OSY
OSY
PART A
File Management
1.0 Rationale
Shashank Umarekar
Understand and Perform
06 09/11/22 16/11/22 Om Kathar
different operations on file
Sofiayn Shaikh
Shashank Umarekar
Finally, we take print and
08 24/11/22 30/11/22 Om Kathar
submit the report
Sofiayn Shaikh
2 www.seeksforgeeks.org
Web-Sites 2 -
www.tutorialsnoint.com
3 Operating Systems: 1 -
Reference book Internals and design
Principles
*************
PART B
File Management
1.0 Rational
File Management is the process of administrating assistant that correctly
handles digital data therefore an effective file management system improves the
overall function of a business workflow. It also organized important data and
provides a searchable database for quick retrieval.
Programmer does not need to develop file management software In general, a
file is a sequence of bits, bytes, or records whose meaning is defined by the file
creator and user. Every File has a logical location where they are located for storage
and retrieval. Different types of data needs different types of files to store it. Data
could take different forms. It could be number, characters, images or even some
symbols. A very important role played by Operating system is management of file
systems and memory
Attributes of File
1. Name :- It is the only information stored in a human-readable form.
2. Identifier: Every file is identified by a unique tag number within a file
system known as an identifier.
3. Location: Points to file location on device.
4. Type: This attribute is required for systems that support various types of
files.
5. Size : Attribute used to display the current file size.
6. Protection : This attribute assigns and controls the access rights of
reading, writing, and executing the file.
File Operations : -
1. Create
The file is created with no data. The purpose of the call is to announce that the file
is coming and to set some of the attributes. There are two steps to create a file
1. There should be space in the file system for the file.
2. An entry of new file must be done in the directory.
3. Open
Before using a file, a process must open it. The purpose of the open call is to
allow the system to fetch the attributes and list of disk addresses into main memory
for rapid access on later calls.
4. Close
When all the accesses are finished, the attributes and disk addresses are no
longer needed, so the file should be closed to free up some internal table space.
Many systems encourage this by imposing a maximum number of open files on
processes. A disk is written in blocks, and closing a file forces writing of the file's
last block, even though that block may not be entirely full yet.
5. Read
Data are read from file. Usually, the bytes come from the current position.
The caller must specify how much data are needed and must also provide a buffer to
put them in.
Reading file operation reads data from file. A system call states the name of
the file and location of the next block of the file should be put.
6. Write
Data are written to the file, again, usually at the current position. If the
current position is the end of the file, the file’s size increases. If the current position
Word
doc, docs, tex, rrf, etc. various word-processor formats
processor
1. Sequential Access
2. Direct/Random Access
3. Indexed Access.
a) This type of access method provides a speedy access to the file. It provides
immediate access to large amount of information.
b) Here a file is made up of logical records that allow programs to read and write.
3) Indexed Access :-
Functions of File : -
1. Create file, find space on disk, and make an entry in the directory.
2. Write to file, requires positioning within the file
3. Read from file involves positioning within the file
4. Delete directory entry,‘regain disk space.
Properties of Files : -
1. Long-term existence: Files are stored on disk or other secondary storage
and do not disappear when a user logs off.
2. Sharable between processes: files have names and can have associated
access permissions that permit controlled sharing.
3. Structure: files can be organized into hierarchical or more complex
structure to reflect relationships among files .
4.0 Actual Procedure Followed.
Planned Start Planned Finish Name of Responsible
Sr.NO Details of activity
date date Team Members
Shashank Umarekar
Select the topic as per the
01 05/10/22 11/10/22 Om Kathar
subject
Sofiayn Shaikh
Shashank Umarekar
Understand and Perform
06 09/11/22 16/11/22 Om Kathar
different operations on file
Sofiayn Shaikh
Shashank Umarekar
Finally, we take print and
08 24/11/22 30/11/22 Om Kathar
submit the report
Sofiayn Shaikh
2 www.seeksforgeeks.org
Web-Sites 2 -
www.tutorialsnoint.com
3 Operating Systems: 1 -
Reference book Internals and design
Principles
We have derived a Full Life Cycle defect model which can be used by
organizations that develop software products for others as well as for those that
develop software applications for themselves. We have described this model, the
various states, as well as the paths and parameters that the defect process may take
in this model. In addition, we have discussed the impact and intersection of this
defect process model with the project life cycle model and the testing model.