Design a file system checker for our file system

Assignment Help Basic Computer Science
Reference no: EM13706087

Design a file system checker for our file system. You should call it csefsck. It will have to do the following:

  1. The DeviceID is correct
  2. All times are in the past, nothing in the future
  3. Validate that the free block list is accurate this includes
    1. Making sure the free block list contains ALL of the free blocks
    2. Make sure than there are no files/directories stored on items listed in the free block list
  4. Each directory contains . and .. and their block numbers are correct
  5. Each directory's link count matches the number of links in the filename_to_inode_dict
  6. If the data contained in a location pointer is an array, that indirect is one
  7. That the size is valid for the number of block pointers in the location array. The three possibilities are:
    1. size<blocksize if and size>0
    2. size<blocksize*length of location array if indirect!
    3. size>blocksize*(length of location array-1) if indirect

 

Reference no: EM13706087

Questions Cloud

Describe the logistics system : Describe the steps in making sure that flights take off on time for an airline. Describe the different steps that must occur for an on-time plane departure.
What is use of the mac and ip for vlan 1 in a cisco switch : Implement the network topology using Packet Tracer - How many MAC does the 24 port Cisco switch used in the Packet Tracer - How many MAC does the 24 port Cisco switch used in the Packet Tracer has and what is the use of the MAC and IP for VLAN 1 in ..
The solution is some real number : Let P be a problem. For any instance x ∈ P, the solution is some real number f(x). Let A be a randomized algorithm for P, such that it gives a solution A(x) that lies in [1/2f(x), 2f(x)] with probability 2/3.
Using a competitive ratio measure : Imagine you are standing next to a long fence, extending as far as you can see in both directions. You want to cross the fence and you know that somewhere it has a hole you can go through. But, you don't know whether the hole is to your right or..
Design a file system checker for our file system : Design a file system checker for our file system. You should call it csefsck. It will have to do the following: The DeviceID is correct All times are in the past, nothing in the future Validate that the free block list is accurate this includ..
Suppose you want to manage a relatively small project : Suppose you want to manage a relatively small project, but you have no access to project management software of any kind. How could you use a spreadsheet program or a database program to manage the project? Share your ideas in 750 words.
Advantages and disadvantages to a firm of financial hedging : What are the advantages and disadvantages to a firm of financial hedging of its operating exposure compared to operational hedges (such as relocating its manu-facturing site)?
Control recommendation strategies in computer security : Control recommendation strategies in computer security environment. This must be an APA style report with in text citation for example (Stallings, 2012) and I need the reference in APA style at the end.
Give an example of an instance of stable matching problem : Give an example of an instance of stable matching problem with at least three different stable matchings. That is, for some positive integer n, give ranking lists for each of n doctors L1, ..., Ln and ranking lists for each of n hospitals L01, ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Policies and provisions to unbundled network elements

What are some of the major policies and provisions under the 1996 Act in regards to unbundled network elements (UNEs).

  What would be the largest number of frames lost

Assuming PPP-like framing, what would be the largest number of frames lost at the receiving end if one if the flag bytes were changed due to error. The only error that can occur is a single flag byte turning into a non-flag byte. Explain your answ..

  What windows server 2008 capability

The IT Department wants to install Windows Server 2008 Standard Edition on 14 new servers in its primary location. The servers have arrived, are unpacked, and have been tested.

  Write appropriate methods

Write a program that can be used to determine the tip amount that should be added to a restaurant  charge.

  Access control system

What access control system is most valuable for protecting enterprise systems? Why? What are two specific strengths and two specific drawbacks for your chosen access control system?

  Briefly explain the main concept of a java virtual machine

Briefly explain the main concept of a Java Virtual Machine (JVM.)

  Event drive programming

Lets look at event drive programming. What is an event driven program? What are events associated with? What are examples of common events?

  Write java statement display string 100 in dialogbox

Write a Java statement to display the string "The value is 100" to a user in a plain dialog box.

  Peter sold an investment property in sydney and the

1.this assignment is to be submitted in accordance with assessment policy stated in the subject outline and student

  Find an efficient algorithm to determine

Find an efficient algorithm to determine

  How has the progression of communication technology

How has the progression of communication technology affected the business environment?

  Write a mips program that will alter an array of 100 doubles

Write a MIPS program that will alter an array of 100 doubles. No input or output is required. We will assume somebody else did it. Your program modifies the elements in the array as described

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd