Pos355 Week 2

In: Computers and Technology

Submitted By shiff1rd
Words 580
Pages 3
File Management
POS355
May 30, 2012

File Management
When implementing a networked information system that will support thousands of users, it is important to consider which files will need restricted access, and which will be open to all users. The purpose of this essay will explore how a Unix system configured to support five thousand users is able to allow only four thousand nine hundred ninety of those users access to a single file.
Unix File Access Control
Although Unix has evolved over the years, even the most up to date system relies quite heavily upon the originally introduced file access scheme found in the very early versions of Unix. The core of this functionality essentially states that there are three possible permissions any user can have with a single file: read, write, and execute. Permissions for each of these actions are stored with the file’s inode and granted for three groups: the file owner, member’s of the file’s group; and everyone else. All of these permissions are identified in the first nine bits of the file’s twelve protection bits.
The last three bits of the file’s protection bits indicate special behavior. The first two bits tell Unix whether to duplicate the permissions granted for the file owner, or file group, upon execution, respectively. The third bit represents a sticky bit that was originally used in early versions of Unix, but has since been decommissioned. This permission essentially told the operating system whether to keep the contents of the file in memory or not.
As we can see, simple access to a limited number of users within Unix is relatively simple. At it’s core, you simply need to ensure that a group exists with the appropriate permissions for each file, and subsequently all appropriate users are assigned to that user group. For example, a single file that has two groups of users (readers and writers)…...

Similar Documents

Pos355 Week 5

...Huffman Trucking Robert Bennett POS/355 July 2, 2012 Ashok Rao Huffman Trucking Huffman Trucking is a company founded in Cleveland, OH in 1936 with only a single truck. The company’s growth came as a direct result of World War II as it became a carrier for factories from the Midwest to the East Coast ports. Now Huffman Trucking employs over 1350 people and has facilities in Ohio, California, Missouri and New Jersey. Within the offices and plants in each state the company uses computers running both Mac OS X and Windows OS which varies from Windows 3.X and 98 through XP and XP Pro. The only computers that are using Mac OS X are ones used by the marketing department are most likely used for photo/video editing and artwork for company advertising. I believe that windows operating systems were chosen because of the ease of use and compatibility with windows corporate servers. The implications of using mostly Windows computers are that you have a variety of communication options between clients. Windows computers have features such as peer-to-peer networking support for users to be able to share resources such as folders, printers, and peripherals, strong security with built in Kerberos support which allows fast and secure single logon to Windows 2000 and future servers. The last major advantage of Windows computers is in regards to mobility, computers running Windows OS offer an amazing remote desktop capability for users traveling......

Words: 647 - Pages: 3

Week 2

...Week 2 Questions 12.A. Equal –interval is a variable in which the numbers stand for approximately equal amounts of what is being measured. Example: A person’s GPA same difference between 3.0 and 3.5. B. Rand order is a variable in which the numbers stand only for relative ranking. Example: Student’s standing in his or her graduating class C. Nominal is a variable in which the values are categories. Example: a study of human gender. Male and Female D. Ratio Scale is a scale of measurement of data which permits the comparison of difference of values; a scale having a fixed zero value. (Collins English Dictionary,(2003) Example: A long jump runner has to jump from a line (O) and jump as far as he or she can ( scale to x). E. Continuous, there are in theory an infinite number of values between any two values. Example: A person’s height and/or weight. 15. On excel attachment 19. on excel attachment 20. 21. (a). A frequency table is frequently used effectively to make sense of the data which has been put together and to present any kind of signs which might arise. Table 1-10 is proof of specific groups undertake some rivalry 58% of the time, and either no rivalry or a great deal of rivalry quite correlated (20%-22%). By utilizing a frequency table you can observe the trend of rivalry which the group usually encounters. The table assists make sense of the percentages and quantities which exist in the data which was collected. Without the utilization of the...

Words: 567 - Pages: 3

Week 2

...Learning Team A Discussion Beverly Stallings, Aja Cancela, Terry Cardenas LAW/421 September 2, 2013 Neha Bhatia Learning Team “A” Discussion Team “A” learned in week two the differences between substantive, procedural, criminal, civil, common, and statutory law. This paper provides differences and examples of these types of laws. Substantive Law Substantive Law is what deals with an individual’s personal rights, known as “real property” in which the rights are regulated in this arena. An example of these laws discussed during the week was the case of Mary and the neighbor. Mary was negligent when using the trimmer and the neighbor suffered a loss. Substantive law provides the neighbor with the right to collect damages and procedural law is the structure for collecting restitution. Procedural Law Procedural Law provides the structure that is used for setting up guidelines for pursue of the rights of substantive. It is utilized for description of the guidelines and rules set in the aspects of a governmental case pre, during, or post of the trial. This law may be utilized in proceeding of criminal, civil and administrative to help in the structure of how the mentioned proceeding will be handled. Included but not limited in the law may be the selection of jury, the set jurisdiction and the limitation of the statue. These laws of procedural differ in the kind of court proceedings as the courts individually have a particular set of laws. The main objective of......

Words: 653 - Pages: 3

Week 2

...Starbucks WEEK 2 Starbucks New Market Entrance Starbucks strategic goal is to increase market share of the non-coffee drinker; they have begun by introducing an extension of a product line targeted to this segment. To ensure market growth, Starbucks has repositioned one of its current products, the Frappuccino line, this product has been extended to include 3 new flavors; Double Chocolate Chip Crème, Vanilla Bean Crème, and Strawberries & Crème, introduced throughout the summer months. Faced with the challenge of entering a new competitive market Starbucks must compete to retain brand recognition of its primary products, yet increase awareness of its new product line. Situation Analysis Company Starbucks is the leading retailer for roaster and brand specialty coffee in the world (See Figure 1). It has over 7,500 stores, which are located in the United States, Canada, Europe, Asia and the Middle East . Besides high quality coffee drinks, Starbucks sells bottled coffee drinks, such as Frappuccino® and Starbucks DoubleShot™. Starbucks revenue is growing by 20% a year and is opening approximately three stores every day. Starbucks is capable of managing its successful operations by having steady market growth. It achieved this by financing through their cash flow instead of franchising, selling stock or increasing their financial leverage . Its strategy to success is “blanket an area completely.” This approach is to “cuts down on delivery and management costs, shortens......

Words: 1849 - Pages: 8

Pos355 Week 2 File Management Paper

...Week 2 File Management Paper POS/355 Joey Turner JR Professor Alicia Pearlman Most UNIX systems that you will come across are usually based on the control scheme of file access associate with early versions of the UNIX system. In UNIX, every individual user is assigned their own unique user ID that they may use to access files saved in memory. Users are identified by being a part of a private group or various groups which can be identified then by their group ID. When a file is created in LINUS it is identified as being owned by a particular user and marked with the user that created the file’s user id. The file also belongs to whatever group the user is associated with as well or else the group of its parent directory but only if that parent directory has SetGID permission configured. SetGID (SetGIUD) are access rights flags that allow users to run executable (.exe) files with the permission of user ids or group id. Protection bits in sets of twelve are associated with each file as well. The owner ID, group ID, and protection bits are part of the file’s index node-which are a data-structure used to represent a file-system object which can be a file or file directory. There are 9 of the 12 protection bits that are advocated to the user and group ids owners of the files which control reading, writing, and execute permissions. These nine protection bits then form a system of hierarchy of user id, group id, and all others. The hierarchy is also coupled with......

Words: 884 - Pages: 4

Pos 355 Pos355 Pos/355 Week 2

...HELPIDO.COM -------------------------------------------------------- Follow the link to get the tutorial http://helpido.com/pos-355-week-2/ -------------------------------------------------------- POS 355 POS355 POS/355 Week 2 - University of Phoenix Course ________________________________________ Week Two: Processes and File/Device Management Discussion Question 1 How would you rank the principles of concurrency? Explain the design issues for which the concept of concurrency is relevant. Discussion Question 2 Consider the past couple days you have worked on the computer. What disk scheduling policies and algorithms were used? Explain. Discussion Question 3 Do you agree or disagree that throughput and capacity are determining factors for effectiveness of a system more so than processor speed? Why or why not? Individual File Management Paper For this assignment, you will choose one of the following options: • Option 1, File Access: Write a 2-page paper that discusses the following: Consider a system that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one file. How would you specify this protection scheme in UNIX®? • Option 2, Protection Scheme: Write a 2-page paper that discusses the following: Consider a system that supports 5,000 users. Suppose that you want to allow 4,990 of those users to be able to access one file. Suggest another protection scheme that can......

Words: 286 - Pages: 2

Pos 355 Pos355 Pos/355 Week 2

...HELPIDO.COM -------------------------------------------------------- Follow the link to get the tutorial http://helpido.com/pos-355-week-2/ -------------------------------------------------------- POS 355 POS355 POS/355 Week 2 - University of Phoenix Course ________________________________________ Week Two: Processes and File/Device Management Discussion Question 1 How would you rank the principles of concurrency? Explain the design issues for which the concept of concurrency is relevant. Discussion Question 2 Consider the past couple days you have worked on the computer. What disk scheduling policies and algorithms were used? Explain. Discussion Question 3 Do you agree or disagree that throughput and capacity are determining factors for effectiveness of a system more so than processor speed? Why or why not? Individual File Management Paper For this assignment, you will choose one of the following options: • Option 1, File Access: Write a 2-page paper that discusses the following: Consider a system that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one file. How would you specify this protection scheme in UNIX®? • Option 2, Protection Scheme: Write a 2-page paper that discusses the following: Consider a system that supports 5,000 users. Suppose that you want to allow 4,990 of those users to be able to access one file. Suggest another protection scheme that can......

Words: 286 - Pages: 2

Week 2 a

...XACC/291 – Week 2 Assignment Thank you for using ACCNerd.com! Don’t hesitate to contact us if you have any questions or need additional help with this assignment. Complete Exercises E9-1, E9-7, & E9-12 and P9-7B E9-1 (A). The cost principle states that assets must be recorded at the cost at which they were acquired. Although plant assets can fluctuate in fair market value, their book value will remain consistent. Companies must compute the total deprecation of the asset and allocate it over the useful life of the asset. (B). 1)$5000-Land 2) $200- Equipment 3) $850-Equipment 4) $17,500-Land Improvements 5) $250-Equipment 6) $8000-Equipment 7) $900-Equipment 8) $75-Equipment E9-7 (A) 1. Cost - | Salvage Value = | Depreciation Cost | $30,000.00 | $2,000.00 | $28,000.00 | Depreciation Cost / | Useful Life= | Annual depreciation expense | $28,000.00 | 8 | $3,500.00 | 2011= $26,500 2012= $23,000 2. Depreciation cost | Total Units of activity | Depreciation cost per unit | $28,000.00 | 100000 | $0.28 | Depreciable cost per unit | Units of activity during the year | Annual depreciation expense | $0.28 | 15000 | $4,200.00 | 2011= 25,800 2012= 21,600 3. Book Value at Beginning of Year | Declining Balance rate | Annual Depreciation Expense | $30,000.00 | 25.00% | $7,500.00 | 2011=22,500 2012= 16,875 (B) 1. Book Value 1/1/2011 $30,000 Less: Salvage Value $2,000 Depreciable Cost $28,000 Remaining...

Words: 555 - Pages: 3

Week 2

...University of Phoenix Material Week Two Practice Problems Prepare a written response to the following questions. Chapter 2 12. For the following scores, find the mean, median, sum of squared deviations, variance, and standard deviation: 1,112; 1,245; 1,361; 1,372; 1,472 Mean: 1312 Median: 1361 Sum of squared deviations: 76090 Variance: 19023 Standard deviation: 138 16. A psychologist interested in political behavior measured the square footage of the desks in the official office for four U.S. governors and of four chief executive officers (CEOs) of major U.S. corporations. The figures for the governors were 44, 36, 52, and 40 square feet. The figures for the CEOs were 32, 60, 48, 36 square feet. a. Figure the means and standard deviations for the governors and CEOs. Governors CEOs Means: 43 44 Standard Deviations: 6.83 0 b. Explain, to a person who has never had a course in statistics, what you have done. We are taking a look the square footage of the desks for four U.S. governors and four chief executive officers of major U.S. Corporations. c. Note the waus in which the means and standard deviations differ, and speculate on the possible meaning of these differences, presuming that they are representative of U.S. governors and large corporations’......

