Explain the entry-sequenced file organization, Operating System

Assignment Help:

Entry-sequenced file organization

The records in an entry-sequenced file are store up in the order they are written into the file. New records are for all time appended to the end of the file. When records are removed from an entry-sequenced file the space formerly allocated to those records is not automatically reclaimed or reused. The only means to reclaim this space is by using the sfs_ReorganizeFile function. Entry-sequenced files are often used when records in the file will be accessed in the order that they are written to the file. This type of file organization is frequently used for log files, audit trail files, or for any other files that keep time-sequenced records of events.

Entry-sequenced files are able to contain fixed-length or variable-length records. When an existing record is updated then the updated record must be no longer than the original record. Every record in an entry-sequenced file has an entry sequence number (ESN) which are corresponds to the order in which it was inserted into the file. The ESN isn't part of the record, and is therefore said to be implicit. Because the value of the primary index key for entry-sequenced files isn't part of the record, merely the name of the primary index must be specified when creating an entry-sequenced file in SFS. It isn't necessary to supply names of fields on which to base the index.

When records are read by an entry-sequenced file a sequential scan on the primary index (ESN) for the file returns records in the order in which they were inserted regardless of whether they have subsequently been updated. Records that have been deleted don't show up when an entry-sequenced file is scanned.


Related Discussions:- Explain the entry-sequenced file organization

What is degree of multiprogramming?, What is degree of multiprogramming ? ...

What is degree of multiprogramming ? Degree of multiprogramming signifies the number of processes in memory. If the degree of Multiprogramming is steady after that the average

Multi-level page tables, Multi-level page tables are tree-like structures t...

Multi-level page tables are tree-like structures to hold page tables. As an example, consider a two- level page table, again on a 32-bit architecture with 212 = 4 kbyte pages. Now,

How resolution of externally defined symbols is performed, Resolution of ex...

Resolution of externally defined symbols is carried out by    Resolution of externally defined symbols is carried out by Linker

What are overlays, What are overlays? To enable a process to be larger ...

What are overlays? To enable a process to be larger than the amount of memory allocated to it, overlays are used. The idea of overlays is to keep in memory only those instructi

Question, A paper mill produces two grades of paper viz., X and Y. Because ...

A paper mill produces two grades of paper viz., X and Y. Because of raw material restrictions, it cannot produce more than 400 tons of grade X paper and 300 tons of grade Y paper i

Identify the binding and non-binding constraints, Crumbles Bakery needs to ...

Crumbles Bakery needs to decide how many and what types of cupcakes to make today. Currently, they make two types of cupcakes: chocolate cupcakes and carrot cake cupcakes. Chocolat

Explain the thread contextual data, Explain the Thread Contextual Data  ...

Explain the Thread Contextual Data  Threads in Net Ware carry additional context as well. Per-thread, stacks, errno, Net Ware Errno, t_errno and others are available to the ap

What are the operations of processes, What are the operations of processes?...

What are the operations of processes? Process creation A process may create several new processes. The creating process is called as parent process, where as the new proce

File management, five major activities on file management in operating syst...

five major activities on file management in operating system.? Explain it.?

Locks - mutexes, Locks (also known as mutexes, short for mutual exclusion l...

Locks (also known as mutexes, short for mutual exclusion locks) provide mutual exclusion to shared data inside a critical session. They are implemented by means of two atomic routi

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd