Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Discuss the different techniques with which a file can be shared among different users.

Several popular techniques with that a file can be shared among various users are:

1. Sequential sharing: In this technique of sharing, a file can be shared through only one program at a time, it is file accesses by P1 and P2 are spaced-out over time. A lock field can be utilized to implement it. Setting and re-setting of the lock at file open and close makes sure that only one program can utilize the file at any time.

2. Concurrent sharing: Some number of programs may share a file concurrently. While this is the case, this is essential to ignore mutual interference among the

m. There are three categories of concurrent sharing:

a. Immutable files: If a file is shared into immutable mode, no one of the sharing programs can modify it. Such mode has the advantage that sharing programs are independent of one more.

b. Single image immutable files: There the changes made by one program are instantly visible to other programs. The Unix file system utilizes this file- sharing mode.

c. Multiple image mutable files: There many programs can concurrently update the shared file. All updating program creates a latest version of the file that is different from the version created through concurrent programs. Such sharing mode can only be utilized in applications where the existence of multiple versions and concurrent updates are meaningful.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9544011

Have any Question?


Related Questions in Computer Engineering

Compare remote authentication dial-in user service radius

Compare Remote Authentication Dial-In User Service (RADIUS) and Terminal Access Controller Access-Control System Plus (TACACS+).

Research the differences in file formats between ms office

Research the differences in file formats between MS Office 2003 and MS Office 2007. Explain how file signatures and metadata can be used to determine which versions of MS Office applications (e.g. Word, Excel, Power Poin ...

Decision support systems vary greatly in application and

Decision support systems vary greatly in application and complexity, but they all share specific features. A typical Decision support systems has four components: data management, model management, knowledge management a ...

An oil company determines it costs 25000 to sink a test

An oil company determines it costs $25,000 to sink a test well, an oil hit yields a net revenue of $475,000($500,000 gross-$25,000costs), and a natural gas hit yields $125,000 net revenue ($150,000 gross-$25,000 costs). ...

Can you give me short cut of using excel word access share

Can you give me short cut of using excel, word, access, share point, and powerpoint microsoft, I am always have to rely on the back and forth, fleepng the pages, it is possible

Run the huffman coding algorithm on the following

Run the Huffman coding algorithm on the following input: Alphabet C = {p, r, a, i, s, e, d}, with frequencies f as percentages= {12, 16, 16, 12, 16, 16, 12}. Draw the optimal coding tree and the (weighted) average code l ...

Question classyou need to research the topic and discuss

Question: Class, You need to research the topic and discuss the topic in at 500 words with references. Then, reference will not count as a discussion. Question: What would be the impact of predictive modeling on healthca ...

Quesiton direct manipulation and virtual environments

Quesiton: "Direct Manipulation and Virtual Environments" Please respond to the following: • Your software development company has been contracted to build a tool that will manage user accounts and rights in an Active Dir ...

Assignmenta in the slides and textbook one of the examples

Assignment (a) In the slides and textbook, one of the examples features a class for counting up. An interface which defines this functionality is given below: public interface IncrementCounter { //Increments the counter ...

Recently the discovery of a new data structure wonder heap

Recently, the discovery of a new data structure WONDER HEAP was announced. A WONDER HEAP has the same functionality and worst case behaviour as a binary heap except for DELETE MAX, which is implemented in O(log log n) (i ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As