SlideShare a Scribd company logo
1 of 2
POS/355 Week 2 - University of Phoenix Course
Week Two: Processes and File/Device Management
Discussion Question 1
How would you rank the principles of concurrency? Explain the design issues for which the concept
of concurrency is relevant.
Discussion Question 2
Consider the past couple days you have worked on the computer. What disk scheduling policies and
algorithms were used? Explain.
Discussion Question 3
Do you agree or disagree that throughput and capacity are determining factors for effectiveness of a
system more so than processor speed? Why or why not?
Individual File Management Paper
For this assignment, you will choose one of the following options:
• Option 1, File Access: Write a 2-page paper that discusses the following: Consider a system
that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one
file. How would you specify this protection scheme in UNIX®?
• Option 2, Protection Scheme: Write a 2-page paper that discusses the following: Consider a
system that supports 5,000 users. Suppose that you want to allow 4,990 of those users to be able to
access one file. Suggest another protection scheme that can be used more effectively for this
purpose than the scheme provided by UNIX®?
Format your paper consistent with APA guidelines.
This tutorial package contains
Discussion Question # 1 ( 213 words count Answer )
Discussion Question # 2 ( 226 words count Answer )
Discussion Question # 3 ( 202 words count Answer )
Individual File Management Paper ( 511 words count - 4 pages - Original )
CLICK HERE TO GET THE SOLUTION !!!!!!!!!

More Related Content

Viewers also liked

levy-factsheet-v7-small
levy-factsheet-v7-smalllevy-factsheet-v7-small
levy-factsheet-v7-small
Steven Painter
 

Viewers also liked (9)

hdsd phan mem cham cong wise_eye 4
hdsd phan mem cham cong wise_eye 4hdsd phan mem cham cong wise_eye 4
hdsd phan mem cham cong wise_eye 4
 
ingeniera en sistemas computacionales cultura empresarial
ingeniera en sistemas computacionales cultura empresarial ingeniera en sistemas computacionales cultura empresarial
ingeniera en sistemas computacionales cultura empresarial
 
SKATs 500 dages plan 2015-16 for afdelingen Udvikling i Kundeservice
SKATs 500 dages plan 2015-16 for afdelingen Udvikling i KundeserviceSKATs 500 dages plan 2015-16 for afdelingen Udvikling i Kundeservice
SKATs 500 dages plan 2015-16 for afdelingen Udvikling i Kundeservice
 
Quản trị exchange server 2010 phan 2
Quản trị exchange server 2010 phan 2Quản trị exchange server 2010 phan 2
Quản trị exchange server 2010 phan 2
 
길거리 떡볶이 레시피
길거리 떡볶이 레시피길거리 떡볶이 레시피
길거리 떡볶이 레시피
 
The good fight of faith
The good fight of faith The good fight of faith
The good fight of faith
 
NVIDIA OpenGL in 2016
NVIDIA OpenGL in 2016NVIDIA OpenGL in 2016
NVIDIA OpenGL in 2016
 
Nomadisme et télétravail : les impacts en entreprise
Nomadisme et télétravail : les impacts en entrepriseNomadisme et télétravail : les impacts en entreprise
Nomadisme et télétravail : les impacts en entreprise
 
levy-factsheet-v7-small
levy-factsheet-v7-smalllevy-factsheet-v7-small
levy-factsheet-v7-small
 

POS/355 Week 2

  • 1. POS/355 Week 2 - University of Phoenix Course Week Two: Processes and File/Device Management Discussion Question 1 How would you rank the principles of concurrency? Explain the design issues for which the concept of concurrency is relevant. Discussion Question 2 Consider the past couple days you have worked on the computer. What disk scheduling policies and algorithms were used? Explain. Discussion Question 3 Do you agree or disagree that throughput and capacity are determining factors for effectiveness of a system more so than processor speed? Why or why not? Individual File Management Paper For this assignment, you will choose one of the following options: • Option 1, File Access: Write a 2-page paper that discusses the following: Consider a system that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one file. How would you specify this protection scheme in UNIX®? • Option 2, Protection Scheme: Write a 2-page paper that discusses the following: Consider a system that supports 5,000 users. Suppose that you want to allow 4,990 of those users to be able to access one file. Suggest another protection scheme that can be used more effectively for this purpose than the scheme provided by UNIX®? Format your paper consistent with APA guidelines.
  • 2. This tutorial package contains Discussion Question # 1 ( 213 words count Answer ) Discussion Question # 2 ( 226 words count Answer ) Discussion Question # 3 ( 202 words count Answer ) Individual File Management Paper ( 511 words count - 4 pages - Original ) CLICK HERE TO GET THE SOLUTION !!!!!!!!!