Explain the file-system manipulation, Operating System

Q. Explain the File-system manipulation?

File-system manipulation there is several details in file allocation, creation, deletion and naming that users should not have to perform. Blocks of disk space are utilized by files and must be tracked.

Deleting a file requires eliminating the name file information and freeing the allocated blocks. Protections must as well be checked to assure proper file access. User programs could neither make sure adherence to protection methods nor be trusted to allocate only free blocks and deallocate blocks on file deletion.

Posted Date: 7/27/2013 2:25:38 AM | Location : United States







Related Discussions:- Explain the file-system manipulation, Assignment Help, Ask Question on Explain the file-system manipulation, Get Answer, Expert's Help, Explain the file-system manipulation Discussions

Write discussion on Explain the file-system manipulation
Your posts are moderated
Related Questions
Explain the Fork Function Fork function causes a new process to be created. The calling progress is duplicated as an exact copy (called the child process) that differs only in

The CTO is still impressed with your work. He just came back from a technology exposition where he heard about computer clusters. All he knows is that they are the big thing for bu

Basic concepts When a process is to be changed in, the pager guesses which pages will be used before the process is changed out again. Instead of swapping in a entire process,

Deadlock Detection and Recovery It's a method of permitting the system to enter a deadlock state, detect it and then recover. Deadlock detection : Is the process of



Q.  What kind of operating system is Windows XP? Describe two of its major features. Answer: A 32 or 64 bit pre-emptive multitasking operating system supporting multiple use

Explain the Request or Response interface The Request/Response interface is ideal for a message based client-server interaction. By modeling components to interact via a reque

Your task is to replace the round robin CPU scheduling scheme you developed in Practical 6 with a priority-based scheduling algorithm. To simplify matters, you can maintain the ori

What are the common strategies to select a free hole from a set of available holes? The most common methods are a. First fit b. Best fit c. Worst fit