Create a struct data structure for each file contained

Assignment Help Database Management System
Reference no: EM13325465

Your assignment is organised into two parts:

Stage 1

In order to guide you through the design and implementation of the required application, perform the following steps including:

1. Write a password protected console-based application, which enables you to create user accounts and specify the name of the file or directory to be shared with other users.

2. Write a simple console-based (ie text-based) menu system to enable the users to select from a set of functions provided by your system including:

a. Create a new user

b. Create a database file, where the implementation requirements for this are defined in bullet point 3 (below).

c. Exit the program

3. Write a function that enables you to create a struct data structure for each file contained in your shared directory. Where each file signature record is stored in a struct of the following form:

struct FileSig {
char name[256]; // File or directory name int mode; // protection and file type int user_id; // User ID of owner
int group_id; // Group ID of owner int size; // file size in bytes
char time_last_mod[50]; // modify time as a string
};

4. Add to your main() function relevant statement(s) to create an instance of the FileSig struct called fileSig. Also use in your main function relevant code to initialise your fileSig struct for two filenames of your choice. Hint: when initialising the fileSig struct ask the user to enter file information/detail rather than by interfacing the Filesystem.


Please note:

For the Stage 1 submission you are not required to do any file I/O for instance to store your file details and/or directory listing. But this will come in Stage 2.

Stage 2:

In order to guide you through the implementation of the new functionality, please follow the following steps including:

Part 1

Extend your program by writing a new C function, which will store and save the logging information into a text file called config.txt. Thus, you will need to amend your code to validate the username and password details entered by a user against those stored on file. Consequently, your system should allow access if users have a valid username and password.

Part 2

Extend your program by writing a new C function to take as input a file containing a list of file names (fully qualified path names; one per line) and produce a database file consisting of file signature records. It is upto you to decide how to generate this file - either manually using the ls command, or by other means. In this file each file signature record is stored in a struct of the following form:

typedef struct {
char name[256]; /*File or directory name*/ u_short mode; /*protection and file type*/ short user_id; /*User ID of owner*/
short group_id; /*Group ID of owner*/
off_t size; /*file size in bytes*/
char time_last_mod[50]; /*modify time as a string*/
} fileSig;
Hint: All needed information to perform this task can be found in the inode. To modify time, use function ctime to convert to a human readable string. The function prototype can be as follows:

void mkSigData(<fileList>, <database>);

where <fileList> is the name of the file that contains the list of files to get information about. The <database> is the name of the file (your program will create) that will contain the selected inode information for all the files. This database file will contain a series of structs of type fileSig (outlined above), one for each file listed in the fileList.

There must be no other output apart from standard error output associated with system call and function call errors.

Part 3

Extend your program by writing a new C function that will take as input the database file generated in Part 2. The function should simply print to screen the details of each fileSig stored.

Reference no: EM13325465

Questions Cloud

Evaluate the difference in the chemical potential : Calculate the difference in the chemical potential of sucrose at 0.01 M and at 0.0001 M concentrations.
Find the total electric potential at the origin : Two point charges are on the y axis. A 5.20-µC charge is located at y = 1.25 cm, and a -2-µC charge is located at y = ?1.80 cm. Find the total electric potential at the origin
Explain the difference between efficacy and effectiveness : Explain the difference between efficacy and effectiveness from a health care perspective. How does a hospital administrator create a balance between the two?
To analyse a given business case : To analyze a given business case and propose a knowledge management system design for the given business problem.
Create a struct data structure for each file contained : Write a password protected console-based application, which enables you to create user accounts and specify the name of the file or directory to be shared with other users.
What are the nominal and effective interest rates : Tony Soprano borrowed $200,000 from his "Shylock" friend Herb to cover his gambling losses. The "vig" is 1.5 points (%) per week. What are the nominal and effective interest rates?
What would be the speed of the electron in this model : An early model of the hydrogen atom viewed it as an electron orbiting a proton in a circular path with a radius of 5.29×10?11m. What would be the speed of the electron in this model
They are offered financing which requires : Jerry and his wife decide this is a good time to buy a house.They have a down payment and need to borrow $250,000.They are offered financing which requires a 2% loan origination fee and monthly payments of $1,500 per month for 30 years.what is their ..
How much consumer surplus does he receive : On Thursday nights, a local restaurant has a pasta special. Ari likes the restaurant’s pasta. His willingness to pay for each serving is shown below:

Reviews

Write a Review

Database Management System Questions & Answers

  Create a relational database schema

Draw the ER diagram for the database described above and create a relational database schema for this model assuming

  Compose conceptual data modeling techniques

Explain the fundamentals of how data is physically stored and accessed and compose conceptual data modeling techniques that capture information requirements - design a relational database so that it is at least in 3NF.

  Explain the security mechanisms available for a database

Use technology and information resources to research issues in database systems. Write clearly and concisely about relational database management systems using proper writing mechanics and technical style conventions.

  Design and build a prototype data warehouse

Design and build a prototype data warehouse using the data on Spend over £25,000 in the Science and Technology Facilities Council

  Write procedure to construct character frequency table

Write the procedure named Get_frequencies which constructs character frequency table. Input to procedure must be a pointer to the string, and pointer to array of 256 doublewords.

  Database management systems

Rubric for PowerPoint Presentation Points

  Explain normal form is denormalized table

Which field or fields cause a table to no longer be in third normal form? In which normal form is denormalized table?

  Define calculations and format the table

internship at Mountain View Realty, a real estate firm that focuses in the North Utah County area. The previous intern developed a spreadsheet listing houses listed and sold during the last several months. She included addresses, location, list pr..

  Determine the names of all tracks from table

All primary keys are underlined. All foreign keys have same name as primary key that they are referencing. Determine the names of all Tracks which are more than 10 minutes (600,000 ms) long.

  Advantages and disadvantages of joins and nested queries

One side effect of normalization is that you often need more than one table to get meaningful results. For example, you may have a table that includes a list of parts and the ID number for the vendor of each part. T

  Triggers important in database systems

What are triggers used for, and why are they important in database systems? Provide an example of a situation where a trigger would be appropriate.

  Developing a database

You have been asked to develop a database utilizing only the written problem description given by the client. In reviewing the description.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd