Chapter 8 Flashcards

(47 cards)

1
Q

is the software responsible for creating, deleting, modifying, and controlling access to files—as well as for managing the resources used by the files

A

The File Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Responsibilities of the File Manager

A
  1. Keep track of where each file is stored.
  2. Use a policy that will determine where and how the files will be stored, making sure to efficiently use the available storage space and provide efficient access to the files.
  3. Allocate each file when a user has been cleared for access to it, then record its use.
  4. Deallocate the file when the file is to be returned to storage, and communicate its availability to others who may be waiting for it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does a computer system allocate a file

A

The computer system allocates a file by activating the appropriate secondary storage device and loading the file into memory while updating its records of who is using what file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is a group of related bytes that can be identified by the user with a name, type, and size.

A

field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does a computer system deallocate a file

A

Finally, the File Manager deallocates a file by updating the file tables and rewriting the file (if revised) to the secondary storage device. Any processes waiting to access the file are then notified of its availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is a group of related fields.

A

record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is a group of related records that contains information to be used by specific application programs to generate reports.

A

file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This type of file contains data and is some times called a _________ because it has no connections to other files; unlike databases, it has no dimensionality.

A

flat file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

appears to the File Manager to be a type of file, but ________ are more complex because they’re actually groups of related files that are interconnected at various levels to give users flexibility of access to the data stored

A

database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

contain instructions and data files contain data; but as far as storage is concerned, the File Manager treats them exactly the same way.

A

Program files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

are special files with listings of filenames and their attributes. Data collected to monitor system performance and provide for system accounting is collected into files. In fact, every program and data file accessed by the computer system, as well as every piece of computer software, is treated as a file

A

Directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The user communicates with the File Manager, which responds to what specific commands

A

OPEN
DELETE
RENAME
COPY
CREATE
OPEN NEW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

when a user’s program issues a command to read a record from a disk the READ instruction has to be decomposed into the following steps:

A
  1. Move the read/write heads to the cylinder or track where the record is to be found.
  2. Wait for the rotational delay until the sector containing the desired record passes under the read/write head.
  3. Activate the appropriate read/write head and read the record.
  4. Transfer the record to main memory.
  5. Set a flag to indicate that the device is free to satisfy another request.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Each storage unit, whether it’s removable or not, is considered a

A

volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

each volume can contain several files

A

multifile volumes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

files that are extremely large and are contained in several volumes

A

multivolume files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

is stored immediately after the volume descriptor and lists the names and characteristics of every file contained in that volume

A

master file directory (MFD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

master file directory major disadvantages are:

A
  • It would take a long time to search for an individual file, especially if the MFD was organized in an arbitrary order.
  • If the user had more than 256 small files stored in the volume, the directory space (with a 256 filename limit) would fill up before the disk storage space filled up. The user would then receive a message of “disk full” when only the directory itself was full.
  • Users couldn’t create subdirectories to group the files that were related.
  • Multiple users couldn’t safeguard their files from other users because the entire directory was freely made available to every user in the group on request.
  • Each program in the entire directory needed a unique name, even those directories serving many users, so only one person using that directory could have a program named Program1
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is created when a user opens an account to access the computer system

20
Q

Information typically included in a file descriptor includes the following:

A
  • Filename—within a single directory, filenames must be unique; in some operating systems, the filenames are case sensitive
  • File type—the organization and usage that are dependent on the system (for example, files and directories)
  • File size—although it could be computed from other information, the size is kept

here for convenience
* File location—identification of the first physical block (or all blocks) where the file is stored

  • Date and time of creation
  • Owner
  • Protection information—access restrictions, based on who is allowed to access the file and what type of access is allowed
  • Record size—its fixed size or its maximum size, depending on the type of record
21
Q

The two components common to many filenames

A

a relative filename and an extension

22
Q

are the most common because they’re the easiest to access directly. That’s why they’re ideal for data files.

A

Fixed-length records

23
Q

they don’t leave empty storage space and don’t truncate any characters, thus eliminating the two disadvantages of fixed-length records

A

Variable-length records

24
Q

On magnetic disks (hard drives), files can be organized in one of several ways:

A

sequential record organization
direct record organization
indexed sequential record organization

25
To select the best of these file organizations, the programmer or analyst usually considers these practical characteristics:
* Volatility of the data—the frequency with which additions and deletions are made * Activity of the file—the percentage of records processed during a given run * Size of the file * Response time—the amount of time the user is willing to wait before the requested operation is completed (This is especially crucial when doing time-sensitive searches)
26
Contents of volume descriptor
- Creation Date - Pointer to Directory Area - Pointer to File Area - File System Code - Volume Name
27
transforms each key into a number: the record’s logical address
hashing algorithm
28
by far the easiest to implement because records are stored and retrieved serially, one after the other
Sequential record organization
29
uses direct access files, which, of course, can be implemented only on direct access storage devices
direct record organization
30
combines the best of sequential and direct access
Indexed sequential record organization
31
Another overflow area is located apart from the main data area but is used only when the other overflow areas are completely filled. We call it the:
overflow of last resort
32
When records use _____________, they’re stored one after the other.
contiguous storage
33
____________ allocation allows files to use any storage space available on the disk
Noncontiguous storage
34
_________ allocation allows direct record access by bringing together the pointers linking every extent of that file into an index block
Indexed storage
35
Typical modules of a file management system showing how information is passed from the File Manager to the Device Manager
see the diagram in book kay lisud ibutang HAHA
36
The ______________ is intuitively appealing and easy to implement, but because of its size it only works well for systems with a few files and a few users. In the matrix, each column identifies a user and each row identifies a file.
access control matrix
37
The _____________ is a modification of the access control matrix. Each file is entered in the list and contains the names of the users who are allowed to access it and the type of access each is permitted.
access control list
38
A ___________ shows the access control information from a different perspective. It lists every user and the files to which each has access
capability list
39
Data compression algorithms consist of two types:
- lossless algorithms typically used for text or arithmetic files, which retain all the data in the file throughout the compression decompression process - lossy algorithms, which are typically used for image and sound files and remove data permanently.
40
To compress text in a database, three methods are described briefly here:
records with repeated characters repeated terms front-end compression
41
Data in a fixed-length field might include a short name followed by many blank characters.
Records with repeated characters
42
can be compressed by using symbols to represent each of the most commonly used words in the database.
Repeated terms
43
builds on the previous data element.
Front-end compression
44
45
File Manager’s policy must determine who will have access to what material, and this involves two factors:
- flexibility of access to the information - its subsequent protection
46
five examples of the most common record formats.
1. Unblocked, fixed-length records 2. Blocked, fixed-length records 3. Unblocked, variable-length records (precedence) 4. Unblocked, variable-length records(with delimiter) 5. Blocked, variable-length records
47
if we’re looking for the beginning of the eleventh record and the fixed record length is 25 bytes, the CBA would be:
CBA = (RN – 1) * RL (11 – 1) * 25 = 250