SlideShare a Scribd company logo
Damian Gordon
Operating Systems: File Management
 BELIEVE IT OR NOT…
 From the computer’s point of view, there is
no such thing as a file.
 It is only because the operating system is
creating the illusion of a file that they exist
 From the computer’s point of view, there is
only blocks of memory, either allocated or
unallocated.
Damian’s
 The File Manager (or File Management
System) is the manager in the Operating
System that creates the illusion that there are
files and folders being stored in computer
memory.
Operating System Files and
Folders
Memory
LocationsHardware
Operating Systems: File Management
Operating Systems: File Management
Operating Systems: File Management
Operating Systems: File Management
Operating Systems: File Management
Operating Systems: File Management
Operating Systems: File Management
Operating Systems: File Management
Operating Systems: File Management
Operating Systems: File Management
Operating Systems: File Management
 The File Manager
◦ Keeps track of where files are stored
◦ Determines how the files are stored
◦ Follows operating system file allocation policies
◦ Uses available storage space efficiently for files
◦ Creates a record/log of all file usage
◦ Allocates a file to a user if is free, and if they are
permitted access to it.
◦ De-allocates file when user finished with it.
 The file manager ALLOCATES a file by reading
it from the hard disk and loading it into
memory while updating its record of who is
using what file.
 The file manager DEALLOCATES a file by
updating the file tables and rewriting the file
(if changed) to the hard disk. Any processes
waiting to access the file will be notified.
 Some definitions:
◦ A FIELD is a collection of bytes that can be
identified by a user, and has a type and size.
◦ A RECORD is a collection of related FIELDS.
◦ A FILE is a collection of records.
◦ A DIRECTORY (or FOLDER) is a special type of file
that which has lists of files and their attributes.
 Typical things you can do with a file are:
◦ CREATE
◦ OPEN
◦ DELETE
◦ RENAME
◦ COPY
◦ etc.
 The name of a file is usually in two parts:
 The name of a file is usually in two parts:
◦ MakeABackup.bat
 The name of a file is usually in two parts:
◦ MakeABackup.bat
Filename
 The name of a file is usually in two parts:
◦ MakeABackup.bat
Filename extension
.avi Microsoft Video for Windows movie
.dbf dbase II, III, IV data file
.doc(x) Microsoft Word for Windows
.gif Graphics Interchange Format
.htm Hypertext Markup Language (common web page file)
.html Hypertext Markup Language (common web page file)
.jpg JPEG graphic file
.mpg MPEG Video file
.mid MIDI music file
.mov QuickTime movie
.pdf Adobe Portable Document Format file
.ppt(x) PowerPoint file
.psd Photoshop file
.qxd QuarkXPress file
.rm Real Audio/Video streaming file
.rtf Rich Text Format
.tif TIFF graphic file
.txt ASCII text file
.wav Sound file
.xls(x) Excel spreadsheet
 The full filename includes path information:
 C:WINDOWSsystem32MakeABackup.bat
Filename extension
 The full filename includes path information:
 C:WINDOWSsystem32MakeABackup.bat
Filename extensionpath
 The full filename includes path information:
 C:WINDOWSsystem32MakeABackup.bat
Filename extensionpath
 If I am in the following folder:
 C:WINDOWSsystem32BackupFolder
 Then the address of the file is:
 ..MakeABackup.bat
 If I am in the following folder:
 C:WINDOWSsystem32BackupFolder
 Then the address of the file is:
 ..MakeABackup.bat
 The Operating System store files as records in
memory, where many records make up a
single file.
 There are three main ways a file is physically
stored in memory:
◦ Contiguous Storage
◦ Non-contiguous Storage
◦ Indexed Storage
Operating Systems: File Management
 Contiguous Storage means that records of a
file are stored one after another.
 It is a very simple policy to implement, and
once you have found the start of the file, it’s
very easy to find the rest of it.
Operating Systems: File Management
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
 The problem with is that if you have expand
the file, you either need to have free space
allocated at the end, or copy the whole file to
a different location on the disk that has
enough space.
 Non-contiguous Storage means that records
of a file are stored where ever there is free
space.
 The file manager will try to put as much of it
together as possible, but there will be other
part spread out over the disk.
 These extra bits are sometimes called extents
and these are linked together with pointers.
 This means there is no easy way to determine
the exact location of a record in a file.
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
 Indexed Storage means that as well as the
records in the file, an index block is created,
with pointers to each individual file.
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
Without an INDEX BLOCK,
how do I find file 2?
v w x y za b c d e f g h
Without an INDEX BLOCK,
how do I find file 2?
We do a sequential search.
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
So how does it work with
an INDEX BLOCK?
v w x y za b c d e f g h
File Address Size Next
File 1 1 4 9
File 1 9 4 -
File 2 15 5 -
INDEX BLOCK:
v w x y za b c d e f g h
File Address Size Next
File 1 1 4 9
File 1 9 4 -
File 2 15 5 -
INDEX BLOCK:
v w x y za b c d e f g h
File Address Size Next
File 1 1 4 9
File 1 9 4 -
File 2 15 5 -
INDEX BLOCK:
v w x y za b c d e f g h
File Address Size Next
File 1 1 4 9
File 1 9 4 -
File 2 15 5 -
INDEX BLOCK:
v w x y za b c d e f g h
File Address Size Next
File 1 1 4 9
File 1 9 4 -
File 2 15 5 -
INDEX BLOCK:
 This support both sequential and direct
access to records, and for larger files there
can be multiple indexes.
 The Access Control Matrix shows the access
that each user has for each file on the
system. The possible accesses are:
◦ R: Read
◦ W: Write
◦ E: Execute
◦ D:Delete
User
1
User
2
User
3
User
4
User
5
File 1 RWED --E- --E- RWED R---
File 2 ---- R-E- R-E- R--- RWE-
File 3 R-E- RW-- R-E- R-E- R--D
File 4 R--- RWE- R--- RWED --E-
Mary Anne Tom Bob Lyn
Word.
exe
RWED --E- --E- RWED R-E-
Lect1.
ppt
---- R-E- R-E- R--- RWE-
Scan.
Exe
R-E- RW-- R-E- R-E- R-ED
Chrome.
exe
R-E- RWE- R-E- RWED --E-
 In DOS the Access Controls are:
◦ R: Read
◦ W: Write
◦ C: Change
◦ F: Full Control
 In DOS access to a file can assigned to one of
two groups:
 User
 User Group
 In DOS if we want to grant permissions to
file, e.g. MakeABackup.bat, we do:
 cacls
 In DOS if we want to grant permissions to
file, e.g. MakeABackup.bat, we do:
 cacls filename arguments
 In DOS if we want to grant permissions to
file, e.g. MakeABackup.bat, we do:
 cacls filename [/T] [/M] [/L] [/S[:SDDL]] [/E]
[/C] [/G user:?] [/R user [...]] [/P user:? [...]]
[/D user [...]]
 In DOS cacls works as follows:
Argument Description
filename Display access control lists (ACLs) of file
/T Changes ACLs of specified files in the
current directory and all subdirectories.
/M Changes ACLs of volumes mounted to a
directory.
/L Work on the Symbolic Link itself versus the
target.
/S Displays the SDDL string for the DACL.
/S:SDDL Replaces the ACLs with those specified in
the SDDL string (not valid with /E, /G, /R,
/P, or /D).
 In DOS cacls works as follows:
Argument Description
/E Edit ACL instead of replacing it.
/C Continue on access denied errors.
/G user:? Grant specified user access rights.
? can be: R, W, C, or F
/R user Revoke specified user's access rights (only
valid with /E).
/P user:? Replace specified user's access rights.
? can be: R, W, C, or F
/D user Deny specified user access.
 Add Read-Only permission to a single file
CACLS MakeABackup.bat /E /G "Power Users":R
 Add Full Control permission to a second group of users
CACLS MakeABackup.bat /E /G "FinanceUsers":F
 Now revoke the Read permissions from the first group
CACLS MakeABackup.bat /E /R "Power Users"
 Now give the first group Full Control
CACLS MakeABackup.bat /E /G "Power Users":F
 Give Finance group Full Control of folder and all sub-folders
CACLS c:docswork /E /T /C /G "FinanceUsers":F
 In Linux/Unix the Access Controls are:
◦ R: Read
◦ W: Write
◦ X: Execute
 In Linux/Unix access to a file can assigned to
one of three groups:
 User
 User Group
 World
 In Linux/Unix access to a file can assigned to
one of three groups:
 User -you
 User Group – everyone in your group
 World – everyone with a login to the system
 In Linux/Unix access to a file can assigned to
one of three groups:
 -rwxrwxrwx
 User User Group World
 In Linux/Unix access to a file can assigned to
one of three groups:
 -rwxrwxrwx
-111111111
 In Linux/Unix access to a file can assigned to
one of three groups:
 -rwxr-xr-x
-111101101
 In Linux/Unix access to a file can assigned to
one of three groups:
 -rwx--x--x
-101001001
 In Linux/Unix access to a file can assigned to
one of three groups:
 -rwxrwxrwx
-111111111
- 7 7 7
 In Linux/Unix access to a file can assigned to
one of three groups:
 -rwxr-xr-x
-111101101
- 7 5 5
 In Linux/Unix access to a file can assigned to
one of three groups:
 -rwx--x--x
-111001001
- 7 1 1
 If we want to grant permissions to file, e.g.
MakeABackup.bat, we do:
 chmod 755 MakeABackup.sh
 chmod 777 MakeABackup.sh
 chmod 700 MakeABackup.sh
 In Linux/Unix, access to a file can assigned to
one of three groups:
 -rwxrwxrwx
 User User Group World
 In Linux/Unix, access to a folder/directory
can assigned to one of three groups:
 drwxrwxrwx
 User User Group World
Operating Systems: File Management

More Related Content

PDF
Linux directory structure by jitu mistry
PDF
Linux Directory Structure
PPT
Unix File System
PPTX
DOS - Disk Operating System
PDF
Part 4 of 'Introduction to Linux for bioinformatics': Managing data
PPTX
Files and directories in Linux 6
PDF
An Introduction To Linux
PPTX
File management
Linux directory structure by jitu mistry
Linux Directory Structure
Unix File System
DOS - Disk Operating System
Part 4 of 'Introduction to Linux for bioinformatics': Managing data
Files and directories in Linux 6
An Introduction To Linux
File management

What's hot (20)

PDF
Installing Linux: Partitioning and File System Considerations
PPTX
Operating Systems - File Management
PPTX
Disk and File System Management in Linux
PPT
Linux fundamentals Training
PPTX
A beginners introduction to unix
PPT
PDF
The basic concept of Linux FIleSystem
DOC
Some basic unix commands
PDF
Linux Command Line Basics
PDF
Part 5 of "Introduction to Linux for Bioinformatics": Working the command lin...
ODT
Operating System Forensics
PPT
Basic Unix
PPT
1.2 boot the system v2
ODP
Lamp ppt
PDF
Part 2 of 'Introduction to Linux for bioinformatics': Installing software
PDF
LINUX Admin Quick Reference
PDF
Part 6 of "Introduction to linux for bioinformatics": Productivity tips
PDF
Course 102: Lecture 26: FileSystems in Linux (Part 1)
PPT
Linux lecture5
DOC
Installing Linux: Partitioning and File System Considerations
Operating Systems - File Management
Disk and File System Management in Linux
Linux fundamentals Training
A beginners introduction to unix
The basic concept of Linux FIleSystem
Some basic unix commands
Linux Command Line Basics
Part 5 of "Introduction to Linux for Bioinformatics": Working the command lin...
Operating System Forensics
Basic Unix
1.2 boot the system v2
Lamp ppt
Part 2 of 'Introduction to Linux for bioinformatics': Installing software
LINUX Admin Quick Reference
Part 6 of "Introduction to linux for bioinformatics": Productivity tips
Course 102: Lecture 26: FileSystems in Linux (Part 1)
Linux lecture5
Ad

Viewers also liked (6)

PPTX
Operating Systems: Versions of Linux
PPTX
Operating Systems: Linux in Detail
PPTX
Operating Systems: Virtual Memory
PPTX
Operating Systems: Device Management
PPTX
Introduction to Pseudocode
PPTX
The Scrum Model
Operating Systems: Versions of Linux
Operating Systems: Linux in Detail
Operating Systems: Virtual Memory
Operating Systems: Device Management
Introduction to Pseudocode
The Scrum Model
Ad

Similar to Operating Systems: File Management (20)

PPTX
File Management System in Shell Script.pptx
PDF
00-Review of Linux Basics
PDF
Managing your data - Introduction to Linux for bioinformatics
PPT
Divya
PPT
Divya
PPT
Edubooktraining
PPTX
Unix Administration
PPSX
Management file and directory in linux
PDF
Devops for beginners
PDF
Command Line Tools
PPT
Unix Basics 04sp
PPT
BITS: Introduction to Linux - Software installation the graphical and the co...
PDF
Root file system for embedded systems
PDF
File system discovery
PPT
BITS: Introduction to Linux - Text manipulation tools for bioinformatics
PPT
Information and Communications Technology (ICT) General Application Software
ODP
ODP
PPT
Unix Administration 4
PPT
Vista Forensics
File Management System in Shell Script.pptx
00-Review of Linux Basics
Managing your data - Introduction to Linux for bioinformatics
Divya
Divya
Edubooktraining
Unix Administration
Management file and directory in linux
Devops for beginners
Command Line Tools
Unix Basics 04sp
BITS: Introduction to Linux - Software installation the graphical and the co...
Root file system for embedded systems
File system discovery
BITS: Introduction to Linux - Text manipulation tools for bioinformatics
Information and Communications Technology (ICT) General Application Software
Unix Administration 4
Vista Forensics

More from Damian T. Gordon (20)

PPTX
Introduction to Prompts and Prompt Engineering
PPTX
Introduction to Vibe Coding and Vibe Engineering
PPTX
TRIZ: Theory of Inventive Problem Solving
PPTX
Some Ethical Considerations of AI and GenAI
PPTX
Some Common Errors that Generative AI Produces
PPTX
The Use of Data and Datasets in Data Science
PPTX
A History of Different Versions of Microsoft Windows
PPTX
Writing an Abstract: A Question-based Approach
PPTX
Using GenAI for Universal Design for Learning
DOC
A CheckSheet for Inclusive Software Design
PPTX
A History of Versions of the Apple MacOS
PPTX
68 Ways that Data Science and AI can help address the UN Sustainability Goals
PPTX
Copyright and Creative Commons Considerations
PPTX
Exam Preparation: Some Ideas and Suggestions
PPTX
Studying and Notetaking: Some Suggestions
PPTX
The Growth Mindset: Explanations and Activities
PPTX
Hyperparameter Tuning in Neural Networks
PPTX
Early 20th Century Modern Art: Movements and Artists
PPTX
An Introduction to Generative Artificial Intelligence
PPTX
An Introduction to Green Computing with a fun quiz.
Introduction to Prompts and Prompt Engineering
Introduction to Vibe Coding and Vibe Engineering
TRIZ: Theory of Inventive Problem Solving
Some Ethical Considerations of AI and GenAI
Some Common Errors that Generative AI Produces
The Use of Data and Datasets in Data Science
A History of Different Versions of Microsoft Windows
Writing an Abstract: A Question-based Approach
Using GenAI for Universal Design for Learning
A CheckSheet for Inclusive Software Design
A History of Versions of the Apple MacOS
68 Ways that Data Science and AI can help address the UN Sustainability Goals
Copyright and Creative Commons Considerations
Exam Preparation: Some Ideas and Suggestions
Studying and Notetaking: Some Suggestions
The Growth Mindset: Explanations and Activities
Hyperparameter Tuning in Neural Networks
Early 20th Century Modern Art: Movements and Artists
An Introduction to Generative Artificial Intelligence
An Introduction to Green Computing with a fun quiz.

Recently uploaded (20)

PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Classroom Observation Tools for Teachers
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
master seminar digital applications in india
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Pharma ospi slides which help in ospi learning
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Yogi Goddess Pres Conference Studio Updates
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Microbial disease of the cardiovascular and lymphatic systems
Chinmaya Tiranga quiz Grand Finale.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Classroom Observation Tools for Teachers
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
master seminar digital applications in india
VCE English Exam - Section C Student Revision Booklet
A systematic review of self-coping strategies used by university students to ...
FourierSeries-QuestionsWithAnswers(Part-A).pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Pharma ospi slides which help in ospi learning
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Complications of Minimal Access Surgery at WLH
2.FourierTransform-ShortQuestionswithAnswers.pdf
Yogi Goddess Pres Conference Studio Updates
Anesthesia in Laparoscopic Surgery in India
Orientation - ARALprogram of Deped to the Parents.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
Microbial disease of the cardiovascular and lymphatic systems

Operating Systems: File Management

  • 3.  BELIEVE IT OR NOT…  From the computer’s point of view, there is no such thing as a file.  It is only because the operating system is creating the illusion of a file that they exist  From the computer’s point of view, there is only blocks of memory, either allocated or unallocated. Damian’s
  • 4.  The File Manager (or File Management System) is the manager in the Operating System that creates the illusion that there are files and folders being stored in computer memory. Operating System Files and Folders Memory LocationsHardware
  • 16.  The File Manager ◦ Keeps track of where files are stored ◦ Determines how the files are stored ◦ Follows operating system file allocation policies ◦ Uses available storage space efficiently for files ◦ Creates a record/log of all file usage ◦ Allocates a file to a user if is free, and if they are permitted access to it. ◦ De-allocates file when user finished with it.
  • 17.  The file manager ALLOCATES a file by reading it from the hard disk and loading it into memory while updating its record of who is using what file.  The file manager DEALLOCATES a file by updating the file tables and rewriting the file (if changed) to the hard disk. Any processes waiting to access the file will be notified.
  • 18.  Some definitions: ◦ A FIELD is a collection of bytes that can be identified by a user, and has a type and size. ◦ A RECORD is a collection of related FIELDS. ◦ A FILE is a collection of records. ◦ A DIRECTORY (or FOLDER) is a special type of file that which has lists of files and their attributes.
  • 19.  Typical things you can do with a file are: ◦ CREATE ◦ OPEN ◦ DELETE ◦ RENAME ◦ COPY ◦ etc.
  • 20.  The name of a file is usually in two parts:
  • 21.  The name of a file is usually in two parts: ◦ MakeABackup.bat
  • 22.  The name of a file is usually in two parts: ◦ MakeABackup.bat Filename
  • 23.  The name of a file is usually in two parts: ◦ MakeABackup.bat Filename extension
  • 24. .avi Microsoft Video for Windows movie .dbf dbase II, III, IV data file .doc(x) Microsoft Word for Windows .gif Graphics Interchange Format .htm Hypertext Markup Language (common web page file) .html Hypertext Markup Language (common web page file) .jpg JPEG graphic file .mpg MPEG Video file .mid MIDI music file .mov QuickTime movie
  • 25. .pdf Adobe Portable Document Format file .ppt(x) PowerPoint file .psd Photoshop file .qxd QuarkXPress file .rm Real Audio/Video streaming file .rtf Rich Text Format .tif TIFF graphic file .txt ASCII text file .wav Sound file .xls(x) Excel spreadsheet
  • 26.  The full filename includes path information:  C:WINDOWSsystem32MakeABackup.bat Filename extension
  • 27.  The full filename includes path information:  C:WINDOWSsystem32MakeABackup.bat Filename extensionpath
  • 28.  The full filename includes path information:  C:WINDOWSsystem32MakeABackup.bat Filename extensionpath
  • 29.  If I am in the following folder:  C:WINDOWSsystem32BackupFolder  Then the address of the file is:  ..MakeABackup.bat
  • 30.  If I am in the following folder:  C:WINDOWSsystem32BackupFolder  Then the address of the file is:  ..MakeABackup.bat
  • 31.  The Operating System store files as records in memory, where many records make up a single file.  There are three main ways a file is physically stored in memory: ◦ Contiguous Storage ◦ Non-contiguous Storage ◦ Indexed Storage
  • 33.  Contiguous Storage means that records of a file are stored one after another.  It is a very simple policy to implement, and once you have found the start of the file, it’s very easy to find the rest of it.
  • 35. a b c d e f g h
  • 36. a b c d e f g h
  • 37. a b c d e f g h
  • 38. a b c d e f g h
  • 39. a b c d e f g h
  • 40. a b c d e f g h
  • 41. a b c d e f g h
  • 42. a b c d e f g h
  • 43. a b c d e f g h
  • 44. a b c d e f g h
  • 45. a b c d e f g h
  • 46. a b c d e f g h
  • 47.  The problem with is that if you have expand the file, you either need to have free space allocated at the end, or copy the whole file to a different location on the disk that has enough space.
  • 48.  Non-contiguous Storage means that records of a file are stored where ever there is free space.  The file manager will try to put as much of it together as possible, but there will be other part spread out over the disk.  These extra bits are sometimes called extents and these are linked together with pointers.  This means there is no easy way to determine the exact location of a record in a file.
  • 49. a b c d e f g h
  • 50. a b c d e f g h
  • 51. a b c d e f g h
  • 52. a b c d e f g h
  • 53. a b c d e f g h
  • 54. a b c d e f g h
  • 55. a b c d e f g h
  • 56. a b c d e f g h
  • 57. a b c d e f g h
  • 58.  Indexed Storage means that as well as the records in the file, an index block is created, with pointers to each individual file.
  • 59. v w x y za b c d e f g h
  • 60. v w x y za b c d e f g h
  • 61. v w x y za b c d e f g h
  • 62. v w x y za b c d e f g h
  • 63. v w x y za b c d e f g h Without an INDEX BLOCK, how do I find file 2?
  • 64. v w x y za b c d e f g h Without an INDEX BLOCK, how do I find file 2? We do a sequential search.
  • 65. v w x y za b c d e f g h
  • 66. v w x y za b c d e f g h
  • 67. v w x y za b c d e f g h
  • 68. v w x y za b c d e f g h
  • 69. v w x y za b c d e f g h
  • 70. v w x y za b c d e f g h
  • 71. v w x y za b c d e f g h
  • 72. v w x y za b c d e f g h
  • 73. v w x y za b c d e f g h
  • 74. v w x y za b c d e f g h
  • 75. v w x y za b c d e f g h
  • 76. v w x y za b c d e f g h
  • 77. v w x y za b c d e f g h
  • 78. v w x y za b c d e f g h
  • 79. v w x y za b c d e f g h
  • 80. v w x y za b c d e f g h
  • 81. v w x y za b c d e f g h
  • 82. v w x y za b c d e f g h
  • 83. v w x y za b c d e f g h
  • 84. v w x y za b c d e f g h
  • 85. v w x y za b c d e f g h
  • 86. v w x y za b c d e f g h
  • 87. v w x y za b c d e f g h
  • 88. v w x y za b c d e f g h
  • 89. v w x y za b c d e f g h
  • 90. v w x y za b c d e f g h
  • 91. v w x y za b c d e f g h
  • 92. v w x y za b c d e f g h
  • 93. v w x y za b c d e f g h
  • 94. v w x y za b c d e f g h
  • 95. v w x y za b c d e f g h
  • 96. v w x y za b c d e f g h
  • 97. v w x y za b c d e f g h
  • 98. v w x y za b c d e f g h So how does it work with an INDEX BLOCK?
  • 99. v w x y za b c d e f g h File Address Size Next File 1 1 4 9 File 1 9 4 - File 2 15 5 - INDEX BLOCK:
  • 100. v w x y za b c d e f g h File Address Size Next File 1 1 4 9 File 1 9 4 - File 2 15 5 - INDEX BLOCK:
  • 101. v w x y za b c d e f g h File Address Size Next File 1 1 4 9 File 1 9 4 - File 2 15 5 - INDEX BLOCK:
  • 102. v w x y za b c d e f g h File Address Size Next File 1 1 4 9 File 1 9 4 - File 2 15 5 - INDEX BLOCK:
  • 103. v w x y za b c d e f g h File Address Size Next File 1 1 4 9 File 1 9 4 - File 2 15 5 - INDEX BLOCK:
  • 104.  This support both sequential and direct access to records, and for larger files there can be multiple indexes.
  • 105.  The Access Control Matrix shows the access that each user has for each file on the system. The possible accesses are: ◦ R: Read ◦ W: Write ◦ E: Execute ◦ D:Delete
  • 106. User 1 User 2 User 3 User 4 User 5 File 1 RWED --E- --E- RWED R--- File 2 ---- R-E- R-E- R--- RWE- File 3 R-E- RW-- R-E- R-E- R--D File 4 R--- RWE- R--- RWED --E-
  • 107. Mary Anne Tom Bob Lyn Word. exe RWED --E- --E- RWED R-E- Lect1. ppt ---- R-E- R-E- R--- RWE- Scan. Exe R-E- RW-- R-E- R-E- R-ED Chrome. exe R-E- RWE- R-E- RWED --E-
  • 108.  In DOS the Access Controls are: ◦ R: Read ◦ W: Write ◦ C: Change ◦ F: Full Control
  • 109.  In DOS access to a file can assigned to one of two groups:  User  User Group
  • 110.  In DOS if we want to grant permissions to file, e.g. MakeABackup.bat, we do:  cacls
  • 111.  In DOS if we want to grant permissions to file, e.g. MakeABackup.bat, we do:  cacls filename arguments
  • 112.  In DOS if we want to grant permissions to file, e.g. MakeABackup.bat, we do:  cacls filename [/T] [/M] [/L] [/S[:SDDL]] [/E] [/C] [/G user:?] [/R user [...]] [/P user:? [...]] [/D user [...]]
  • 113.  In DOS cacls works as follows: Argument Description filename Display access control lists (ACLs) of file /T Changes ACLs of specified files in the current directory and all subdirectories. /M Changes ACLs of volumes mounted to a directory. /L Work on the Symbolic Link itself versus the target. /S Displays the SDDL string for the DACL. /S:SDDL Replaces the ACLs with those specified in the SDDL string (not valid with /E, /G, /R, /P, or /D).
  • 114.  In DOS cacls works as follows: Argument Description /E Edit ACL instead of replacing it. /C Continue on access denied errors. /G user:? Grant specified user access rights. ? can be: R, W, C, or F /R user Revoke specified user's access rights (only valid with /E). /P user:? Replace specified user's access rights. ? can be: R, W, C, or F /D user Deny specified user access.
  • 115.  Add Read-Only permission to a single file CACLS MakeABackup.bat /E /G "Power Users":R  Add Full Control permission to a second group of users CACLS MakeABackup.bat /E /G "FinanceUsers":F  Now revoke the Read permissions from the first group CACLS MakeABackup.bat /E /R "Power Users"
  • 116.  Now give the first group Full Control CACLS MakeABackup.bat /E /G "Power Users":F  Give Finance group Full Control of folder and all sub-folders CACLS c:docswork /E /T /C /G "FinanceUsers":F
  • 117.  In Linux/Unix the Access Controls are: ◦ R: Read ◦ W: Write ◦ X: Execute
  • 118.  In Linux/Unix access to a file can assigned to one of three groups:  User  User Group  World
  • 119.  In Linux/Unix access to a file can assigned to one of three groups:  User -you  User Group – everyone in your group  World – everyone with a login to the system
  • 120.  In Linux/Unix access to a file can assigned to one of three groups:  -rwxrwxrwx  User User Group World
  • 121.  In Linux/Unix access to a file can assigned to one of three groups:  -rwxrwxrwx -111111111
  • 122.  In Linux/Unix access to a file can assigned to one of three groups:  -rwxr-xr-x -111101101
  • 123.  In Linux/Unix access to a file can assigned to one of three groups:  -rwx--x--x -101001001
  • 124.  In Linux/Unix access to a file can assigned to one of three groups:  -rwxrwxrwx -111111111 - 7 7 7
  • 125.  In Linux/Unix access to a file can assigned to one of three groups:  -rwxr-xr-x -111101101 - 7 5 5
  • 126.  In Linux/Unix access to a file can assigned to one of three groups:  -rwx--x--x -111001001 - 7 1 1
  • 127.  If we want to grant permissions to file, e.g. MakeABackup.bat, we do:  chmod 755 MakeABackup.sh  chmod 777 MakeABackup.sh  chmod 700 MakeABackup.sh
  • 128.  In Linux/Unix, access to a file can assigned to one of three groups:  -rwxrwxrwx  User User Group World
  • 129.  In Linux/Unix, access to a folder/directory can assigned to one of three groups:  drwxrwxrwx  User User Group World