How would you specify the given protection scheme in unix

Assignment Help Operating System
Reference no: EM131504733

Assignment: File Management Paper

Choose one of the following options:

• Option 1: Write a 1- to 2-page paper that discusses the following scenario: Consider a system that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one file. How would you specify this protection scheme in UNIX?

• Option 2: Write a 1- to 2-page paper that discusses the following scenario: Consider a system that supports 5,000 users. Suppose that you want to allow 4,990 of those users to be able to access one file. Suggest another protection scheme that can be used more effectively for this purpose than the scheme provided by UNIX?

• Option 3: Write a 1- to 2-page paper that discusses the following scenario: Some systems keep track of the types of a file, others leave it to the user, and yet others simply do not implement multiple file types. Which system is better?
Learning Team: Unix, Linux, Mac OS, Windows Operating Systems Comparison

Submit an informal project plan containing the following:

• The team members who are responsible for each part of the final project
• The team approach to the project
• A schedule for completing the project with weekly milestones.

Reference no: EM131504733

Questions Cloud

Explain function and internal structure of program module : Explain Function and internal structure of each program module. Complete the Visual Logic flowchart that represents the algorithm.
Corporate and national interests in latin america : What kinds of opposition formed against U.S. corporate and national interests in Latin America?
How change can be implemented based on your evaluation : Critically evaluate the strengths and weaknesses of the author's opinion and discuss the positive and negative points based on own overall judgment.
Explain memory management requirements : Explain memory management requirements. Explain the differences in memory management between Windows and Linux.
How would you specify the given protection scheme in unix : Suppose you want to allow 4,990 of those users to be able to access one file. How would you specify this protection scheme in UNIX?
Describe the gnu public license and its role : Assignment: Open and Closed Source Systems- Option 1: Write a 1- to 2-page paper defining and describing the GNU public license and its role.
Prove that fill-in is restricted to the spikes of a : The statement that "in computing the triangular factorization LnLn-1,..........,L1A = U fill-in occurs in the jth column" means that Lj has a nonzero entry.
Measures that the us national government took : Explore the various measures that the U.S. national government took, from the 1930s through the 1950s, to strengthen the domestic U.S. economy.
Compute the energy levels for a benzene molecule : ECE 212B Spring 2017 Homework. Compute the energy levels for a benzene molecule using the simple Huckel model

Reviews

Write a Review

Operating System Questions & Answers

  What new domains did you identify

This is an introduction to using search engines for penetration testing. "Google Hacking" is a valuable skill for penetration testers. What new domains did you identify?

  Write down three parts of linux kernel version number

Write down the three parts of Linux kernel version number, and which is least probable to change? What are "BogoMIPS", and what is their significance?

  Describe the concept of a signal, and indicate configuration

When a child process is fork()ed, a parent may wait for the successful completion of the child via the wait() service (or one of its variants) so that the return result of that application can be read from the process descriptor block.

  Use the appropriate parameters to pass information

When creating this program please write the program so that the function main, in addition to the variable declaration, is merely a collection of function calls. Your program should use the following functions

  Simulate and evaluate a virtual memory system

Simulate and evaluate a virtual memory system, and experiment with different page replacement algorithms. You will need a threads package, e.g., pThreads thread package.

  Estimate the compression factor for music.

The CPU of a video server has a utilization of 65%. How many movies can it show using RMS scheduling?

  Individual operating systems

Discuss and explain the statement: "Global communication has developed to such a degree that the true operating system is the net itself, where the individual operating systems are just its nodes".

  Which declaration of x is the correct one for a reference

Assuming static scoping, which declaration of X is the correct one for a reference to X in the following

  Briefly compare and contrast windows and ubuntu linux

Explain how to select the operating system you want to boot in terms and steps a novice computer user can follow (use screen captures as necessary).

  As computers have evolved the complexity of operating

write 400-600 words that respond to the following questions with your thoughts ideas and comments. this will be the

  Describe the buddy system of memory allocation

Define latency, transfer and seek time with respect to disk I/O. Describe the Buddy system of memory allocation.

  Explain operating system innovation you have come up with

Consider providing a scenario to better illustrate the challenge. Explain the operating system innovation you have come up with. Describe how this innovation will resolve the issue or challenge.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd