Unit 9 : File Management Flashcards

1
Q

What does File Management refers to in OS?

A
  1. Refers to the set of processes and techniques involved in creating, organization, accessing, manipulating, and controlling files stored on storage devices, such as hard drives, solid-state drives or network storage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List out the Objectives of File Management ( 10 )

A
  1. File Backup
  2. File Encryption
  3. File Retrieval
  4. Data Sharing
  5. File Compression
  6. Space Management
  7. File Auditing
  8. File Versioning
  9. Data Security
  10. File Organizaion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the advantage of File Management? ( 6 )

A
  1. Improved Organization
  2. Data Security
  3. Data Sharing
  4. Backup and Recovery
  5. Compression
  6. Versioning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does sequential stores file inside storage sevice?

A
  1. In a sequential manner
  • Each file occupies a contiguous block of storage space
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to access the data in Sequential method?

A
  1. Requires reading from the beginning until the desired location is reached
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the disadvantage for Sequential File Managing method?

A
  1. Simple but can be inefficient for random access operations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List out all the File Managing methods ( 6 )

A
  1. Sequential
  2. Index
  3. Direct
  4. FAT ( File Allocation Table )
  5. NFTS ( New Technology File System )
  6. Distributed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does Indexed File Managing Method manages file?

A
  1. Ultilizes and index structure to improve file access efficiency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is created alongside when using the Indexed File Managing Method? ( 2 )

A
  1. Main Data File
  2. Pointers to Various location within the file
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does pointer in indexed file managing method do?

A
  1. Allow for quick navigation and direct access to specific data within the file
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What file management method is known for random access file management?

A
  1. Direct
  • It enables direct access to any part ( without the need to traverse the entire file sequentially )
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does direct file managing system ultilizes to keep track of the file locations?

A
  1. Uses FAT or similar data structure to keep track of file locations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the advantages of direct file managing system?

A
  1. Allows for faster and more efficient file access, particularly for larger files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What file managing system is commonly used in various OS?

A

1.FAT ( File Allocation Table )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does FAT allocate file location?

A
  1. Employs a table, know as the FAT to track the allocation status of each cluster on a storage device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does FAT supports

A

1.Sequential and random access to files

17
Q

Which file managing systems provides a simple and reliable file management structure?

A
  1. FAT
18
Q

What file managing system provides enhanced security, file compression, file encryption and suport for larger file sizes and volumes?

A
  1. NFTS ( New Technology File System )
  • It uses a complex structure to manage files effiently
19
Q

What file managing system provides advanced file management capabilities?

A
  1. NFTS ( New Technology File System )
20
Q

What file managing system allows file to be stored accross multiple networked devices or servers?

A
  1. Distributed
  • Provide transparent access to files from different locations
21
Q

What are the protocol used in file sharing in distributed file sharing system?

A
  1. Network File System ( NFS )
  2. Server Message Block ( SMB )
22
Q

List out the examples of File Management System (

A
  1. Windows Explorer in Windows OS
  2. Finder on MacOS
  3. File Manager in Linux ( Nautilus, Dolphin )
  4. Network-Attached Storage ( NAS )
  5. Content Management System ( CMS )
  6. Source Code Management Systems ( Git )
  7. Database Management Systems
23
Q

What does NAS do?

A
  1. Systems specialized file management systems that store & manage files on network, allowing multiple users to access and edit files simultaneously.
24
Q

What does Cloud-based file storage services provides?

A
  1. Provide a file management system that allows users to store and manage files in the cloud, allowing access from multiple devices and collaboration with other users.
25
Q

How does File Manager allocates file?

A
  1. Reading it from hard disk and loading it into memory ( while updating its record who is using that file )
26
Q

How does File Manager deallocates file?

A
  1. By updating file tables and rewriting the file ( if changed ) to the hard disk
27
Q

What does Field mean in File Manager?

A
  1. Collection of bytes that can be identified by a user, and has type and size
28
Q

What does Record mean in File Manager?

A
  1. Collection of related Fields
29
Q

What does File mean in File Manager?

A
  1. Collection of records
30
Q

What does Directory / Folder mean in File Manager?

A
  1. Special type of file that has lists of files and their attributes
31
Q

List out the 2 parts of a file, 3 parts for full filename

A
  1. Filename
  2. Extension

backup( filename ).bat ( extension )

  1. Path
  2. Filename
  3. Extension

C:\WINDOWS\system32\backup.bat

32
Q

What does Access Control Matrix shows?

A
  1. The access that each user has for each file on the system
33
Q

List out all the possible accesses in Access Control Matrix ( 4 )

A
  1. R - Read
  2. W - Write
  3. E - Execute
  4. D - Delete
34
Q

How does Linux uses the access control matrix?

A
  1. It assigns to one of three groups
    • User
    • User Group
    • World

-rwx( User ) rwx ( User Group ) rwx ( World )