Words: 1400 - Pages: 6

Week 2

...Ingredients 2.5 cups all-purpose flour 1/2 cup sugar 2 sticks of cold butter, cut into small pieces 3-4 tablespoons of colored nonpareils or sprinkles Instructions Preheat oven to 325 degrees. In food processor with knife blade attached, pulse flour and sugar until combined. Add butter and pulse until dough begins to come together. Place dough in a large bowl. With hand, gently knead in nonpareils or sprinkles until evenly blended and dough forms a ball. On lightly floured waxed paper, pat dough into 2 equally sized rectangles; freeze 20 minutes. Cut dough into 1-inch squares. Place squares, 1/2 inch apart, on an ungreased large cookie sheet. Bake cookies 18 to 20 minutes or until lightly browned on bottom. Transfer cookies to wire rack to cool. Store cookies in tightly covered container at room temperature up to 1 week, or in freezer up to 3 months Chocolate Mint Sandwich Cookies – Yields 20 Sandwich Cookies 1/2 cup (135 gr) butter 1/2 cup (125 gr) light brown sugar 1/4 tsp salt 1 tsp vanilla 1 large egg 1 2/3 cups (250 gr) unbleached all purpose flour 1/2 cup cocoa powder 2 teaspoon baking powder 1 teaspoon espresso powder Filling 1/2 cup (115 gr) butter 1/4 cup (50 gr) shortening 1 3/4 - 2 cups (230 grams) confectioners’ sugar 2 tablespoons milk 1 tsp mint A toothpick prick of red colour paste/gel 6 mini candy canes, crushed Instructions: 1) Preheat oven to 350F. In a medium bowl sift......

Words: 695 - Pages: 3

Week 2

...University of Phoenix Material Week 2 Practice Worksheet Prepare a written response to the following questions. Chapter 3 For the following scores, find the mean, median, and the mode. Which would be the most appropriate measure for this data set? 2, 2, 0, 5,1, 4,1, 3, 0, 0, 1, 4, 4, 0,1, 4, 3, 4, 2, 1 Based on the scale of measurement for each variable listed below, which measure of central tendency is most appropriate for describing the data? The time (in years) it takes a sample of students to graduate college The blood type (e.g., Type A, B, AB, O) of a group of participants The rankings of college undergraduate academic programs Chapter 4 An expert reviews a sample of 10 scientific articles (n = 10) and records the following numbers of error in each article: 0, 4, 2, 8, 2, 3, 1, 0, 5, and 7. Compute the SS, the variance, and the standard deviation for this sample using the definitional and computational formulas. A psychologist interested in political behavior measured the square footage of the desks in the official office for four U.S. governors and of four chief executive officers (CEOs) of major U.S. corporations. The figures for the governors were 44, 36, 52, and 40 square feet. The figures for the CEOs were 32, 60, 48, 36 square feet. Figure the means and standard deviations for the governors and CEOs. Explain, to a person who has never had a course in statistics, what you have done. Note the ways in which the means and......

Words: 1096 - Pages: 5

Week 2

...are important as you validate the information you share. Write down the following information for 2 sources. | A. Source 1: | a. Title of the source: Strokes b. Author: Michael P. Barnes c. Publisher: New England Journal of Medicine d. Copyright year: 2010 | B. Source 2: | a. Title of the source: Recovery After Strokes b. Author: Bruce H. Dabkin c. Publisher: Medical Table d. Copyright year: 2005 | (See next page to continue part 2) Part 2: Supporting your main idea | 15 points | Directions to complete part 2: Refer back to the topic and main ideas you chose for your eBlast in week one. Finalize three main ideas by identifying at least two sub-topics to support each main idea for a total of 6 sub-topics. If you struggle identifying at least two sub-topics, you will need to choose a different main idea. | A. Main Idea | a. Subtopic 1: Ischemic Strokes b. Subtopic 2: Hemorrhagic Strokes | B. Main Idea | a. Subtopic 1: Symptoms of stroke b. Subtopic 2: Preventions of stroke | C. Main Idea | a. Subtopic 1: Depression b. Subtopic 2: Anxiety and sleep | (See next page to continue part 3) Part 3: Supporting your sub-topics | 25 points | Directions to complete part 3: Finalize your 6 sub-topics by identifying 2-3 supporting details for a total of 12-18 supporting details. If you struggle identifying at least 2 details for each sub-topic, you will need to choose a different sub-topic that is better supported...

Words: 453 - Pages: 2

Journal 2 Week 2

...Journal Two: Identifying Conflict in Two Texts Read About Journals in ENG125: Introduction to Literature for more information about the purpose and expectations for journals. This week, you continue writing your journal entries. This journal entry is designed to help you document ideas about conflicts in literature, which will contribute to the information required for the Week Three Draft and the Week Five Literary Analysis. Recognizing conflict is essential to understanding the various commentaries literature can provide.  In Journal One, you identified conflict as it might appear in our everyday world and from other sources. Now, consider the following definition of conflict and how it relates to literature from the textbook or the story/poetry links provided under the requirements for the Literary Analysis:  Conflict is opposing actions, ideas, and decisions that hold a plot together...the struggle that shapes the plot in a story.  Chapters 1-7 of our text contain a number of stories and poems, each of which rely on at least one conflict. Choose two of this week’s assigned literary works and write about the conflicts presented in each of them. In 250 to 500 words Individual versus Society --- “Still she had come down the road toward the big white church alone. Just herself, an old forgetful woman, nearly blind with age” (para 3.1,2) --- appears to be the main conflict in Alice Walker’s narrative ironically, yet metaphorically named "The Welcome Table”.......

Words: 2568 - Pages: 11

Week 2

...Week 2 Assignment Monica Callis, Week 2 Assignment The four functions of management can be affected by internal and external factors such as globalization, technology, innovation, diversity, and ethics. The functions of management are not immune to these factors no matter how big or small the organization. Even an organization as large and complex as Apple is affected by these factors. Globalization Globalization has become a key factor for large corporations to excel above the competition. Who would have thought that the production of a computer being made in a garage in 1976 would have emerged into sales being over $750 million by 1982 shortly following Apple being incorporated in 1977? Globalization had to be a major influence to Apple’s revenue. It is known that globalization brings greater opportunity to a broader market while promoting competitors that will require a superior level of competence for any organization that will take advantage of it. Apple has made great profit by globalizing their company. Annual reports show that international sales take the lead in bringing in sales and are continuing to rise which is the result of good management. From my understanding, Apple had been trying to market Korea with their products for a long time since Korean market for the Cellular phone and mp3 market had been rising rapidly. The iPhone was the only phone that could not get into Korean market. They had studied the audience and the market very well and......

Words: 1430 - Pages: 6

Week 2

...exchange as well. Where to Submit Your Assignments in OLS Assignment Section: This is where you will submit all formal assignments. Navigate to the Assignments link on eCampus. Locate the link to submit your assignment as an attachment. Whenever there is a question about what assignments are due, please remember this syllabus is considered the ruling document |[pic] |Course Design Guide | | |College of Social Sciences | | |SOC/100 Version 2 | | |Introduction to Sociology | Copyright © 2011, 2006 by University of Phoenix. All rights reserved. Course Description This course is an introduction to a set of sociological perspectives on human life that allow us to understand how our personal lives are affected by interpersonal relationships, by group affiliations, and by groups in interaction and conflict with one another. It provides the scientific tools to develop an objective, sociological imagination that allows us to interpret the objects, events, and experiences of our lives as a......

Words: 3257 - Pages: 14