Operation on file system, Operating System

Assignment Help:

Question :

The file system is the most visible aspect of an operating system. It provides the mechanism for on-line storage and access to both data and programs of the operating system and to all the users of the computer system.

(a) What is a file?

(b) Many systems require and open system call and a close system call. Explain the purpose of the open and close operations.

(c) Some systems automatically open a file when it is referenced for the first time, and close the file when the job terminates. What is the advantage and disadvantage of this scheme as compared to the more traditional one, where the user has to open and close the file explicitly?

(d) Just as a file must be opened before it is used, a file system must be mounted before it can be available to processes in the system. Describe the mount procedure that is performed by the operating system.

(e) Consider a file system where a file can be deleted and its disk space reclaimed while links to that file still exists.

I. What problems may occur if a new file is created in the same storage area or with same absolute path name?

II. How can these problems be avoided?


Related Discussions:- Operation on file system

Advanced synchronization in operating system, Recall that condition variabl...

Recall that condition variables are synchronization primitives that enable threads to wait until a particular condition occurs. Generalizing, the combination of locks and condit

Operational management, explain the link between operations management and ...

explain the link between operations management and strategic planning of daily goods shop

Information system can be divided into three task areas, From hardware pers...

From hardware perspective, every information system can be divided into three task areas Presentation, Application Logic and Data Storage. The R/3 Basis software is extremely s

Define a public key encryption system, Define a public key encryption syste...

Define a public key encryption system Allows just the correct receiver to decode the data

How is it different from the unbounded buffer algori, How is it different f...

How is it different from the unbounded buffer algorithm ? Explain.

Bind a real-time thread to an lwp, Q. Suppose an operating system maps user...

Q. Suppose an operating system maps user-level threads to the kernel utilizing the many-to-many model where the mapping is done through the use of LWPs. In addition the system allo

Explain resource allocation graph, RESOURCE ALLOCATION GRAPH When a pro...

RESOURCE ALLOCATION GRAPH When a process Pi wishes an instance of resource type Rj, a request edge is inserted in the resource allocation graph. When this request is able to be

Operating system, What criteria are important in choosing a file organisati...

What criteria are important in choosing a file organisation?

What do you understand by “line balancing”? What happens if , What do you u...

What do you understand by “line balancing”? What happens if balance doesn’t exist?

Data transfer between two processes, Q. Data transfer between two processes...

Q. Data transfer between two processes? Communication: Data transfer between two processes is essential for some time. Both processes are on the one computer or on different

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd