Week Two: Processes and File/Device Management
Discussion Question 1
How would you rank the principles of concurrency? Explain the design issues for which the concept of concurrency is relevant.
Discussion Question 2
Consider the past couple days you have worked on the computer. What disk scheduling policies and algorithms were used? Explain.
Discussion Question 3
Do you agree or disagree that throughput and capacity are determining factors for effectiveness of a system more so than processor speed? Why or why not?
Individual File Management Paper
For this assignment, you will choose one of the following options:
• Option 1, File Access: Write a 2-page paper that discusses the following: Consider a system that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one file. How would you specify this protection scheme in UNIX®?
• Option 2, Protection Scheme: Write a 2-page paper that discusses the following: Consider a system that supports 5,000 users. Suppose that you want to allow 4,990 of those users to be able to access one file. Suggest another protection scheme that can be used more effectively for this purpose than the scheme provided by UNIX®?
1. POS/355 Week 2 - University of Phoenix Course
Week Two: Processes and File/Device Management
Discussion Question 1
How would you rank the principles of concurrency? Explain the design issues for which the concept
of concurrency is relevant.
Discussion Question 2
Consider the past couple days you have worked on the computer. What disk scheduling policies and
algorithms were used? Explain.
Discussion Question 3
Do you agree or disagree that throughput and capacity are determining factors for effectiveness of a
system more so than processor speed? Why or why not?
Individual File Management Paper
For this assignment, you will choose one of the following options:
• Option 1, File Access: Write a 2-page paper that discusses the following: Consider a system
that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one
file. How would you specify this protection scheme in UNIX®?
• Option 2, Protection Scheme: Write a 2-page paper that discusses the following: Consider a
system that supports 5,000 users. Suppose that you want to allow 4,990 of those users to be able to
access one file. Suggest another protection scheme that can be used more effectively for this
purpose than the scheme provided by UNIX®?
Format your paper consistent with APA guidelines.
2. This tutorial package contains
Discussion Question # 1 ( 213 words count Answer )
Discussion Question # 2 ( 226 words count Answer )
Discussion Question # 3 ( 202 words count Answer )
Individual File Management Paper ( 511 words count - 4 pages - Original )
CLICK HERE TO GET THE SOLUTION !!!!!!!!!