Explain relative file organization, Operating System

Assignment Help:

Relative file organization

A relative file is an array of fixed-length slots and the records can be inserted in the first free slot found from the beginning of the file and at the end of the file or in a specified slot in the file. Relative files are habitually used when record number will access records directly. Since each of the slots in a relative file is the same size, SFS is able to calculate the position of a specific record (identified by record number) by multiplying the record number by the record slot size.

The records in a relative file is able to be composed of fixed or variable-length fields except the size of each slot in the file is that of the maximum record size (which is calculated from the record specification when a relative file is created). The records in a relative file are able to be updated or deleted in place. Any slots free when records are deleted are able to be reused by subsequent insertions.

The primary index or else a relative file are based on the relative slot number (RSN), which correspond to the number of the slot occupied by a record the first relative slot number in a file is slot number 0 and the highest slot number can't exceed the maximum number of records specified when the file was created and the RSN is a physical part of the user's data record in Contrast this with the ESN used in entry-sequenced files. While a relative file is created at least one field must be of type sfs_unsignedInt32. This field ought to be specified as the primary index

 


Related Discussions:- Explain relative file organization

Explain about deadlock detection, Explain about deadlock detection? In ...

Explain about deadlock detection? In deadlock situation, the system must provide An algorithm that verifies the state of the system to verify whether a deadlock has occu

Processes- making the system more responsive and useful, Processes- Making ...

Processes- Making the System More Responsive and Useful A method by definition build up of a code execution and resource ownership. A process has two main characteristics, code

List antivirus techniques used for protection purposes, Question: a) Th...

Question: a) There are main goals of data security. List them and elaborate on how they provide protection. b) Describe threats associated with data security. c) Describe

Can we call trap as an interrupt??, is there any difference between the tra...

is there any difference between the trap and interrupt??

Explain next fit algorithm, NEXT FIT ALGORITHM Here scanning starts fro...

NEXT FIT ALGORITHM Here scanning starts from the first fit position and then it finds the next position which is large sufficient to hold the process. Thus the name next fit.

Write an equation for this seek time, Q. The accelerating search for descr...

Q. The accelerating search for described in subsequent exercise is typical of hard-disk drives. By contrast floppy disks and several hard disks manufactured before the mid-1980s t

Explaintable management techniques, Discuss in detail Table management Tech...

Discuss in detail Table management Techniques?     An Assembler employs the subsequent tables: OPTAB: Operation Code Table consists of mnemonic operation code and its machi

Determine a processing that is not a part of synthesis phase, Determine a p...

Determine a processing that is not a part of Synthesis phase  Perform LC processing is not a part of Synthesis phase

Explain the purpose of command-line application, Question: a) The follo...

Question: a) The following questions refers to Windows XP networking: i) Briefly, explain how a host joins a network using DHCP? ii) Which IP address could be assigned to a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd