g h
  • 50. a b c d e f g h
  • 51. a b c d e f g h
  • 52. a b c d e f g h
  • 53. a b c d e f g h
  • 54. a b c d e f g h
  • 55. a b c d e f g h
  • 56. a b c d e f g h
  • 57. a b c d e f g h
  • 58.  Indexed Storage means that as well as the records in the file, an index block is created, with pointers to each individual file.
  • 59. v w x y za b c d e f g h
  • 60. v w x y za b c d e f g h
  • 61. v w x y za b c d e f g h
  • 62. v w x y za b c d e f g h
  • 63. v w x y za b c d e f g h Without an INDEX BLOCK, how do I find file 2?
  • 64. v w x y za b c d e f g h Without an INDEX BLOCK, how do I find file 2? We do a sequential search.
  • 65. v w x y za b c d e f g h
  • 66. v w x y za b c d e f g h
  • 67. v w x y za b c d e f g h
  • 68. v w x y za b c d e f g h
  • 69. v w x y za b c d e f g h
  • 70. v w x y za b c d e f g h
  • 71. v w x y za b c d e f g h
  • 72. v w x y za b c d e f g h
  • 73. v w x y za b c d e f g h
  • 74. v w x y za b c d e f g h
  • 75. v w x y za b c d e f g h
  • 76. v w x y za b c d e f g h
  • 77. v w x y za b c d e f g h
  • 78. v w x y za b c d e f g h
  • 79. v w x y za b c d e f g h
  • 80. v w x y za b c d e f g h
  • 81. v w x y za b c d e f g h
  • 82. v w x y za b c d e f g h
  • 83. v w x y za b c d e f g h
  • 84. v w x y za b c d e f g h
  • 85. v w x y za b c d e f g h
  • 86. v w x y za b c d e f g h
  • 87. v w x y za b c d e f g h
  • 88. v w x y za b c d e f g h
  • 89. v w x y za b c d e f g h
  • 90. v w x y za b c d e f g h
  • 91. v w x y za b c d e f g h
  • 92. v w x y za b c d e f g h
  • 93. v w x y za b c d e f g h
  • 94. v w x y za b c d e f g h
  • 95. v w x y za b c d e f g h
  • 96. v w x y za b c d e f g h
  • 97. v w x y za b c d e f g h
  • 98. v w x y za b c d e f g h So how does it work with an INDEX BLOCK?
  • 99. v w x y za b c d e f g h File Address Size Next File 1 1 4 9 File 1 9 4 - File 2 15 5 - INDEX BLOCK:
  • 100. v w x y za b c d e f g h File Address Size Next File 1 1 4 9 File 1 9 4 - File 2 15 5 - INDEX BLOCK:
  • 101. v w x y za b c d e f g h File Address Size Next File 1 1 4 9 File 1 9 4 - File 2 15 5 - INDEX BLOCK:
  • 102. v w x y za b c d e f g h File Address Size Next File 1 1 4 9 File 1 9 4 - File 2 15 5 - INDEX BLOCK:
  • 103. v w x y za b c d e f g h File Address Size Next File 1 1 4 9 File 1 9 4 - File 2 15 5 - INDEX BLOCK:
  • 104.  This support both sequential and direct access to records, and for larger files there can be multiple indexes.
  • 105.  The Access Control Matrix shows the access that each user has for each file on the system. The possible accesses are: ◦ R: Read ◦ W: Write ◦ E: Execute ◦ D:Delete
  • 106. User 1 User 2 User 3 User 4 User 5 File 1 RWED --E- --E- RWED R--- File 2 ---- R-E- R-E- R--- RWE- File 3 R-E- RW-- R-E- R-E- R--D File 4 R--- RWE- R--- RWED --E-
  • 107. Mary Anne Tom Bob Lyn Word. exe RWED --E- --E- RWED R-E- Lect1. ppt ---- R-E- R-E- R--- RWE- Scan. Exe R-E- RW-- R-E- R-E- R-ED Chrome. exe R-E- RWE- R-E- RWED --E-
  • 108.  In DOS the Access Controls are: ◦ R: Read ◦ W: Write ◦ C: Change ◦ F: Full Control
  • 109.  In DOS access to a file can assigned to one of two groups:  User  User Group
  • 110.  In DOS if we want to grant permissions to file, e.g. MakeABackup.bat, we do:  cacls
  • 111.  In DOS if we want to grant permissions to file, e.g. MakeABackup.bat, we do:  cacls filename arguments
  • 112.  In DOS if we want to grant permissions to file, e.g. MakeABackup.bat, we do:  cacls filename [/T] [/M] [/L] [/S[:SDDL]] [/E] [/C] [/G user:?] [/R user [...]] [/P user:? [...]] [/D user [...]]
  • 113.  In DOS cacls works as follows: Argument Description filename Display access control lists (ACLs) of file /T Changes ACLs of specified files in the current directory and all subdirectories. /M Changes ACLs of volumes mounted to a directory. /L Work on the Symbolic Link itself versus the target. /S Displays the SDDL string for the DACL. /S:SDDL Replaces the ACLs with those specified in the SDDL string (not valid with /E, /G, /R, /P, or /D).
  • 114.  In DOS cacls works as follows: Argument Description /E Edit ACL instead of replacing it. /C Continue on access denied errors. /G user:? Grant specified user access rights. ? can be: R, W, C, or F /R user Revoke specified user's access rights (only valid with /E). /P user:? Replace specified user's access rights. ? can be: R, W, C, or F /D user Deny specified user access.
  • 115.  Add Read-Only permission to a single file CACLS MakeABackup.bat /E /G "Power Users":R  Add Full Control permission to a second group of users CACLS MakeABackup.bat /E /G "FinanceUsers":F  Now revoke the Read permissions from the first group CACLS MakeABackup.bat /E /R "Power Users"
  • 116.  Now give the first group Full Control CACLS MakeABackup.bat /E /G "Power Users":F  Give Finance group Full Control of folder and all sub-folders CACLS c:docswork /E /T /C /G "FinanceUsers":F
  • 117.  In Linux/Unix the Access Controls are: ◦ R: Read ◦ W: Write ◦ X: Execute
  • 118.  In Linux/Unix access to a file can assigned to one of three groups:  User  User Group  World
  • 119.  In Linux/Unix access to a file can assigned to one of three groups:  User -you  User Group – everyone in your group  World – everyone with a login to the system
  • 120.  In Linux/Unix access to a file can assigned to one of three groups:  -rwxrwxrwx  User User Group World
  • 121.  In Linux/Unix access to a file can assigned to one of three groups:  -rwxrwxrwx -111111111
  • 122.  In Linux/Unix access to a file can assigned to one of three groups:  -rwxr-xr-x -111101101
  • 123.  In Linux/Unix access to a file can assigned to one of three groups:  -rwx--x--x -101001001
  • 124.  In Linux/Unix access to a file can assigned to one of three groups:  -rwxrwxrwx -111111111 - 7 7 7
  • 125.  In Linux/Unix access to a file can assigned to one of three groups:  -rwxr-xr-x -111101101 - 7 5 5
  • 126.  In Linux/Unix access to a file can assigned to one of three groups:  -rwx--x--x -111001001 - 7 1 1
  • 127.  If we want to grant permissions to file, e.g. MakeABackup.bat, we do:  chmod 755 MakeABackup.sh  chmod 777 MakeABackup.sh  chmod 700 MakeABackup.sh
  • 128.  In Linux/Unix, access to a file can assigned to one of three groups:  -rwxrwxrwx  User User Group World
  • 129.  In Linux/Unix, access to a folder/directory can assigned to one of three groups:  drwxrwxrwx  User User Group World